An Agent-based Classification Model
The major function of this model is to access the UCI Wisconsin Breast Cancer data-set[1] and classify the data items into two categories, which are normal and anomalous. This kind of classification can be referred as anomaly detection, which discriminates anomalous behaviour from normal behaviour...
| Main Authors: | Gu, Feng, Aickelin, Uwe, Greensmith, Julie |
|---|---|
| Format: | Conference or Workshop Item |
| Published: |
2007
|
| Online Access: | https://eprints.nottingham.ac.uk/587/ |
Similar Items
Variance in system dynamics and agent based modelling using the SIR model of infectious diseases
by: Ahmed, Aslam, et al.
Published: (2012)
by: Ahmed, Aslam, et al.
Published: (2012)
Theoretical formulation and analysis of the deterministic dendritic cell algorithm
by: Gu, Feng, et al.
Published: (2013)
by: Gu, Feng, et al.
Published: (2013)
Exploration of the dendritic cell algorithm with the duration calculus
by: Gu, Feng, et al.
Published: (2009)
by: Gu, Feng, et al.
Published: (2009)
Theoretical formulation and analysis of the deterministic dendritic cell algorithm
by: Gu, Feng, et al.
Published: (2013)
by: Gu, Feng, et al.
Published: (2013)
Further exploration of the Dendritic Cell Algorithm: antigen multiplier and time windows
by: Gu, Feng, et al.
Published: (2008)
by: Gu, Feng, et al.
Published: (2008)
The dendritic cell algorithm for intrusion detection
by: Gu, Feng, et al.
Published: (2012)
by: Gu, Feng, et al.
Published: (2012)
Integrating real-time analysis with the dendritic cell algorithm through segmentation
by: Gu, Feng, et al.
Published: (2009)
by: Gu, Feng, et al.
Published: (2009)
Quiet in class: classification, noise and the dendritic cell algorithm
by: Gu, Feng, et al.
Published: (2011)
by: Gu, Feng, et al.
Published: (2011)
PCA 4 DCA: the application of principal component analysis to the Dendritic Cell Algorithm
by: Gu, Feng, et al.
Published: (2009)
by: Gu, Feng, et al.
Published: (2009)
Dendritic Cells for SYN Scan Detection
by: Greensmith, Julie, et al.
Published: (2007)
by: Greensmith, Julie, et al.
Published: (2007)
Sensing Danger: Innate Immunology for Intrusion Detection
by: Aickelin, Uwe, et al.
Published: (2007)
by: Aickelin, Uwe, et al.
Published: (2007)
Artificial dendritic cells: multi-faceted perspectives
by: Greensmith, Julie, et al.
Published: (2009)
by: Greensmith, Julie, et al.
Published: (2009)
Dendritic Cells for Real-Time Anomaly Detection
by: Greensmith, Julie, et al.
Published: (2006)
by: Greensmith, Julie, et al.
Published: (2006)
The deterministic Dendritic Cell Algorithm
by: Greensmith, Julie, et al.
Published: (2008)
by: Greensmith, Julie, et al.
Published: (2008)
Information Fusion for Anomaly Detection with the Dendritic Cell Algorithm
by: Greensmith, Julie, et al.
Published: (2007)
by: Greensmith, Julie, et al.
Published: (2007)
Artificial immune systems
by: Greensmith, Julie, et al.
Published: (2010)
by: Greensmith, Julie, et al.
Published: (2010)
Dendritic Cells for Anomaly Detection
by: Greensmith, Julie, et al.
Published: (2006)
by: Greensmith, Julie, et al.
Published: (2006)
'Immune System Approaches to Intrusion Detection - A Review'
by: Aickelin, Uwe, et al.
Published: (2004)
by: Aickelin, Uwe, et al.
Published: (2004)
Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems'
by: Greensmith, Julie, et al.
Published: (2004)
by: Greensmith, Julie, et al.
Published: (2004)
'Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection'
by: Greensmith, Julie, et al.
Published: (2005)
by: Greensmith, Julie, et al.
Published: (2005)
Detecting danger: the Dendritic Cell Algorithm
by: Greensmith, Julie, et al.
Published: (2008)
by: Greensmith, Julie, et al.
Published: (2008)
The DCA:SOMe comparison: a comparative study between two biologically-inspired algorithms
by: Greensmith, Julie, et al.
Published: (2008)
by: Greensmith, Julie, et al.
Published: (2008)
Articulation and Clarification of the Dendric Cell Algorithm
by: Greensmith, Julie, et al.
Published: (2006)
by: Greensmith, Julie, et al.
Published: (2006)
Introducting Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection
by: Greensmith, Julie, et al.
Published: (2005)
by: Greensmith, Julie, et al.
Published: (2005)
Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems'
by: Greensmith, Julie, et al.
Published: (2004)
by: Greensmith, Julie, et al.
Published: (2004)
'Immune System Approaches to Intrusion Detection - A Review'
by: Aickelin, Uwe, et al.
Published: (2004)
by: Aickelin, Uwe, et al.
Published: (2004)
'Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection'
by: Greensmith, Julie, et al.
Published: (2005)
by: Greensmith, Julie, et al.
Published: (2005)
Investigating immune system aging: system dynamics and agent-based modeling
by: Figueredo, Grazziela P., et al.
Published: (2010)
by: Figueredo, Grazziela P., et al.
Published: (2010)
Modelling office energy consumption: an agent based approach
by: Zhang, Tao, et al.
Published: (2010)
by: Zhang, Tao, et al.
Published: (2010)
Modelling electrical car diffusion based on agents
by: Yu, Lei, et al.
Published: (2012)
by: Yu, Lei, et al.
Published: (2012)
Systems dynamics or agent-based modelling for immune simulation?
by: Figueredo, Grazziela P., et al.
Published: (2011)
by: Figueredo, Grazziela P., et al.
Published: (2011)
Performance evaluation of DCA and SRC on a single bot detection
by: Al-Hammadi, Yousof, et al.
Published: (2010)
by: Al-Hammadi, Yousof, et al.
Published: (2010)
DCA for bot detection
by: Al-Hammadi, Yousof, et al.
Published: (2008)
by: Al-Hammadi, Yousof, et al.
Published: (2008)
Modelling electricity consumption in office buildings: an agent based approach
by: Zhang, Tao, et al.
Published: (2011)
by: Zhang, Tao, et al.
Published: (2011)
'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory'
by: Kim, Jungwon, et al.
Published: (2005)
by: Kim, Jungwon, et al.
Published: (2005)
'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory'
by: Kim, Jungwon, et al.
Published: (2005)
by: Kim, Jungwon, et al.
Published: (2005)
Optimising rule-based classification in temporal data
by: Fattah, Polla, et al.
Published: (2016)
by: Fattah, Polla, et al.
Published: (2016)
Human Behavious Modelling for Discrete Event and Agent Based Simulation: A Case Study
by: Majid, Mazlina, et al.
Published: (2007)
by: Majid, Mazlina, et al.
Published: (2007)
Investigating output accuracy for a discrete event simulation model and an agent based simulation model
by: Abdul Majid, Mazlina, et al.
Published: (2009)
by: Abdul Majid, Mazlina, et al.
Published: (2009)
Investigating Output Accuracy For A Discrete Event Simulation Model And An Agent Based Simulation Model
by: Mazlina, Abdul Majid, et al.
Published: (2009)
by: Mazlina, Abdul Majid, et al.
Published: (2009)
Similar Items
-
Variance in system dynamics and agent based modelling using the SIR model of infectious diseases
by: Ahmed, Aslam, et al.
Published: (2012) -
Theoretical formulation and analysis of the deterministic dendritic cell algorithm
by: Gu, Feng, et al.
Published: (2013) -
Exploration of the dendritic cell algorithm with the duration calculus
by: Gu, Feng, et al.
Published: (2009) -
Theoretical formulation and analysis of the deterministic dendritic cell algorithm
by: Gu, Feng, et al.
Published: (2013) -
Further exploration of the Dendritic Cell Algorithm: antigen multiplier and time windows
by: Gu, Feng, et al.
Published: (2008)