Skip to main content

Research Repository

Advanced Search

Outputs (40)

Automatically Labeling Cyber Threat Intelligence reports using Natural Language Processing (2023)
Conference Proceeding
Abdi, H., Bagley, S. R., Furnell, S., & Twycross, J. (2023). Automatically Labeling Cyber Threat Intelligence reports using Natural Language Processing. In DocEng ’23 : Proceedings of the 2023 ACM Symposium on Document Engineering. https://doi.org/10.1145/3573128.3609348

Attribution provides valuable intelligence in the face of Advanced Persistent Threat (APT) attacks. By accurately identifying the culprits and actors behind the attacks, we can gain more insights into their motivations, capabilities, and potential fu... Read More about Automatically Labeling Cyber Threat Intelligence reports using Natural Language Processing.

The Lanthipeptide Synthetase-like Protein CA_C0082 Is an Effector of Agr Quorum Sensing in Clostridium acetobutylicum (2023)
Journal Article
Humphreys, J. R., Bean, Z., Twycross, J., & Winzer, K. (2023). The Lanthipeptide Synthetase-like Protein CA_C0082 Is an Effector of Agr Quorum Sensing in Clostridium acetobutylicum. Microorganisms, 11(6), Article 1460. https://doi.org/10.3390/microorganisms11061460

Lanthipeptide synthetases are present in all domains of life. They catalyze a crucial step during lanthipeptide biosynthesis by introducing thioether linkages during posttranslational peptide modification. Lanthipeptides have a wide range of function... Read More about The Lanthipeptide Synthetase-like Protein CA_C0082 Is an Effector of Agr Quorum Sensing in Clostridium acetobutylicum.

A genome-scale metabolic model of Cupriavidus necator H16 integrated with TraDIS and transcriptomic data reveals metabolic insights for biotechnological applications (2022)
Journal Article
Pearcy, N., Garavaglia, M., Millat, T., Gilbert, J. P., Song, Y., Hartman, H., …Minton, N. P. (2022). A genome-scale metabolic model of Cupriavidus necator H16 integrated with TraDIS and transcriptomic data reveals metabolic insights for biotechnological applications. PLoS Computational Biology, 18(5), Article e1010106. https://doi.org/10.1371/journal.pcbi.1010106

Exploiting biological processes to recycle renewable carbon into high value platform chemicals provides a sustainable and greener alternative to current reliance on petrochemicals. In this regard Cupriavidus necator H16 represents a particularly prom... Read More about A genome-scale metabolic model of Cupriavidus necator H16 integrated with TraDIS and transcriptomic data reveals metabolic insights for biotechnological applications.

Software tools for green and sustainable chemistry (2022)
Journal Article
Derbenev, I. N., Twycross, J., Dowden, J., & Hirst, J. D. (2022). Software tools for green and sustainable chemistry. Current Opinion in Green and Sustainable Chemistry, 35, Article 100623. https://doi.org/10.1016/j.cogsc.2022.100623

In this review, we consider green chemistry metrics, related software tools, and the opportunities and challenges for their use in research laboratories. We provide an overview of state-of-the-art software designed both to aid researchers in planning... Read More about Software tools for green and sustainable chemistry.

Engineering improved ethylene production: Leveraging systems Biology and adaptive laboratory evolution (2021)
Journal Article
Vaud, S., Pearcy, N., Hanževački, M., Van Hagen, A. M., Abdelrazig, S., Safo, L., …Bryan, S. J. (2021). Engineering improved ethylene production: Leveraging systems Biology and adaptive laboratory evolution. Metabolic Engineering, 67, 308-320. https://doi.org/10.1016/j.ymben.2021.07.001

Ethylene is a small hydrocarbon gas widely used in the chemical industry. Annual worldwide production currently exceeds 150 million tons, producing considerable amounts of CO2 contributing to climate change. The need for a sustainable alternative is... Read More about Engineering improved ethylene production: Leveraging systems Biology and adaptive laboratory evolution.

A Comprehensive Study of the Efficiency of Type-Reduction Algorithms (2020)
Journal Article
Chen, C., Wu, D., Garibaldi, J. M., John, R. I., Twycross, J., & Mendel, J. M. (2021). A Comprehensive Study of the Efficiency of Type-Reduction Algorithms. IEEE Transactions on Fuzzy Systems, 29(6), 1556 -1566. https://doi.org/10.1109/tfuzz.2020.2981002

Improving the efficiency of type-reduction algorithms continues to attract research interest. Recently, there have been some new type-reduction approaches claiming that they are more efficient than the well-known algorithms such as the enhanced Karni... Read More about A Comprehensive Study of the Efficiency of Type-Reduction Algorithms.

