Skip to main content

Research Repository

Advanced Search

Outputs (38)

Artificial immune systems (2010)
Book Chapter
Greensmith, J., Whitbrook, A., & Aickelin, U. (2010). Artificial immune systems. In M. Gendreau, & J.-Y. Potvin (Eds.), Handbook of metaheuristics. Springer

The human immune system has numerous properties that make it ripe for exploitation in the computational domain, such as robustness and fault tolerance, and many different algorithms, collectively termed Artificial Immune Systems
(AIS), have been ins... Read More about Artificial immune systems.

Information Fusion for Anomaly Detection with the Dendritic Cell Algorithm (2009)
Journal Article
Greensmith, J., Aickelin, U., & Tedesco, G. (2010). Information Fusion for Anomaly Detection with the Dendritic Cell Algorithm. Information Fusion, 11(1), 21-34. https://doi.org/10.1016/j.inffus.2009.04.006

Dendritic cells are antigen presenting cells that provide a vital link between the innate and adaptive immune system, providing the initial detection of pathogenic invaders. Research into this family of cells has revealed that they
perform informati... Read More about Information Fusion for Anomaly Detection with the Dendritic Cell Algorithm.

Exploration of the dendritic cell algorithm with the duration calculus (2009)
Book Chapter
Gu, F., Greensmith, J., & Aickelin, U. (2009). Exploration of the dendritic cell algorithm with the duration calculus. In P. S. Andrews, J. Timmis, N. D. Owens, U. Aickelin, E. Hart, A. Hone, & A. M. Tyrrell (Eds.), Artificial immune systems: 8th international conference, ICARIS 2009, York, UK, August 9-12, 2009: proceedings. Springer. https://doi.org/10.2139/ssrn.2830323

As one of the newest members in Articial Immune Systems
(AIS), the Dendritic Cell Algorithm (DCA) has been applied to a range of problems. These applications mainly belong to the eld of anomaly detection. However, real-time detection, a new challeng... Read More about Exploration of the dendritic cell algorithm with the duration calculus.

DCA for bot detection (2008)
Book Chapter
Al-Hammadi, Y., Aickelin, U., & Greensmith, J. (2008). DCA for bot detection. In IEEE Congress on Evolutionary Computation, 2008: CEC 2008. IEEE

Ensuring the security of computers is a non-trivial task, with many techniques used by malicious users to compromise these systems. In recent years a new threat has emerged in the form of networks of hijacked zombie machines used to perform complex d... Read More about DCA for bot detection.

Further exploration of the Dendritic Cell Algorithm: antigen multiplier and time windows (2008)
Book Chapter
Gu, F., Greensmith, J., & Aickelin, U. (2008). Further exploration of the Dendritic Cell Algorithm: antigen multiplier and time windows. In P. Bentley, D. Lee, & S. Jung (Eds.), Artificial immune systems: 7th international conference, ICARIS 2008, Phuket, Thailand, August 10-13, 2008: proceedings. Springer

As an immune-inspired algorithm, the Dendritic Cell Algorithm (DCA), produces promising performance in the field of anomaly detection. This paper presents the application of the DCA to a standard data set, the KDD 99 data set. The results of differen... Read More about Further exploration of the Dendritic Cell Algorithm: antigen multiplier and time windows.

Immune system approaches to intrusion detection - a review (2007)
Journal Article
Kim, J., Bentley, P., Aickelin, U., Greensmith, J., Tedesco, G., & Twycross, J. (2007). Immune system approaches to intrusion detection - a review. Natural Computing, 6(4), 413-466

The use of artificial immune systems in intrusion detection is an appealing concept for two reasons. Firstly, the human immune system provides the human body with a high level of protection from invading pathogens, in a robust, self-organised and dis... Read More about Immune system approaches to intrusion detection - a review.

Sensing Danger: Innate Immunology for Intrusion Detection (2007)
Journal Article
Aickelin, U., & Greensmith, J. (2007). Sensing Danger: Innate Immunology for Intrusion Detection. Information Security Technical Report, 12(4), 218-227. https://doi.org/10.1016/j.istr.2007.10.003

The immune system provides an ideal metaphor for anomaly detection in general and computer security in particular. Based on this idea, artificial immune systems have been used for a number of years for intrusion detection, unfortunately so far with l... Read More about Sensing Danger: Innate Immunology for Intrusion Detection.

Articulation and Clarification of the Dendritic Cell Algorithm (2006)
Book Chapter
Greensmith, J., Aickelin, U., & Twycross, J. (2006). Articulation and Clarification of the Dendritic Cell Algorithm. In Artificial Immune Systems: 5th International Conference, ICARIS 2006, Oeiras, Portugal, September 4-6, 2006. Proceedings. Springer. https://doi.org/10.1007/11823940_31

The Dendritic Cell algorithm (DCA) is inspired by recent work in innate immunity. In this paper a formal description of the DCA is given. The DCA is described in detail, and its use as an anomaly detector is illustrated within the context of computer... Read More about Articulation and Clarification of the Dendritic Cell Algorithm.

'Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection' (2005)
Presentation / Conference Contribution
Greensmith, J., Aickelin, U., & Cayzer, S. 'Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection'. Presented at ICARIS-2005, 4th International Conference on Artificial Immune Systems, LNCS 3627

Abstract. Dendritic cells are antigen presenting cells that provide a vital link between the innate and adaptive immune system. Research into this family of cells has revealed that they perform the role of coordinating T-cell based immune responses,... Read More about 'Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection'.