Research Repository

See what's under the surface


Exploiting the plasticity of primary and secondary response mechanisms in artificial immune systems (2016)
Conference Proceeding
Greensmith, J., Jackson, A. M., & Spendlove, I. (2016). Exploiting the plasticity of primary and secondary response mechanisms in artificial immune systems. In Proceedings of the 2016 on Genetic and Evolutionary Computation Conference Companion - GECCO '16 Companiondoi:10.1145/2908961.2908962

One of the key properties of the human immune system is to detect the presence of pathogens, and as such there are numberous immune algorithm which perform anomaly detection and pattern recognition. An additional facet of the human immune system is t... Read More

Theoretical formulation and analysis of the deterministic dendritic cell algorithm (2013)
Journal Article
Gu, F., Greensmith, J., & Aickelin, U. (2013). Theoretical formulation and analysis of the deterministic dendritic cell algorithm. BioSystems, 111(2), 127-135. doi:10.1016/j.biosystems.2013.01.001

As one of the emerging algorithms in the field of artificial immune systems (AIS), the dendritic cell algorithm (DCA) has been successfully applied to a number of challenging real-world problems. However, one criticism is the lack of a formal definit... Read More

Quiet in class: classification, noise and the dendritic cell algorithm (2011)
Journal Article
Gu, F., Feyereisl, J., Oates, R., Reps, J., Greensmith, J., & Aickelin, U. (2011). Quiet in class: classification, noise and the dendritic cell algorithm. Lecture Notes in Artificial Intelligence, 6825, doi:10.1007/978-3-642-22371-6_17. ISSN 0302-9743

Theoretical analyses of the Dendritic Cell Algorithm (DCA) have yielded several criticisms about its underlying structure and operation. As a result, several alterations and fixes have been suggested in the literature to correct for these findings. A... Read More

Recommending rides: psychometric profiling in the theme park (2010)
Journal Article
Rennick-Egglestone, S., Whitbrook, A., Greensmith, J., Walker, B., Benford, S., Marshall, J., …Rowland, D. (2010). Recommending rides: psychometric profiling in the theme park. doi:10.1145/1902593.1902600

This paper presents a study intended to inform the design of a recommender system for theme park rides. It examines the efficacy of psychometric testing for profiling theme park visitors, with the aim of establishing a set of measures to be included... Read More

Further exploration of the Dendritic Cell Algorithm: antigen multiplier and time windows (2008)
Book
Gu, F., Greensmith, J., & Aickelin, U. (2008). Further exploration of the Dendritic Cell Algorithm: antigen multiplier and time windows. In D. Lee, P. Bentley, & S. Jung (Eds.), Artificial immune systems: 7th international conference, ICARIS 2008, Phuket, Thailand, August 10-13, 2008: proceedingsSpringer

As an immune-inspired algorithm, the Dendritic Cell Algorithm (DCA), produces promising performance in the field of anomaly detection. This paper presents the application of the DCA to a standard data set, the KDD 99 data set. The results of differen... Read More

Immune system approaches to intrusion detection - a review (2007)
Journal Article
Kim, J., Bentley, P., Aickelin, U., Greensmith, J., Tedesco, G., & Twycross, J. (2007). Immune system approaches to intrusion detection - a review. Natural Computing, 6(4), 413-466

The use of artificial immune systems in intrusion detection is an appealing concept for two reasons. Firstly, the human immune system provides the human body with a high level of protection from invading pathogens, in a robust, self-organised and dis... Read More

'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory' (2005)
Conference Proceeding
Kim, J., Greensmith, J., Twycross, J., & Aickelin, U. (2005). 'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory'

The analysis of system calls is one method employed by anomaly detection systems to recognise malicious code execution. Similarities can be drawn between this process and the behaviour of certain cells belonging to the human immune system, and can be... Read More

'Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection' (2005)
Conference Proceeding
Greensmith, J., Aickelin, U., & Cayzer, S. (2005). 'Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection'

Abstract. Dendritic cells are antigen presenting cells that provide a vital link between the innate and adaptive immune system. Research into this family of cells has revealed that they perform the role of coordinating T-cell based immune responses,... Read More

Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems' (2004)
Conference Proceeding
Greensmith, J., Aickelin, U., & Twycross, J. (2004). Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems'

INTRODUCTION In recent years computer systems have become increasingly complex and consequently the challenge of protecting these systems has become increasingly difficult. Various techniques have been implemented to counteract the misuse of com... Read More