Skip to main content

Research Repository

Advanced Search

All Outputs (19)

The Functional Dendritic Cell Algorithm: A formal specification with Haskell (2017)
Conference Proceeding
Greensmith, J., & Gale, M. B. (2017). The Functional Dendritic Cell Algorithm: A formal specification with Haskell. In Proceedings - 2017 IEEE Congress on Evolutionary Computation (CEC 2017) (1787-1794). https://doi.org/10.1109/CEC.2017.7969518

The Dendritic Cell Algorithm (DCA) has been described in a number of different ways, sometimes resulting in incorrect implementations. We believe this is due to previous, imprecise attempts to describe the algorithm. The main contribution of this pap... Read More about The Functional Dendritic Cell Algorithm: A formal specification with Haskell.

Exploiting the Plasticity of Primary and Secondary Response Mechanisms in Artificial Immune Systems (2016)
Conference Proceeding
Greensmith, J., Jackson, A. M., & Spendlove, I. (2016). Exploiting the Plasticity of Primary and Secondary Response Mechanisms in Artificial Immune Systems. In Proceedings of the 2016 on Genetic and Evolutionary Computation Conference Companion - GECCO '16 Companion (7-8). https://doi.org/10.1145/2908961.2908962

One of the key properties of the human immune system is to detect the presence of pathogens, and as such there are numberous immune algorithm which perform anomaly detection and pattern recognition. An additional facet of the human immune system is t... Read More about Exploiting the Plasticity of Primary and Secondary Response Mechanisms in Artificial Immune Systems.

'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory' (2005)
Conference Proceeding
Kim, J., Greensmith, J., Twycross, J., & Aickelin, U. (2005). 'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory'.

The analysis of system calls is one method employed by anomaly detection systems to recognise malicious code execution. Similarities can be drawn between this process and the behaviour of certain cells belonging to the human immune system, and can be... Read More about 'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory'.

'Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection' (2005)
Conference Proceeding
Greensmith, J., Aickelin, U., & Cayzer, S. (2005). 'Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection'.

Abstract. Dendritic cells are antigen presenting cells that provide a vital link between the innate and adaptive immune system. Research into this family of cells has revealed that they perform the role of coordinating T-cell based immune responses,... Read More about 'Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection'.

Immune System Approaches to Intrusion Detection - A Review (ICARIS) (2004)
Conference Proceeding
Aickelin, U., Greensmith, J., & Twycross, J. (2004). Immune System Approaches to Intrusion Detection - A Review (ICARIS). In Artificial Immune Systems: Third International Conference, ICARIS 2004, Catania, Sicily, Italy, September 13-16, 2004. Proceedings. https://doi.org/10.1007/978-3-540-30220-9_26

The use of artificial immune systems in intrusion detection is an appealing concept for two reasons. Firstly, the human immune system provides the human body with a high level of protection from invading pathogens, in a robust, self-organised and dis... Read More about Immune System Approaches to Intrusion Detection - A Review (ICARIS).

'Immune System Approaches to Intrusion Detection - A Review' (2004)
Conference Proceeding
Aickelin, U., Greensmith, J., & Twycross, J. (2004). 'Immune System Approaches to Intrusion Detection - A Review'.

Abstract. The use of artificial immune systems in intrusion detection is an appealing concept for two reasons. Firstly, the human immune system provides the human body with a high level of protection from invading pathogens, in a robust, s... Read More about 'Immune System Approaches to Intrusion Detection - A Review'.

Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems' (2004)
Conference Proceeding
Greensmith, J., Aickelin, U., & Twycross, J. (2004). Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems'.

INTRODUCTION In recent years computer systems have become increasingly complex and consequently the challenge of protecting these systems has become increasingly difficult. Various techniques have been implemented to counteract the misuse of com... Read More about Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems'.

Integrating real-time analysis with the dendritic cell algorithm through segmentation
Conference Proceeding
Gu, F., Greensmith, J., & Aickelin, U. (in press). Integrating real-time analysis with the dendritic cell algorithm through segmentation.

As an immune inspired algorithm, the Dendritic Cell Algorithm (DCA) has been applied to a range of problems, particularly in the area of intrusion detection. Ideally, the intrusion detection should be performed in real-time, to continuously detect mi... Read More about Integrating real-time analysis with the dendritic cell algorithm through segmentation.

Variance in system dynamics and agent based modelling using the SIR model of infectious diseases
Conference Proceeding
Ahmed, A., Greensmith, J., & Aickelin, U. Variance in system dynamics and agent based modelling using the SIR model of infectious diseases.

Classical deterministic simulations of epidemiological processes, such as those based on System Dynamics, produce a single result based on a fixed set of input parameters with no variance between simulations. Input parameters are subsequently modifie... Read More about Variance in system dynamics and agent based modelling using the SIR model of infectious diseases.

On the role of the AIS practitioner
Conference Proceeding
Hart, E., Read, M., McEwan, C., Aickelin, U., & Greensmith, J. On the role of the AIS practitioner.

Cognisant of the gulf between engineers and immunologists that currenty hinders a truly inter-disciplinary approach to the field of Artificial Immune Systems (AIS), we propose a redefinition of the term AIS practitioner, as an individual who ident... Read More about On the role of the AIS practitioner.

PCA 4 DCA: the application of principal component analysis to the Dendritic Cell Algorithm
Conference Proceeding
Gu, F., Greensmith, J., Oates, R., & Aickelin, U. PCA 4 DCA: the application of principal component analysis to the Dendritic Cell Algorithm.

As one of the newest members in the field of articial immune systems (AIS), the Dendritic Cell Algorithm (DCA) is based on behavioural models of natural dendritic cells (DCs). Unlike other AIS, the DCA does not rely on training data, instead domain... Read More about PCA 4 DCA: the application of principal component analysis to the Dendritic Cell Algorithm.

An Agent-based Classification Model
Conference Proceeding
Gu, F., Aickelin, U., & Greensmith, J. An Agent-based Classification Model.

The major function of this model is to access the UCI Wisconsin Breast Cancer data-set[1] and classify the data items into two categories, which are normal and anomalous. This kind of classification can be referred as anomaly detection, which discri... Read More about An Agent-based Classification Model.

The Application of a Dendric Cell Algorithm to a Robotic Classifier
Conference Proceeding
Oates, R., Greensmith, J., Aickelin, U., Garibaldi, J., & Kendall, G. The Application of a Dendric Cell Algorithm to a Robotic Classifier.

The dendritic cell algorithm is an immune-inspired technique for processing time-dependant data. Here we propose it as a possible solution for a robotic classification problem. The dendritic cell algorithm is implemented on a real robot and an invest... Read More about The Application of a Dendric Cell Algorithm to a Robotic Classifier.

Articulation and Clarification of the Dendric Cell Algorithm
Conference Proceeding
Greensmith, J., Aickelin, U., & Twycross, J. Articulation and Clarification of the Dendric Cell Algorithm.

The Dendritic Cell algorithm (DCA) is inspired by recent work in innate immunity. In this paper a formal description of the DCA is given. The DCA is described in detail, and its use as an anomaly detector is illustrated within the context of compute... Read More about Articulation and Clarification of the Dendric Cell Algorithm.

Introducting Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection
Conference Proceeding
Greensmith, J., Aickelin, U., & Cayzer, S. Introducting Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection.

Dendritic cells are antigen presenting cells that provide a vital link between the innate and adaptive immune system. Research into this family of cells has revealed that they perform the role of coordinating T-cell based immune responses, both reac... Read More about Introducting Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection.