Skip to main content

Research Repository

Advanced Search

All Outputs (16)

Automatically Labeling Cyber Threat Intelligence reports using Natural Language Processing (2023)
Conference Proceeding
Abdi, H., Bagley, S. R., Furnell, S., & Twycross, J. (2023). Automatically Labeling Cyber Threat Intelligence reports using Natural Language Processing. In DocEng ’23 : Proceedings of the 2023 ACM Symposium on Document Engineering. https://doi.org/10.1145/3573128.3609348

Attribution provides valuable intelligence in the face of Advanced Persistent Threat (APT) attacks. By accurately identifying the culprits and actors behind the attacks, we can gain more insights into their motivations, capabilities, and potential fu... Read More about Automatically Labeling Cyber Threat Intelligence reports using Natural Language Processing.

Microarray Feature Selection and Dynamic Selection of Classifiers for Early Detection of Insect Bite Hypersensitivity in Horses (2019)
Conference Proceeding
Maciel Guerra, A., Figueredo, G. P., Von Zuben, F., Marti, E., Twycross, J., & Alcocer, M. J. (2019). Microarray Feature Selection and Dynamic Selection of Classifiers for Early Detection of Insect Bite Hypersensitivity in Horses. In 2019 IEEE Congress on Evolutionary Computation (CEC) (1157-1164). https://doi.org/10.1109/CEC.2019.8790319

Microarrays can be employed to better characterise allergies, as interactions between antibodies and allergens in mammals can be monitored. Once the joint dynamics of these elements in both healthy and diseased animals are understood, a model to pred... Read More about Microarray Feature Selection and Dynamic Selection of Classifiers for Early Detection of Insect Bite Hypersensitivity in Horses.

From clusters to queries: exploiting uncertainty in the modularity landscape of complex networks (2018)
Conference Proceeding
Gilbert, J. P., & Twycross, J. (2018). From clusters to queries: exploiting uncertainty in the modularity landscape of complex networks.

Uncovering latent community structure in complex networks is a field that has received an enormous amount of attention. Unfortunately, whilst potentially very powerful, unsupervised methods for uncovering labels based on topology alone has been shown... Read More about From clusters to queries: exploiting uncertainty in the modularity landscape of complex networks.

Type-1 and interval type-2 ANFIS: a comparison (2017)
Conference Proceeding
Chen, C., John, R., Twycross, J., & Garibaldi, J. M. (2017). Type-1 and interval type-2 ANFIS: a comparison.

In a previous paper, we proposed an extended ANFIS architecture and showed that interval type-2 ANFIS produced larger errors than type-1 ANFIS on the well-known IRIS classification problem. In this paper, more experiments on both synthetic and real-w... Read More about Type-1 and interval type-2 ANFIS: a comparison.

An extended ANFIS architecture and its learning properties for type-1 and interval type-2 models (2016)
Conference Proceeding
Chen, C., John, R., Twycross, J., & Garibaldi, J. M. (2016). An extended ANFIS architecture and its learning properties for type-1 and interval type-2 models.

In this paper, an extended ANFIS architecture is proposed. By incorporating an extra layer for the fuzzification process, the extended architecture is able to fit both type-1 and interval type-2 models. The learning properties of the proposed archite... Read More about An extended ANFIS architecture and its learning properties for type-1 and interval type-2 models.

'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory' (2005)
Conference Proceeding
Kim, J., Greensmith, J., Twycross, J., & Aickelin, U. (2005). 'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory'.

The analysis of system calls is one method employed by anomaly detection systems to recognise malicious code execution. Similarities can be drawn between this process and the behaviour of certain cells belonging to the human immune system, and can be... Read More about 'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory'.

Immune System Approaches to Intrusion Detection - A Review (ICARIS) (2004)
Conference Proceeding
Aickelin, U., Greensmith, J., & Twycross, J. (2004). Immune System Approaches to Intrusion Detection - A Review (ICARIS). In Artificial Immune Systems: Third International Conference, ICARIS 2004, Catania, Sicily, Italy, September 13-16, 2004. Proceedings. https://doi.org/10.1007/978-3-540-30220-9_26

The use of artificial immune systems in intrusion detection is an appealing concept for two reasons. Firstly, the human immune system provides the human body with a high level of protection from invading pathogens, in a robust, self-organised and dis... Read More about Immune System Approaches to Intrusion Detection - A Review (ICARIS).

'Immune System Approaches to Intrusion Detection - A Review' (2004)
Conference Proceeding
Aickelin, U., Greensmith, J., & Twycross, J. (2004). 'Immune System Approaches to Intrusion Detection - A Review'.

Abstract. The use of artificial immune systems in intrusion detection is an appealing concept for two reasons. Firstly, the human immune system provides the human body with a high level of protection from invading pathogens, in a robust, s... Read More about 'Immune System Approaches to Intrusion Detection - A Review'.

Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems' (2004)
Conference Proceeding
Greensmith, J., Aickelin, U., & Twycross, J. (2004). Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems'.

INTRODUCTION In recent years computer systems have become increasingly complex and consequently the challenge of protecting these systems has become increasingly difficult. Various techniques have been implemented to counteract the misuse of com... Read More about Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems'.

Articulation and Clarification of the Dendric Cell Algorithm
Conference Proceeding
Greensmith, J., Aickelin, U., & Twycross, J. Articulation and Clarification of the Dendric Cell Algorithm.

The Dendritic Cell algorithm (DCA) is inspired by recent work in innate immunity. In this paper a formal description of the DCA is given. The DCA is described in detail, and its use as an anomaly detector is illustrated within the context of compute... Read More about Articulation and Clarification of the Dendric Cell Algorithm.

Integrating Innate and Adaptive Immunity for Intrusion Detection
Conference Proceeding
Tedesco, G., Twycross, J., & Aickelin, U. Integrating Innate and Adaptive Immunity for Intrusion Detection.

Network Intrusion Detection Systems (NIDS) monitor a net- work with the aim of discerning malicious from benign activity on that network. While a wide range of approaches have met varying levels of success, most IDS’s rely on having access to a data... Read More about Integrating Innate and Adaptive Immunity for Intrusion Detection.

Experimenting with Innate Immunity
Conference Proceeding
Twycross, J., & Aickelin, U. Experimenting with Innate Immunity.

libtissue is a software system for implementing and testing AIS algorithms on real-world computer security problems. AIS algorithms are implemented as a collection of cells, antigen and signals interacting within a tissue compartment. Input data to t... Read More about Experimenting with Innate Immunity.