Skip to main content

Research Repository

Advanced Search

All Outputs (7)

Artificial immune systems (2005)
Book Chapter
Aickelin, U., & Dasgupta, D. (2005). Artificial immune systems. In E. K. Burke, & G. Kendall (Eds.), Search Methodologies : Introductory Tutorials in Optimisation, Decision Support Techniques. Springer. https://doi.org/10.1007/0-387-28356-0

The biological immune system is a robust, complex, adaptive system that defends the body from foreign pathogens. It is able to categorize all cells (or molecules) within the body as self-cells or non-self cells. It does this with the help of a distri... Read More about Artificial immune systems.

A Recommender System based on Idiotypic Artificial Immune Networks (2005)
Journal Article
Cayzer, S., & Aickelin, U. (2005). A Recommender System based on Idiotypic Artificial Immune Networks. https://doi.org/10.1007/s10852-004-5336-7

The immune system is a complex biological system with a highly distributed, adaptive and self-organising nature. This paper presents an Artificial Immune System (AIS) that exploits some of these characteristics and is applied to the task of film reco... Read More about A Recommender System based on Idiotypic Artificial Immune Networks.

'Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection' (2005)
Conference Proceeding
Greensmith, J., Aickelin, U., & Cayzer, S. (2005). 'Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection'.

Abstract. Dendritic cells are antigen presenting cells that provide a vital link between the innate and adaptive immune system. Research into this family of cells has revealed that they perform the role of coordinating T-cell based immune responses,... Read More about 'Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection'.

'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory' (2005)
Conference Proceeding
Kim, J., Greensmith, J., Twycross, J., & Aickelin, U. (2005). 'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory'.

The analysis of system calls is one method employed by anomaly detection systems to recognise malicious code execution. Similarities can be drawn between this process and the behaviour of certain cells belonging to the human immune system, and can be... Read More about 'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory'.

'Cooperative Automated worm Response and Detection ImmuNe ALgorithm (CARDINAL) inspired by T-cell Immunity and Tolerance' (2005)
Conference Proceeding
Kim, J., Wilson, W., Aickelin, U., & McLeod, J. (2005). 'Cooperative Automated worm Response and Detection ImmuNe ALgorithm (CARDINAL) inspired by T-cell Immunity and Tolerance'.

The role of T-cells within the immune system is to confirm and assess anomalous situations and then either respond to or tolerate the source of the effect. To illustrate how these mechanisms can be harnessed to solve real-world problems, we present t... Read More about 'Cooperative Automated worm Response and Detection ImmuNe ALgorithm (CARDINAL) inspired by T-cell Immunity and Tolerance'.

Strategic Alert Throttling for Intrusion Detection Systems (2005)
Conference Proceeding
Tedesco, G., & Aickelin, U. (2005). Strategic Alert Throttling for Intrusion Detection Systems.

Network intrusion detection systems are themselves becoming targets of attackers. Alert flood attacks may be used to conceal malicious activity by hiding it among a deluge of false alerts sent by the attacker. Although these types of attacks are ver... Read More about Strategic Alert Throttling for Intrusion Detection Systems.