The Dendritic Cell algorithm (DCA) is inspired by recent work in innate immunity. In this paper a formal description of the DCA is given. The DCA is described in detail, and its use as an anomaly detector is illustrated within the context of computer security. A port scan detection task is performed to substantiate the influence of signal selection on the behaviour of the algorithm. Experimental results provide a comparison of differing input signal mappings.
Greensmith, J., Aickelin, U., & Twycross, J. (2006). Articulation and Clarification of the Dendritic Cell Algorithm. In Artificial Immune Systems: 5th International Conference, ICARIS 2006, Oeiras, Portugal, September 4-6, 2006. ProceedingsSpringer. https://doi.org/10.1007/11823940_31