Further exploration of the Dendritic Cell Algorithm: antigen multiplier and time windows
As an immune-inspired algorithm, the Dendritic Cell Algorithm (DCA), produces promising performance in the field of anomaly detection. This paper presents the application of the DCA to a standard data set, the KDD 99 data set. The results of different implementation versions of the DCA, including an...
| Main Authors: | Gu, Feng, Greensmith, Julie, Aickelin, Uwe |
|---|---|
| Other Authors: | Bentley, Peter |
| Format: | Book Section |
| Published: |
Springer
2008
|
| Online Access: | https://eprints.nottingham.ac.uk/989/ |
Similar Items
Exploration of the dendritic cell algorithm with the duration calculus
by: Gu, Feng, et al.
Published: (2009)
by: Gu, Feng, et al.
Published: (2009)
Integrating real-time analysis with the dendritic cell algorithm through segmentation
by: Gu, Feng, et al.
Published: (2009)
by: Gu, Feng, et al.
Published: (2009)
The dendritic cell algorithm for intrusion detection
by: Gu, Feng, et al.
Published: (2012)
by: Gu, Feng, et al.
Published: (2012)
Theoretical formulation and analysis of the deterministic dendritic cell algorithm
by: Gu, Feng, et al.
Published: (2013)
by: Gu, Feng, et al.
Published: (2013)
Theoretical formulation and analysis of the deterministic dendritic cell algorithm
by: Gu, Feng, et al.
Published: (2013)
by: Gu, Feng, et al.
Published: (2013)
The deterministic Dendritic Cell Algorithm
by: Greensmith, Julie, et al.
Published: (2008)
by: Greensmith, Julie, et al.
Published: (2008)
Dendritic Cells for Real-Time Anomaly Detection
by: Greensmith, Julie, et al.
Published: (2006)
by: Greensmith, Julie, et al.
Published: (2006)
PCA 4 DCA: the application of principal component analysis to the Dendritic Cell Algorithm
by: Gu, Feng, et al.
Published: (2009)
by: Gu, Feng, et al.
Published: (2009)
Detecting danger: the Dendritic Cell Algorithm
by: Greensmith, Julie, et al.
Published: (2008)
by: Greensmith, Julie, et al.
Published: (2008)
Quiet in class: classification, noise and the dendritic cell algorithm
by: Gu, Feng, et al.
Published: (2011)
by: Gu, Feng, et al.
Published: (2011)
Information Fusion for Anomaly Detection with the Dendritic Cell Algorithm
by: Greensmith, Julie, et al.
Published: (2007)
by: Greensmith, Julie, et al.
Published: (2007)
Dendritic Cells for SYN Scan Detection
by: Greensmith, Julie, et al.
Published: (2007)
by: Greensmith, Julie, et al.
Published: (2007)
Artificial dendritic cells: multi-faceted perspectives
by: Greensmith, Julie, et al.
Published: (2009)
by: Greensmith, Julie, et al.
Published: (2009)
Dendritic Cells for Anomaly Detection
by: Greensmith, Julie, et al.
Published: (2006)
by: Greensmith, Julie, et al.
Published: (2006)
'Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection'
by: Greensmith, Julie, et al.
Published: (2005)
by: Greensmith, Julie, et al.
Published: (2005)
Introducting Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection
by: Greensmith, Julie, et al.
Published: (2005)
by: Greensmith, Julie, et al.
Published: (2005)
'Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection'
by: Greensmith, Julie, et al.
Published: (2005)
by: Greensmith, Julie, et al.
Published: (2005)
The functional dendritic cell algorithm: a formal specification with Haskell
by: Greensmith, Julie, et al.
Published: (2017)
by: Greensmith, Julie, et al.
Published: (2017)
Articulation and Clarification of the Dendric Cell Algorithm
by: Greensmith, Julie, et al.
Published: (2006)
by: Greensmith, Julie, et al.
Published: (2006)
An Agent-based Classification Model
by: Gu, Feng, et al.
Published: (2007)
by: Gu, Feng, et al.
Published: (2007)
The Application of a Dendric Cell Algorithm to a Robotic Classifier
by: Oates, Robert, et al.
Published: (2007)
by: Oates, Robert, et al.
Published: (2007)
The Application of a Dendric Cell Algorithm to a Robotic Classifier
by: Oates, Robert, et al.
Published: (2007)
by: Oates, Robert, et al.
Published: (2007)
The Application of a Dendric Cell Algorithm to a Robotic Classifier
by: Oates, Robert, et al.
Published: (2007)
by: Oates, Robert, et al.
Published: (2007)
The DCA:SOMe comparison: a comparative study between two biologically-inspired algorithms
by: Greensmith, Julie, et al.
Published: (2008)
by: Greensmith, Julie, et al.
Published: (2008)
Sensing Danger: Innate Immunology for Intrusion Detection
by: Aickelin, Uwe, et al.
Published: (2007)
by: Aickelin, Uwe, et al.
Published: (2007)
The suitability of the dendritic cell algorithm for robotic security applications
by: Oates, Robert Foster
Published: (2010)
by: Oates, Robert Foster
Published: (2010)
Human mesothelioma induces defects in dendritic cell numbers and antigen processing function which predict survival outcomes
by: Cornwall, S., et al.
Published: (2015)
by: Cornwall, S., et al.
Published: (2015)
Effect of O-linked glycosylation on the antigenicity, cellular uptake and trafficking in dendritic cells of recombinant Ber e 1
by: Jambari, Nuzul Noorahya, et al.
Published: (2021)
by: Jambari, Nuzul Noorahya, et al.
Published: (2021)
Validation on an enhanced dendrite cell algorithm using statistical analysis
by: Mohamad Mohsin, Mohamad Farhan, et al.
Published: (2017)
by: Mohamad Mohsin, Mohamad Farhan, et al.
Published: (2017)
An improved artificial dendrite cell algorithm for abnormal signal detection
by: Mohamad Mohsin, Mohamad Farhan, et al.
Published: (2018)
by: Mohamad Mohsin, Mohamad Farhan, et al.
Published: (2018)
Windows explorer
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Artificial immune systems
by: Greensmith, Julie, et al.
Published: (2010)
by: Greensmith, Julie, et al.
Published: (2010)
Variance in system dynamics and agent based modelling using the SIR model of infectious diseases
by: Ahmed, Aslam, et al.
Published: (2012)
by: Ahmed, Aslam, et al.
Published: (2012)
'Immune System Approaches to Intrusion Detection - A Review'
by: Aickelin, Uwe, et al.
Published: (2004)
by: Aickelin, Uwe, et al.
Published: (2004)
Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems'
by: Greensmith, Julie, et al.
Published: (2004)
by: Greensmith, Julie, et al.
Published: (2004)
Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems'
by: Greensmith, Julie, et al.
Published: (2004)
by: Greensmith, Julie, et al.
Published: (2004)
'Immune System Approaches to Intrusion Detection - A Review'
by: Aickelin, Uwe, et al.
Published: (2004)
by: Aickelin, Uwe, et al.
Published: (2004)
Implementation of booth multiplier algorithm using Radix-4 in FPGA
by: Anis Shahida Mokhtar,, et al.
Published: (2021)
by: Anis Shahida Mokhtar,, et al.
Published: (2021)
Multipliers on Fréchet algebra
by: Azram, Mohammad, et al.
Published: (2013)
by: Azram, Mohammad, et al.
Published: (2013)
Multipliers on fréchet algebra
by: Azram, Mohammad, et al.
Published: (2012)
by: Azram, Mohammad, et al.
Published: (2012)
Similar Items
-
Exploration of the dendritic cell algorithm with the duration calculus
by: Gu, Feng, et al.
Published: (2009) -
Integrating real-time analysis with the dendritic cell algorithm through segmentation
by: Gu, Feng, et al.
Published: (2009) -
The dendritic cell algorithm for intrusion detection
by: Gu, Feng, et al.
Published: (2012) -
Theoretical formulation and analysis of the deterministic dendritic cell algorithm
by: Gu, Feng, et al.
Published: (2013) -
Theoretical formulation and analysis of the deterministic dendritic cell algorithm
by: Gu, Feng, et al.
Published: (2013)