Skip to main content

Research Repository

Advanced Search

All Outputs (19)

Automatically Labeling Cyber Threat Intelligence reports using Natural Language Processing (2023)
Presentation / Conference Contribution
Abdi, H., Bagley, S. R., Furnell, S., & Twycross, J. (2023). Automatically Labeling Cyber Threat Intelligence reports using Natural Language Processing. In DocEng ’23 : Proceedings of the 2023 ACM Symposium on Document Engineering. https://doi.org/10.1145/3573128.3609348

Attribution provides valuable intelligence in the face of Advanced Persistent Threat (APT) attacks. By accurately identifying the culprits and actors behind the attacks, we can gain more insights into their motivations, capabilities, and potential fu... Read More about Automatically Labeling Cyber Threat Intelligence reports using Natural Language Processing.

A Comprehensive Study of the Efficiency of Type-Reduction Algorithms (2020)
Journal Article
Chen, C., Wu, D., Garibaldi, J. M., John, R. I., Twycross, J., & Mendel, J. M. (2021). A Comprehensive Study of the Efficiency of Type-Reduction Algorithms. IEEE Transactions on Fuzzy Systems, 29(6), 1556 -1566. https://doi.org/10.1109/tfuzz.2020.2981002

Improving the efficiency of type-reduction algorithms continues to attract research interest. Recently, there have been some new type-reduction approaches claiming that they are more efficient than the well-known algorithms such as the enhanced Karni... Read More about A Comprehensive Study of the Efficiency of Type-Reduction Algorithms.

Modelling Emerging Pollutants in Wastewater Treatment: A Case Study using the Pharmaceutical 17α−ethinylestradiol (2019)
Journal Article
Acheampong, E., Dryden, I. L., Wattis, J. A., Twycross, J., Scrimshaw, M. D., & Gomes, R. L. (2019). Modelling Emerging Pollutants in Wastewater Treatment: A Case Study using the Pharmaceutical 17α−ethinylestradiol. Computers and Chemical Engineering, 128, 477-487. https://doi.org/10.1016/j.compchemeng.2019.06.020

Mathematical modelling can play a key role in understanding as well as quantifying uncertainties surrounding the presence and fate of emerging pollutants in wastewater treatment processes (WWTPs). This paper presents for the first time a simplified e... Read More about Modelling Emerging Pollutants in Wastewater Treatment: A Case Study using the Pharmaceutical 17α−ethinylestradiol.

Microarray Feature Selection and Dynamic Selection of Classifiers for Early Detection of Insect Bite Hypersensitivity in Horses (2019)
Presentation / Conference Contribution
Maciel Guerra, A., Figueredo, G. P., Von Zuben, F., Marti, E., Twycross, J., & Alcocer, M. J. (2019). Microarray Feature Selection and Dynamic Selection of Classifiers for Early Detection of Insect Bite Hypersensitivity in Horses. In 2019 IEEE Congress on Evolutionary Computation (CEC) (1157-1164). https://doi.org/10.1109/CEC.2019.8790319

Microarrays can be employed to better characterise allergies, as interactions between antibodies and allergens in mammals can be monitored. Once the joint dynamics of these elements in both healthy and diseased animals are understood, a model to pred... Read More about Microarray Feature Selection and Dynamic Selection of Classifiers for Early Detection of Insect Bite Hypersensitivity in Horses.

A new accuracy measure based on bounded relative error for time series forecasting (2017)
Journal Article
Chen, C., Twycross, J., & Garibaldi, J. M. (2017). A new accuracy measure based on bounded relative error for time series forecasting. PLoS ONE, 12(3), Article e0174202. https://doi.org/10.1371/journal.pone.0174202

Many accuracy measures have been proposed in the past for time series forecasting comparisons. However, many of these measures suffer from one or more issues such as poor resistance to outliers and scale dependence. In this paper, while summarising c... Read More about A new accuracy measure based on bounded relative error for time series forecasting.

Infobiotics workbench: a P systems based tool for systems and synthetic biology (2013)
Book Chapter
Blakes, J., Twycross, J., Konur, S., Romero-Campero, F. J., Krasnogor, N., & Gheorghe, M. (2014). Infobiotics workbench: a P systems based tool for systems and synthetic biology. In Applications of membrane computing in systems and synthetic biology. Springer International Publishing. https://doi.org/10.1007/978-3-319-03191-0_1

This chapter gives an overview of an integrated software suite, the Infobiotics Workbench, which is based on a novel spatial discrete-stochastic P systems modelling framework. The Workbench incorporates three important features, simulation, model che... Read More about Infobiotics workbench: a P systems based tool for systems and synthetic biology.

Hormone transport (2010)
Book Chapter
Kerr, I. D., Carrier, D. J., & Twycross, J. (2010). Hormone transport. In The Plant Plasma Membrane (379-397). Springer. https://doi.org/10.1007/978-3-642-13431-9_17

Hormone transport in plants is a fundamental process governing all aspects of plant development. Identification and functional analysis of plasma membrane proteins, which regulate the import and export of plant hormones, is a requirement if we are to... Read More about Hormone transport.

