Skip to main content

Research Repository

Advanced Search

All Outputs (8)

An Immune Inspired Approach to Anomaly Detection (2008)
Book Chapter
Twycross, J., & Aickelin, U. (2009). An Immune Inspired Approach to Anomaly Detection. In Handbook of Research on Information Assurance and Security (109-121). IDEAS Publishing

The immune system provides a rich metaphor for computer security: anomaly detection that works in nature should work for machines. However, early artificial immune system approaches for computer security had only limited success. Arguably, this was d... Read More about An Immune Inspired Approach to Anomaly Detection.

Introduction to Multi-Agent Simulation (2008)
Book Chapter
Siebers, P., & Aickelin, U. (2008). Introduction to Multi-Agent Simulation. In F. Adam, & P. Humphreys (Eds.), Encyclopedia of Decision Making and Decision Support Technologies. IGI Global

When designing systems that are complex, dynamic and stochastic in nature, simulation is generally recognised as one of the best design support technologies, and a valuable aid in the strategic and tactical decision making process. A simulation model... Read More about Introduction to Multi-Agent Simulation.

Adaptive and assortative mating scheme for evolutionary multi-objective algorithms (2008)
Book Chapter
Le, K., & Landa-Silva, D. (2008). Adaptive and assortative mating scheme for evolutionary multi-objective algorithms. In Artificial Evolution: 8th International Conference, Evolution Artificielle, EA 2007, Tours, France, October 29-31, 2007, Revised Selected Papers, (172-183). Springer Verlag. https://doi.org/10.1007/978-3-540-79305-2_15

We are interested in the role of restricted mating schemes in the context of evolutionary multi-objective algorithms. In this paper, we propose an adaptive assortative mating scheme that uses similarity in the decision space (genotypic assortative ma... Read More about Adaptive and assortative mating scheme for evolutionary multi-objective algorithms.

Multi-Agent Simulation and Management Practices (2008)
Book Chapter
Siebers, P., Aickelin, U., Celia, H., & Clegg, C. (2008). Multi-Agent Simulation and Management Practices. In Encyclopedia of Decision Making and Decision Support Technologies. IGI Global

Intelligent agents offer a new and exciting way of understanding the world of work. Agent-Based Simulation (ABS), one way of using intelligent agents, carries great potential for progressing our understanding of management practices and how they link... Read More about Multi-Agent Simulation and Management Practices.

Real-time alert correlation with type graphs (2008)
Book Chapter
Tedesco, G., & Aickelin, U. (2008). Real-time alert correlation with type graphs. In R. Sekar, & A. K. Pujari (Eds.), Information systems security: 4th international conference, ICISS 2008, Hyderabad, India, December 16-20, 2008: proceedings /. Springer

The premise of automated alert correlation is to accept that false alerts from a low level intrusion detection system are inevitable and use attack models to explain the output in an understandable way. Several algorithms exist for this purpose whic... Read More about Real-time alert correlation with type graphs.

Detecting bots based on keylogging activities (2008)
Book Chapter
Al-Hammadi, Y., & Aickelin, U. (2008). Detecting bots based on keylogging activities. In Proceedings of the Third International Conference on Availability, Security, and Reliability: March 4-7, 2008, Barcelona, Spain. Barcelona, Spain: IEEE Computer Society

DCA for bot detection (2008)
Book Chapter
Al-Hammadi, Y., Aickelin, U., & Greensmith, J. (2008). DCA for bot detection. In IEEE Congress on Evolutionary Computation, 2008: CEC 2008. IEEE

Ensuring the security of computers is a non-trivial task, with many techniques used by malicious users to compromise these systems. In recent years a new threat has emerged in the form of networks of hijacked zombie machines used to perform complex d... Read More about DCA for bot detection.

Further exploration of the Dendritic Cell Algorithm: antigen multiplier and time windows (2008)
Book Chapter
Gu, F., Greensmith, J., & Aickelin, U. (2008). Further exploration of the Dendritic Cell Algorithm: antigen multiplier and time windows. In P. Bentley, D. Lee, & S. Jung (Eds.), Artificial immune systems: 7th international conference, ICARIS 2008, Phuket, Thailand, August 10-13, 2008: proceedings. Springer

As an immune-inspired algorithm, the Dendritic Cell Algorithm (DCA), produces promising performance in the field of anomaly detection. This paper presents the application of the DCA to a standard data set, the KDD 99 data set. The results of differen... Read More about Further exploration of the Dendritic Cell Algorithm: antigen multiplier and time windows.