Skip to main content

Research Repository

Advanced Search

JAMIE TWYCROSS's Outputs (22)

Automatically Labeling Cyber Threat Intelligence reports using Natural Language Processing (2023)
Presentation / Conference Contribution
Abdi, H., Bagley, S. R., Furnell, S., & Twycross, J. (2023). Automatically Labeling Cyber Threat Intelligence reports using Natural Language Processing. In DocEng ’23 : Proceedings of the 2023 ACM Symposium on Document Engineering. https://doi.org/10.1145/3573128.3609348

Attribution provides valuable intelligence in the face of Advanced Persistent Threat (APT) attacks. By accurately identifying the culprits and actors behind the attacks, we can gain more insights into their motivations, capabilities, and potential fu... Read More about Automatically Labeling Cyber Threat Intelligence reports using Natural Language Processing.

A Comprehensive Study of the Efficiency of Type-Reduction Algorithms (2020)
Journal Article
Chen, C., Wu, D., Garibaldi, J. M., John, R. I., Twycross, J., & Mendel, J. M. (2021). A Comprehensive Study of the Efficiency of Type-Reduction Algorithms. IEEE Transactions on Fuzzy Systems, 29(6), 1556 -1566. https://doi.org/10.1109/tfuzz.2020.2981002

Improving the efficiency of type-reduction algorithms continues to attract research interest. Recently, there have been some new type-reduction approaches claiming that they are more efficient than the well-known algorithms such as the enhanced Karni... Read More about A Comprehensive Study of the Efficiency of Type-Reduction Algorithms.

Modelling Emerging Pollutants in Wastewater Treatment: A Case Study using the Pharmaceutical 17α−ethinylestradiol (2019)
Journal Article
Acheampong, E., Dryden, I. L., Wattis, J. A., Twycross, J., Scrimshaw, M. D., & Gomes, R. L. (2019). Modelling Emerging Pollutants in Wastewater Treatment: A Case Study using the Pharmaceutical 17α−ethinylestradiol. Computers and Chemical Engineering, 128, 477-487. https://doi.org/10.1016/j.compchemeng.2019.06.020

Mathematical modelling can play a key role in understanding as well as quantifying uncertainties surrounding the presence and fate of emerging pollutants in wastewater treatment processes (WWTPs). This paper presents for the first time a simplified e... Read More about Modelling Emerging Pollutants in Wastewater Treatment: A Case Study using the Pharmaceutical 17α−ethinylestradiol.

Microarray Feature Selection and Dynamic Selection of Classifiers for Early Detection of Insect Bite Hypersensitivity in Horses (2019)
Presentation / Conference Contribution
Maciel Guerra, A., Figueredo, G. P., Von Zuben, F., Marti, E., Twycross, J., & Alcocer, M. J. (2019). Microarray Feature Selection and Dynamic Selection of Classifiers for Early Detection of Insect Bite Hypersensitivity in Horses. In 2019 IEEE Congress on Evolutionary Computation (CEC) (1157-1164). https://doi.org/10.1109/CEC.2019.8790319

Microarrays can be employed to better characterise allergies, as interactions between antibodies and allergens in mammals can be monitored. Once the joint dynamics of these elements in both healthy and diseased animals are understood, a model to pred... Read More about Microarray Feature Selection and Dynamic Selection of Classifiers for Early Detection of Insect Bite Hypersensitivity in Horses.

A new accuracy measure based on bounded relative error for time series forecasting (2017)
Journal Article
Chen, C., Twycross, J., & Garibaldi, J. M. (2017). A new accuracy measure based on bounded relative error for time series forecasting. PLoS ONE, 12(3), Article e0174202. https://doi.org/10.1371/journal.pone.0174202

Many accuracy measures have been proposed in the past for time series forecasting comparisons. However, many of these measures suffer from one or more issues such as poor resistance to outliers and scale dependence. In this paper, while summarising c... Read More about A new accuracy measure based on bounded relative error for time series forecasting.

