Skip to main content

Research Repository

Advanced Search

All Outputs (29)

Stromal fibroblasts support dendritic cells to maintain IL-23/Th17 responses after exposure to ionizing radiation (2016)
Journal Article
Malecka, A., Wang, O., Shah, S., Sutavani, R. V., Spendlove, I., Ramage, J. M., …Jackson, A. M. (2016). Stromal fibroblasts support dendritic cells to maintain IL-23/Th17 responses after exposure to ionizing radiation. Journal of Leukocyte Biology, 100(2), 381-389. https://doi.org/10.1189/jlb.3A1015-474R

Dendritic cell function is modulated by stromal cells, including fibroblasts. Although poorly understood, the signals delivered through this crosstalk substantially alter dendritic cell biology. This is well illustrated with release of TNF-0/IL-113 f... Read More about Stromal fibroblasts support dendritic cells to maintain IL-23/Th17 responses after exposure to ionizing radiation.

Theoretical formulation and analysis of the deterministic dendritic cell algorithm (2013)
Journal Article
Gu, F., Greensmith, J., & Aickelin, U. (2013). Theoretical formulation and analysis of the deterministic dendritic cell algorithm. BioSystems, 111(2), 127-135. https://doi.org/10.1016/j.biosystems.2013.01.001

As one of the emerging algorithms in the field of artificial immune systems (AIS), the dendritic cell algorithm (DCA) has been successfully applied to a number of challenging real-world problems. However, one criticism is the lack of a formal definit... Read More about Theoretical formulation and analysis of the deterministic dendritic cell algorithm.

The dendritic cell algorithm for intrusion detection (2012)
Book Chapter
Gu, F., Greensmith, J., & Aickelin, U. (2012). The dendritic cell algorithm for intrusion detection. In P. Lio, & D. Verma (Eds.), Biologically inspired networking and sensing : algorithms and architectures. IGI Global

As one of the solutions to intrusion detection problems, Artificial Immune Systems (AIS) have shown their advantages. Unlike genetic algorithms, there is no one archetypal AIS, instead there are four major paradigms. Among them, the Dendritic Cell Al... Read More about The dendritic cell algorithm for intrusion detection.

Quiet in class: classification, noise and the dendritic cell algorithm (2011)
Journal Article
Gu, F., Feyereisl, J., Oates, R., Reps, J., Greensmith, J., & Aickelin, U. (2011). Quiet in class: classification, noise and the dendritic cell algorithm. Lecture Notes in Artificial Intelligence, 6825, https://doi.org/10.1007/978-3-642-22371-6_17

Theoretical analyses of the Dendritic Cell Algorithm (DCA) have yielded several criticisms about its underlying structure and operation. As a result, several alterations and fixes have been suggested in the literature to correct for these findings. A... Read More about Quiet in class: classification, noise and the dendritic cell algorithm.

Recommending rides: psychometric profiling in the theme park (2010)
Journal Article
Rennick-Egglestone, S., Whitbrook, A., Greensmith, J., Walker, B., Benford, S., Marshall, J., …Rowland, D. (2010). Recommending rides: psychometric profiling in the theme park. https://doi.org/10.1145/1902593.1902600

This paper presents a study intended to inform the design of a recommender system for theme park rides. It examines the efficacy of psychometric testing for profiling theme park visitors, with the aim of establishing a set of measures to be included... Read More about Recommending rides: psychometric profiling in the theme park.

Artificial immune systems (2010)
Book Chapter
Greensmith, J., Whitbrook, A., & Aickelin, U. (2010). Artificial immune systems. In M. Gendreau, & J.-Y. Potvin (Eds.), Handbook of metaheuristics. Springer

The human immune system has numerous properties that make it ripe for exploitation in the computational domain, such as robustness and fault tolerance, and many different algorithms, collectively termed Artificial Immune Systems
(AIS), have been ins... Read More about Artificial immune systems.

Information Fusion for Anomaly Detection with the Dendritic Cell Algorithm (2009)
Journal Article
Greensmith, J., Aickelin, U., & Tedesco, G. (2010). Information Fusion for Anomaly Detection with the Dendritic Cell Algorithm. Information Fusion, 11(1), 21-34. https://doi.org/10.1016/j.inffus.2009.04.006

Dendritic cells are antigen presenting cells that provide a vital link between the innate and adaptive immune system, providing the initial detection of pathogenic invaders. Research into this family of cells has revealed that they
perform informati... Read More about Information Fusion for Anomaly Detection with the Dendritic Cell Algorithm.

Exploration of the dendritic cell algorithm with the duration calculus (2009)
Book Chapter
Gu, F., Greensmith, J., & Aickelin, U. (2009). Exploration of the dendritic cell algorithm with the duration calculus. In P. S. Andrews, J. Timmis, N. D. Owens, U. Aickelin, E. Hart, A. Hone, & A. M. Tyrrell (Eds.), Artificial immune systems: 8th international conference, ICARIS 2009, York, UK, August 9-12, 2009: proceedings. Springer. https://doi.org/10.2139/ssrn.2830323

As one of the newest members in Articial Immune Systems
(AIS), the Dendritic Cell Algorithm (DCA) has been applied to a range of problems. These applications mainly belong to the eld of anomaly detection. However, real-time detection, a new challeng... Read More about Exploration of the dendritic cell algorithm with the duration calculus.