Stochastic and deterministic multiscale models for systems biology: An auxin-transport case study (2010)
Journal Article
Twycross, J., Band, L. R., Bennett, M. J., King, J. R., & Krasnogor, N. (2010). Stochastic and deterministic multiscale models for systems biology: An auxin-transport case study. BMC Systems Biology, 4, https://doi.org/10.1186/1752-0509-4-34

Background: Stochastic and asymptotic methods are powerful tools in developing multiscale systems biology models; however, little has been done in this context to compare the efficacy of these methods. The majority of current systems biology modellin... Read More about Stochastic and deterministic multiscale models for systems biology: An auxin-transport case study.

Detecting anomalous process behaviour using second generation Artificial Immune Systems (2010)
Journal Article
Twycross, J., Aickelin, U., & Whitbrook, A. (2010). Detecting anomalous process behaviour using second generation Artificial Immune Systems. International Journal of Unconventional Computing, 6(3-4),

Artificial Immune Systems have been successfully applied to a number of problem domains including fault tolerance and data mining, but have been shown to scale poorly when applied to computer intrusion detection despite the fact that the biological i... Read More about Detecting anomalous process behaviour using second generation Artificial Immune Systems.

Modular assembly of cell systems biology models using P systems (2009)
Presentation / Conference Contribution
Romero-Campero, F. J., Twycross, J., Camara, M., Bennett, M., Gheorghe, M., & Krasnogor, N. (2009). Modular assembly of cell systems biology models using P systems. International Journal of Foundations of Computer Science, 20(3), 427-442. https://doi.org/10.1142/S0129054109006668

In this paper we propose an extension of a systems/synthetic biology modelling framework based on P systems that explicitly includes modularity. Modularisation in cellular systems can be produced by chemical specificity, spatial localisation and/or t... Read More about Modular assembly of cell systems biology models using P systems.

An Immune Inspired Approach to Anomaly Detection (2008)
Book Chapter
Twycross, J., & Aickelin, U. (2009). An Immune Inspired Approach to Anomaly Detection. In J. N. Gupta, & S. Sharma (Eds.), Handbook of Research on Information Assurance and Security (109-121). IDEAS Publishing

The immune system provides a rich metaphor for computer security: anomaly detection that works in nature should work for machines. However, early artificial immune system approaches for computer security had only limited success. Arguably, this was d... Read More about An Immune Inspired Approach to Anomaly Detection.

'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory' (2005)
Presentation / Conference Contribution
Kim, J., Greensmith, J., Twycross, J., & Aickelin, U. (2005). 'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory'.

The analysis of system calls is one method employed by anomaly detection systems to recognise malicious code execution. Similarities can be drawn between this process and the behaviour of certain cells belonging to the human immune system, and can be... Read More about 'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory'.

'Towards a Conceptual Framework for Innate Immunity' (2005)
Presentation / Conference Contribution
Twycross, J., & Aickelin, U. (2005). 'Towards a Conceptual Framework for Innate Immunity'.

Innate immunity now occupies a central role in immunology. However, artificial immune system models have largely been inspired by adaptive not innate immunity. This paper reviews the biological principles and properties of innate immunity and, adopt... Read More about 'Towards a Conceptual Framework for Innate Immunity'.

Dendritic Cells for Anomaly Detection
Presentation / Conference Contribution
Greensmith, J., Twycross, J., & Aickelin, U. Dendritic Cells for Anomaly Detection.

Artificial immune systems, more specifically the negative selection algorithm, have previously been applied to intrusion detection. The aim of this research is to develop an intrusion detection system based on a novel concept in immunology, the Dan... Read More about Dendritic Cells for Anomaly Detection.

Integrating Innate and Adaptive Immunity for Intrusion Detection
Presentation / Conference Contribution
Tedesco, G., Twycross, J., & Aickelin, U. Integrating Innate and Adaptive Immunity for Intrusion Detection.

Network Intrusion Detection Systems (NIDS) monitor a net- work with the aim of discerning malicious from benign activity on that network. While a wide range of approaches have met varying levels of success, most IDS’s rely on having access to a data... Read More about Integrating Innate and Adaptive Immunity for Intrusion Detection.

Experimenting with Innate Immunity
Presentation / Conference Contribution
Twycross, J., & Aickelin, U. Experimenting with Innate Immunity.

libtissue is a software system for implementing and testing AIS algorithms on real-world computer security problems. AIS algorithms are implemented as a collection of cells, antigen and signals interacting within a tissue compartment. Input data to t... Read More about Experimenting with Innate Immunity.

Information fusion in the immune system
Journal Article
Twycross, J., & Aickelin, U. Information fusion in the immune system. Information Fusion, 11(1), https://doi.org/10.1016/j.inffus.2009.04.008

Biologically-inspired methods such as evolutionary algorithms and neural networks are proving useful in the field of information fusion. Artificial immune systems (AISs) are a biologically-inspired approach which take inspiration from the biological... Read More about Information fusion in the immune system.