The DCA:SOMe comparison: a comparative study between two biologically-inspired algorithms
The dendritic cell algorithm (DCA) is an immune-inspired algorithm, developed for the purpose of anomaly detection. The algorithm performs multi-sensor data fusion and correlation which results in a ‘context aware’ detection system. Previous applications of the DCA have included the detection of pot...
| Main Authors: | Greensmith, Julie, Feyereisl, Jan, Aickelin, Uwe |
|---|---|
| Format: | Article |
| Published: |
Evolutionary Intelligence
2008
|
| Online Access: | https://eprints.nottingham.ac.uk/988/ |
Similar Items
DCA for bot detection
by: Al-Hammadi, Yousof, et al.
Published: (2008)
by: Al-Hammadi, Yousof, et al.
Published: (2008)
PCA 4 DCA: the application of principal component analysis to the Dendritic Cell Algorithm
by: Gu, Feng, et al.
Published: (2009)
by: Gu, Feng, et al.
Published: (2009)
Performance evaluation of DCA and SRC on a single bot detection
by: Al-Hammadi, Yousof, et al.
Published: (2010)
by: Al-Hammadi, Yousof, et al.
Published: (2010)
'Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection'
by: Greensmith, Julie, et al.
Published: (2005)
by: Greensmith, Julie, et al.
Published: (2005)
Introducting Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection
by: Greensmith, Julie, et al.
Published: (2005)
by: Greensmith, Julie, et al.
Published: (2005)
'Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection'
by: Greensmith, Julie, et al.
Published: (2005)
by: Greensmith, Julie, et al.
Published: (2005)
Quiet in class: classification, noise and the dendritic cell algorithm
by: Gu, Feng, et al.
Published: (2011)
by: Gu, Feng, et al.
Published: (2011)
The deterministic Dendritic Cell Algorithm
by: Greensmith, Julie, et al.
Published: (2008)
by: Greensmith, Julie, et al.
Published: (2008)
Biological Inspiration for Artificial Immune Systems
by: Twycross, Jamie, et al.
Published: (2007)
by: Twycross, Jamie, et al.
Published: (2007)
'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory'
by: Kim, Jungwon, et al.
Published: (2005)
by: Kim, Jungwon, et al.
Published: (2005)
'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory'
by: Kim, Jungwon, et al.
Published: (2005)
by: Kim, Jungwon, et al.
Published: (2005)
Detecting danger: the Dendritic Cell Algorithm
by: Greensmith, Julie, et al.
Published: (2008)
by: Greensmith, Julie, et al.
Published: (2008)
Articulation and Clarification of the Dendric Cell Algorithm
by: Greensmith, Julie, et al.
Published: (2006)
by: Greensmith, Julie, et al.
Published: (2006)
The dendritic cell algorithm for intrusion detection
by: Gu, Feng, et al.
Published: (2012)
by: Gu, Feng, et al.
Published: (2012)
Exploration of the dendritic cell algorithm with the duration calculus
by: Gu, Feng, et al.
Published: (2009)
by: Gu, Feng, et al.
Published: (2009)
Theoretical formulation and analysis of the deterministic dendritic cell algorithm
by: Gu, Feng, et al.
Published: (2013)
by: Gu, Feng, et al.
Published: (2013)
Theoretical formulation and analysis of the deterministic dendritic cell algorithm
by: Gu, Feng, et al.
Published: (2013)
by: Gu, Feng, et al.
Published: (2013)
Information Fusion for Anomaly Detection with the Dendritic Cell Algorithm
by: Greensmith, Julie, et al.
Published: (2007)
by: Greensmith, Julie, et al.
Published: (2007)
Further exploration of the Dendritic Cell Algorithm: antigen multiplier and time windows
by: Gu, Feng, et al.
Published: (2008)
by: Gu, Feng, et al.
Published: (2008)
Integrating real-time analysis with the dendritic cell algorithm through segmentation
by: Gu, Feng, et al.
Published: (2009)
by: Gu, Feng, et al.