Identification of gene modules associated with low temperatures response in Bambara groundnut by network-based analysis (2016)
Journal Article
Bonthala, V. S., Mayes, S., Moreton, J., Blythe, M. J., Wright, V., May, S., Massawe, F., Mayes, S., & Twycross, J. (2016). Identification of gene modules associated with low temperatures response in Bambara groundnut by network-based analysis. PLoS ONE, 11(2), Article e0148771. https://doi.org/10.1371/journal.pone.0148771

Bambara groundnut (Vigna subterranea (L.) Verdc.) is an African legume and is a promising underutilized crop with good seed nutritional values. Low temperature stress in a number of African countries at night, such as Botswana, can effect the growth... Read More about Identification of gene modules associated with low temperatures response in Bambara groundnut by network-based analysis.

Infobiotics workbench: a P systems based tool for systems and synthetic biology (2013)
Book Chapter
Blakes, J., Twycross, J., Konur, S., Romero-Campero, F. J., Krasnogor, N., & Gheorghe, M. (2014). Infobiotics workbench: a P systems based tool for systems and synthetic biology. In Applications of membrane computing in systems and synthetic biology. Springer International Publishing. https://doi.org/10.1007/978-3-319-03191-0_1

This chapter gives an overview of an integrated software suite, the Infobiotics Workbench, which is based on a novel spatial discrete-stochastic P systems modelling framework. The Workbench incorporates three important features, simulation, model che... Read More about Infobiotics workbench: a P systems based tool for systems and synthetic biology.

Hormone transport (2010)
Book Chapter
Kerr, I. D., Carrier, D. J., & Twycross, J. (2010). Hormone transport. In The Plant Plasma Membrane (379-397). Springer. https://doi.org/10.1007/978-3-642-13431-9_17

Hormone transport in plants is a fundamental process governing all aspects of plant development. Identification and functional analysis of plasma membrane proteins, which regulate the import and export of plant hormones, is a requirement if we are to... Read More about Hormone transport.

Stochastic and deterministic multiscale models for systems biology: An auxin-transport case study (2010)
Journal Article
Twycross, J., Band, L. R., Bennett, M. J., King, J. R., & Krasnogor, N. (2010). Stochastic and deterministic multiscale models for systems biology: An auxin-transport case study. BMC Systems Biology, 4, https://doi.org/10.1186/1752-0509-4-34

Background: Stochastic and asymptotic methods are powerful tools in developing multiscale systems biology models; however, little has been done in this context to compare the efficacy of these methods. The majority of current systems biology modellin... Read More about Stochastic and deterministic multiscale models for systems biology: An auxin-transport case study.

Detecting anomalous process behaviour using second generation Artificial Immune Systems (2010)
Journal Article
Twycross, J., Aickelin, U., & Whitbrook, A. (2010). Detecting anomalous process behaviour using second generation Artificial Immune Systems. International Journal of Unconventional Computing, 6(3-4),

Artificial Immune Systems have been successfully applied to a number of problem domains including fault tolerance and data mining, but have been shown to scale poorly when applied to computer intrusion detection despite the fact that the biological i... Read More about Detecting anomalous process behaviour using second generation Artificial Immune Systems.

Modular assembly of cell systems biology models using P systems (2009)
Presentation / Conference Contribution
Romero-Campero, F. J., Twycross, J., Camara, M., Bennett, M., Gheorghe, M., & Krasnogor, N. (2008, June). Modular assembly of cell systems biology models using P systems. Presented at Prague International Workshop on Membrane Computing, Prague, Czech Republic

In this paper we propose an extension of a systems/synthetic biology modelling framework based on P systems that explicitly includes modularity. Modularisation in cellular systems can be produced by chemical specificity, spatial localisation and/or t... Read More about Modular assembly of cell systems biology models using P systems.