Further exploration of the Dendritic Cell Algorithm: antigen multiplier and time windows (2008)
Book Chapter
Gu, F., Greensmith, J., & Aickelin, U. (2008). Further exploration of the Dendritic Cell Algorithm: antigen multiplier and time windows. In P. Bentley, D. Lee, & S. Jung (Eds.), Artificial immune systems: 7th international conference, ICARIS 2008, Phuket, Thailand, August 10-13, 2008: proceedings. Springer

As an immune-inspired algorithm, the Dendritic Cell Algorithm (DCA), produces promising performance in the field of anomaly detection. This paper presents the application of the DCA to a standard data set, the KDD 99 data set. The results of differen... Read More about Further exploration of the Dendritic Cell Algorithm: antigen multiplier and time windows.

Articulation and Clarification of the Dendritic Cell Algorithm (2006)
Book Chapter
Greensmith, J., Aickelin, U., & Twycross, J. (2006). Articulation and Clarification of the Dendritic Cell Algorithm. In Artificial Immune Systems: 5th International Conference, ICARIS 2006, Oeiras, Portugal, September 4-6, 2006. Proceedings. Springer. https://doi.org/10.1007/11823940_31

The Dendritic Cell algorithm (DCA) is inspired by recent work in innate immunity. In this paper a formal description of the DCA is given. The DCA is described in detail, and its use as an anomaly detector is illustrated within the context of computer... Read More about Articulation and Clarification of the Dendritic Cell Algorithm.

'Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection' (2005)
Presentation / Conference Contribution
Greensmith, J., Aickelin, U., & Cayzer, S. 'Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection'. Presented at ICARIS-2005, 4th International Conference on Artificial Immune Systems, LNCS 3627

Abstract. Dendritic cells are antigen presenting cells that provide a vital link between the innate and adaptive immune system. Research into this family of cells has revealed that they perform the role of coordinating T-cell based immune responses,... Read More about 'Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection'.

'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory' (2005)
Presentation / Conference Contribution
Kim, J., Greensmith, J., Twycross, J., & Aickelin, U. 'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory'. Presented at Adaptive and Resilient Computing Security Workshop (ARCS-05)

The analysis of system calls is one method employed by anomaly detection systems to recognise malicious code execution. Similarities can be drawn between this process and the behaviour of certain cells belonging to the human immune system, and can be... Read More about 'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory'.

Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems' (2004)
Presentation / Conference Contribution
Greensmith, J., Aickelin, U., & Twycross, J. Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems'. Presented at 6th International Conference in Adaptive Computing in Design and Manufacture

INTRODUCTION

In recent years computer systems have become increasingly complex and consequently the challenge of protecting these systems has become
increasingly difficult. Various techniques have been implemented to counteract the misuse of com... Read More about Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems'.

The Functional Dendritic Cell Algorithm: A formal specification with Haskell
Presentation / Conference Contribution
Greensmith, J., & Gale, M. B. (2017, June). The Functional Dendritic Cell Algorithm: A formal specification with Haskell. Presented at 2017 IEEE Congress on Evolutionary Computation (CEC), Donostia, San Sebastián, Spain

The Dendritic Cell Algorithm (DCA) has been described in a number of different ways, sometimes resulting in incorrect implementations. We believe this is due to previous, imprecise attempts to describe the algorithm. The main contribution of this pap... Read More about The Functional Dendritic Cell Algorithm: A formal specification with Haskell.

Immune System Approaches to Intrusion Detection - A Review (ICARIS)
Presentation / Conference Contribution
Aickelin, U., Greensmith, J., & Twycross, J. (2004, September). Immune System Approaches to Intrusion Detection - A Review (ICARIS). Presented at Artificial Immune Systems, Sicily, Italy

The use of artificial immune systems in intrusion detection is an appealing concept for two reasons. Firstly, the human immune system provides the human body with a high level of protection from invading pathogens, in a robust, self-organised and dis... Read More about Immune System Approaches to Intrusion Detection - A Review (ICARIS).

Exploiting the Plasticity of Primary and Secondary Response Mechanisms in Artificial Immune Systems
Presentation / Conference Contribution
Greensmith, J., Jackson, A. M., & Spendlove, I. (2016, July). Exploiting the Plasticity of Primary and Secondary Response Mechanisms in Artificial Immune Systems. Presented at GECCO '16 Companion 2016 on Genetic and Evolutionary Computation Conference Companion, Denver, Colorado, USA

One of the key properties of the human immune system is to detect the presence of pathogens, and as such there are numberous immune algorithm which perform anomaly detection and pattern recognition. An additional facet of the human immune system is t... Read More about Exploiting the Plasticity of Primary and Secondary Response Mechanisms in Artificial Immune Systems.

Introducting Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection
Presentation / Conference Contribution
Greensmith, J., Aickelin, U., & Cayzer, S. Introducting Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection.

Dendritic cells are antigen presenting cells that provide a
vital link between the innate and adaptive immune system. Research into this family of cells has revealed that they perform the role of coordinating T-cell based immune responses, both reac... Read More about Introducting Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection.

Dendritic Cells for Anomaly Detection
Presentation / Conference Contribution
Greensmith, J., Twycross, J., & Aickelin, U. Dendritic Cells for Anomaly Detection.

Artificial immune systems, more specifically the negative selection algorithm, have previously been applied to intrusion detection. The aim of this research is to develop
an intrusion detection system based on a novel concept in
immunology, the Dan... Read More about Dendritic Cells for Anomaly Detection.