Published: (2009)
The effectiveness of DCA:summary and critiques of the literature review
by: Chen, Kun
Published: (2007)
by: Chen, Kun
Published: (2007)
STORM - a novel information fusion and cluster interpretation technique
by: Feyereisl, Jan, et al.
Published: (2010)
by: Feyereisl, Jan, et al.
Published: (2010)
Privileged information for data clustering
by: Feyereisl, Jan, et al.
Published: (2012)
by: Feyereisl, Jan, et al.
Published: (2012)
ToLeRating UR-STD
by: Feyereisl, Jan, et al.
Published: (2008)
by: Feyereisl, Jan, et al.
Published: (2008)
Self-organizing maps in computer security
by: Feyereisl, Jan, et al.
Published: (2009)
by: Feyereisl, Jan, et al.
Published: (2009)
'Cooperative Automated worm Response and Detection ImmuNe ALgorithm (CARDINAL) inspired by T-cell Immunity and Tolerance'
by: Kim, Jungwon, et al.
Published: (2005)
by: Kim, Jungwon, et al.
Published: (2005)
'Cooperative Automated worm Response and Detection ImmuNe ALgorithm (CARDINAL) inspired by T-cell Immunity and Tolerance'
by: Kim, Jungwon, et al.
Published: (2005)
by: Kim, Jungwon, et al.
Published: (2005)
Artificial dendritic cells: multi-faceted perspectives
by: Greensmith, Julie, et al.
Published: (2009)
by: Greensmith, Julie, et al.
Published: (2009)
Dendritic Cells for SYN Scan Detection
by: Greensmith, Julie, et al.
Published: (2007)
by: Greensmith, Julie, et al.
Published: (2007)
Dendritic Cells for Real-Time Anomaly Detection
by: Greensmith, Julie, et al.
Published: (2006)
by: Greensmith, Julie, et al.
Published: (2006)
Sensing Danger: Innate Immunology for Intrusion Detection
by: Aickelin, Uwe, et al.
Published: (2007)
by: Aickelin, Uwe, et al.
Published: (2007)
Wavelet feature extraction and genetic algorithm for biomarker detection in colorectal cancer data
by: Liu, Yihui, et al.
Published: (2013)
by: Liu, Yihui, et al.
Published: (2013)
An Immune Inspired Approach to Anomaly Detection
by: Twycross, Jamie, et al.
Published: (2007)
by: Twycross, Jamie, et al.
Published: (2007)
The effectiveness of the performance appraisal system in department of civilaviation (DCA) Kuching, Sarawak
by: Pang, Ching Ching
Published: (2005)
by: Pang, Ching Ching
Published: (2005)
SmiDCA: Smishing attack detection for mobile computing on smishing dataset
by: Hasan, Dahah Ahmed Haidarah
Published: (2019)
by: Hasan, Dahah Ahmed Haidarah
Published: (2019)
The Application of a Dendric Cell Algorithm to a Robotic Classifier
by: Oates, Robert, et al.
Published: (2007)
by: Oates, Robert, et al.
Published: (2007)
The Application of a Dendric Cell Algorithm to a Robotic Classifier
by: Oates, Robert, et al.
Published: (2007)
by: Oates, Robert, et al.
Published: (2007)
The Application of a Dendric Cell Algorithm to a Robotic Classifier
by: Oates, Robert, et al.
Published: (2007)
by: Oates, Robert, et al.
Published: (2007)
Motif detection inspired by immune memory
by: Wilson, William, et al.
Published: (2011)
by: Wilson, William, et al.
Published: (2011)
Motif detection inspired by immune memory
by: Wilson, William, et al.
Published: (2007)
by: Wilson, William, et al.
Published: (2007)
Similar Items
-
DCA for bot detection
by: Al-Hammadi, Yousof, et al.
Published: (2008) -
PCA 4 DCA: the application of principal component analysis to the Dendritic Cell Algorithm
by: Gu, Feng, et al.
Published: (2009) -
Performance evaluation of DCA and SRC on a single bot detection
by: Al-Hammadi, Yousof, et al.
Published: (2010) -
'Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection'
by: Greensmith, Julie, et al.
Published: (2005) -
Introducting Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection
by: Greensmith, Julie, et al.
Published: (2005)