An Immune Inspired Approach to Anomaly Detection (2008)
Book Chapter
Twycross, J., & Aickelin, U. (2009). An Immune Inspired Approach to Anomaly Detection. In J. N. Gupta, & S. Sharma (Eds.), Handbook of Research on Information Assurance and Security (109-121). IDEAS Publishing

The immune system provides a rich metaphor for computer security: anomaly detection that works in nature should work for machines. However, early artificial immune system approaches for computer security had only limited success. Arguably, this was d... Read More about An Immune Inspired Approach to Anomaly Detection.

'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory' (2005)
Presentation / Conference Contribution
Kim, J., Greensmith, J., Twycross, J., & Aickelin, U. 'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory'. Presented at Adaptive and Resilient Computing Security Workshop (ARCS-05)

The analysis of system calls is one method employed by anomaly detection systems to recognise malicious code execution. Similarities can be drawn between this process and the behaviour of certain cells belonging to the human immune system, and can be... Read More about 'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory'.

'Towards a Conceptual Framework for Innate Immunity' (2005)
Presentation / Conference Contribution
Twycross, J., & Aickelin, U. (2005). 'Towards a Conceptual Framework for Innate Immunity'.

Innate immunity now occupies a central role in immunology. However, artificial immune system models have largely been inspired by adaptive not innate immunity. This paper reviews the biological principles and properties of innate immunity and, adopt... Read More about 'Towards a Conceptual Framework for Innate Immunity'.

Immune System Approaches to Intrusion Detection - A Review (ICARIS) (2004)
Presentation / Conference Contribution
Aickelin, U., Greensmith, J., & Twycross, J. (2004, September). Immune System Approaches to Intrusion Detection - A Review (ICARIS). Presented at Artificial Immune Systems, Sicily, Italy

The use of artificial immune systems in intrusion detection is an appealing concept for two reasons. Firstly, the human immune system provides the human body with a high level of protection from invading pathogens, in a robust, self-organised and dis... Read More about Immune System Approaches to Intrusion Detection - A Review (ICARIS).

Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems' (2004)
Presentation / Conference Contribution
Greensmith, J., Aickelin, U., & Twycross, J. Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems'. Presented at 6th International Conference in Adaptive Computing in Design and Manufacture

INTRODUCTION

In recent years computer systems have become increasingly complex and consequently the challenge of protecting these systems has become
increasingly difficult. Various techniques have been implemented to counteract the misuse of com... Read More about Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems'.

Information fusion in the immune system
Journal Article
Twycross, J., & Aickelin, U. Information fusion in the immune system. Information Fusion, 11(1), https://doi.org/10.1016/j.inffus.2009.04.008

Biologically-inspired methods such as evolutionary algorithms and neural networks are proving useful in
the field of information fusion. Artificial immune systems (AISs) are a biologically-inspired approach which take inspiration from the biological... Read More about Information fusion in the immune system.

Experimenting with Innate Immunity
Presentation / Conference Contribution
Twycross, J., & Aickelin, U. Experimenting with Innate Immunity.

libtissue is a software system for implementing and testing AIS algorithms on real-world computer security problems. AIS algorithms are implemented as a collection of cells, antigen and signals interacting within a tissue compartment. Input data to t... Read More about Experimenting with Innate Immunity.

Integrating Innate and Adaptive Immunity for Intrusion Detection
Presentation / Conference Contribution
Tedesco, G., Twycross, J., & Aickelin, U. Integrating Innate and Adaptive Immunity for Intrusion Detection.

Network Intrusion Detection Systems (NIDS) monitor a net-
work with the aim of discerning malicious from benign activity on that network. While a wide range of approaches have met varying levels of success, most IDS’s rely on having access to a data... Read More about Integrating Innate and Adaptive Immunity for Intrusion Detection.

Dendritic Cells for Anomaly Detection
Presentation / Conference Contribution
Greensmith, J., Twycross, J., & Aickelin, U. Dendritic Cells for Anomaly Detection.

Artificial immune systems, more specifically the negative selection algorithm, have previously been applied to intrusion detection. The aim of this research is to develop
an intrusion detection system based on a novel concept in
immunology, the Dan... Read More about Dendritic Cells for Anomaly Detection.