Skip to main content

Research Repository

Advanced Search

Outputs (40)

Articulation and Clarification of the Dendritic Cell Algorithm (2006)
Presentation / Conference Contribution
Greensmith, J., Aickelin, U., & Twycross, J. (2006, September). Articulation and Clarification of the Dendritic Cell Algorithm. Presented at 5th International Conference, ICARIS 2006, Oeiras, Portugal

The Dendritic Cell algorithm (DCA) is inspired by recent work in innate immunity. In this paper a formal description of the DCA is given. The DCA is described in detail, and its use as an anomaly detector is illustrated within the context of computer... Read More about Articulation and Clarification of the Dendritic Cell Algorithm.

'Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection' (2005)
Presentation / Conference Contribution
Greensmith, J., Aickelin, U., & Cayzer, S. 'Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection'. Presented at ICARIS-2005, 4th International Conference on Artificial Immune Systems, LNCS 3627

Abstract. Dendritic cells are antigen presenting cells that provide a vital link between the innate and adaptive immune system. Research into this family of cells has revealed that they perform the role of coordinating T-cell based immune responses,... Read More about 'Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection'.

'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory' (2005)
Presentation / Conference Contribution
Kim, J., Greensmith, J., Twycross, J., & Aickelin, U. 'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory'. Presented at Adaptive and Resilient Computing Security Workshop (ARCS-05)

The analysis of system calls is one method employed by anomaly detection systems to recognise malicious code execution. Similarities can be drawn between this process and the behaviour of certain cells belonging to the human immune system, and can be... Read More about 'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory'.

Immune System Approaches to Intrusion Detection - A Review (ICARIS) (2004)
Presentation / Conference Contribution
Aickelin, U., Greensmith, J., & Twycross, J. (2004, September). Immune System Approaches to Intrusion Detection - A Review (ICARIS). Presented at Artificial Immune Systems, Sicily, Italy

The use of artificial immune systems in intrusion detection is an appealing concept for two reasons. Firstly, the human immune system provides the human body with a high level of protection from invading pathogens, in a robust, self-organised and dis... Read More about Immune System Approaches to Intrusion Detection - A Review (ICARIS).

Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems' (2004)
Presentation / Conference Contribution
Greensmith, J., Aickelin, U., & Twycross, J. Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems'. Presented at 6th International Conference in Adaptive Computing in Design and Manufacture

INTRODUCTION

In recent years computer systems have become increasingly complex and consequently the challenge of protecting these systems has become
increasingly difficult. Various techniques have been implemented to counteract the misuse of com... Read More about Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems'.

'Immune System Approaches to Intrusion Detection - A Review' (2004)
Presentation / Conference Contribution
Aickelin, U., Greensmith, J., & Twycross, J. 'Immune System Approaches to Intrusion Detection - A Review'. Presented at ICARIS-2004, 3rd International Conference on Artificial Immune Systems, LNCS 3239

Abstract. The use of artificial immune systems in intrusion detection is
an appealing concept for two reasons. Firstly, the human immune system
provides the human body with a high level of protection from invading
pathogens, in a robust, s... Read More about 'Immune System Approaches to Intrusion Detection - A Review'.

The Application of a Dendric Cell Algorithm to a Robotic Classifier
Presentation / Conference Contribution
Oates, R., Greensmith, J., Aickelin, U., Garibaldi, J., & Kendall, G. The Application of a Dendric Cell Algorithm to a Robotic Classifier. Presented at Proceedings of the 6th International Conference on Artificial Immune Systems (ICARIS 2007)

The dendritic cell algorithm is an immune-inspired technique for processing time-dependant data. Here we propose it as a possible solution for a robotic classification problem. The dendritic cell algorithm is implemented on a real robot and an invest... Read More about The Application of a Dendric Cell Algorithm to a Robotic Classifier.

Dendritic Cells for Real-Time Anomaly Detection
Presentation / Conference Contribution
Greensmith, J., & Aickelin, U. Dendritic Cells for Real-Time Anomaly Detection. Presented at Proceedings of the Workshop on Artificial Immune Systems and Immune System Modelling (AISB 2006)

Dendritic Cells (DCs) are innate immune system cells which have the power to activate or suppress the immune system. The behaviour of human DCs is abstracted to form an algorithm suitable for anomaly detection. We test this algorithm on the real-time... Read More about Dendritic Cells for Real-Time Anomaly Detection.

Articulation and Clarification of the Dendric Cell Algorithm
Presentation / Conference Contribution
Greensmith, J., Aickelin, U., & Twycross, J. Articulation and Clarification of the Dendric Cell Algorithm. Presented at Proceedings of the 5th International Conference on Artificial Immune Systems (ICARIS 2006)

The Dendritic Cell algorithm (DCA) is inspired by recent
work in innate immunity. In this paper a formal description of the DCA is given. The DCA is described in detail, and its use as an anomaly detector is illustrated within the context of compute... Read More about Articulation and Clarification of the Dendric Cell Algorithm.

Dendritic Cells for Anomaly Detection
Presentation / Conference Contribution
Greensmith, J., Twycross, J., & Aickelin, U. Dendritic Cells for Anomaly Detection. Presented at Proceedings of the IEEE Congress on Evolutionary Computation (CEC 2006)

Artificial immune systems, more specifically the negative selection algorithm, have previously been applied to intrusion detection. The aim of this research is to develop
an intrusion detection system based on a novel concept in
immunology, the Dan... Read More about Dendritic Cells for Anomaly Detection.