Dual predation by bacteriophage and bdellovibrio bacteriovorus can eradicate escherichia coli prey in situations where single predation cannot (2020)
Journal Article
Hobley, L., Summers, J. K., Till, R., Milner, D. S., Atterbury, R. J., Stroud, A., …Sockett, R. E. (2020). Dual predation by bacteriophage and bdellovibrio bacteriovorus can eradicate escherichia coli prey in situations where single predation cannot. Journal of Bacteriology, 202(6), Article e00629-19. https://doi.org/10.1128/JB.00629-19

Copyright © 2020 Hobley et al. Bacteria are preyed upon by diverse microbial predators, including bacteriophage and predatory bacteria, such as Bdellovibrio bacteriovorus. While bacteriophage are used as antimicrobial therapies in Eastern Europe and... Read More about Dual predation by bacteriophage and bdellovibrio bacteriovorus can eradicate escherichia coli prey in situations where single predation cannot.

Modelling Emerging Pollutants in Wastewater Treatment: A Case Study using the Pharmaceutical 17??ethinylestradiol (2019)
Journal Article
Acheampong, E., Dryden, I. L., Wattis, J. A., Twycross, J., Scrimshaw, M. D., & Gomes, R. L. (2019). Modelling Emerging Pollutants in Wastewater Treatment: A Case Study using the Pharmaceutical 17??ethinylestradiol. Computers and Chemical Engineering, 128, 477-487. https://doi.org/10.1016/j.compchemeng.2019.06.020

Mathematical modelling can play a key role in understanding as well as quantifying uncertainties surrounding the presence and fate of emerging pollutants in wastewater treatment processes (WWTPs). This paper presents for the first time a simplified e... Read More about Modelling Emerging Pollutants in Wastewater Treatment: A Case Study using the Pharmaceutical 17??ethinylestradiol.

Microarray Feature Selection and Dynamic Selection of Classifiers for Early Detection of Insect Bite Hypersensitivity in Horses (2019)
Conference Proceeding
Maciel Guerra, A., Figueredo, G. P., Von Zuben, F., Marti, E., Twycross, J., & Alcocer, M. J. (2019). Microarray Feature Selection and Dynamic Selection of Classifiers for Early Detection of Insect Bite Hypersensitivity in Horses. In 2019 IEEE Congress on Evolutionary Computation (CEC) (1157-1164). https://doi.org/10.1109/CEC.2019.8790319

Microarrays can be employed to better characterise allergies, as interactions between antibodies and allergens in mammals can be monitored. Once the joint dynamics of these elements in both healthy and diseased animals are understood, a model to pred... Read More about Microarray Feature Selection and Dynamic Selection of Classifiers for Early Detection of Insect Bite Hypersensitivity in Horses.

Gsmodutils: a python based framework for test-driven genome scale metabolic model development (2019)
Journal Article
Gilbert, J., Pearcy, N., Norman, R., Millat, T., Winzer, K., King, J., …Twycross, J. (2019). Gsmodutils: a python based framework for test-driven genome scale metabolic model development. Bioinformatics, 35(18), 3397-3403. https://doi.org/10.1093/bioinformatics/btz088

© 2019 The Author(s) 2019. Published by Oxford University Press. Motivation: Genome scale metabolic models (GSMMs) are increasingly important for systems biology and metabolic engineering research as they are capable of simulating complex steady-stat... Read More about Gsmodutils: a python based framework for test-driven genome scale metabolic model development.

Gsmodutils: A python based framework for test-driven genome scale metabolic model development (2018)
Other
Gilbert, J. P., Pearcy, N., Norman, R., Millat, T., Winzer, K., King, J., …Twycross, J. (2018). Gsmodutils: A python based framework for test-driven genome scale metabolic model development

Motivation Genome scale metabolic models (GSMMs) are increasingly important for systems biology and metabolic engineering research as they are capable of simulating complex steady-state behaviour. Constraints based models of this form can include tho... Read More about Gsmodutils: A python based framework for test-driven genome scale metabolic model development.

From clusters to queries: exploiting uncertainty in the modularity landscape of complex networks (2018)
Conference Proceeding
Gilbert, J. P., & Twycross, J. (2018). From clusters to queries: exploiting uncertainty in the modularity landscape of complex networks.

Uncovering latent community structure in complex networks is a field that has received an enormous amount of attention. Unfortunately, whilst potentially very powerful, unsupervised methods for uncovering labels based on topology alone has been shown... Read More about From clusters to queries: exploiting uncertainty in the modularity landscape of complex networks.

A comment on "A direct approach for determining the switch points in the Karnik-Mendel algorithm" (2018)
Journal Article
Chen, C., Wu, D., Garibaldi, J. M., John, R., Twycross, J., & Mendel, J. M. (2018). A comment on "A direct approach for determining the switch points in the Karnik-Mendel algorithm". IEEE Transactions on Fuzzy Systems, 26(6), 3905-3907. https://doi.org/10.1109/tfuzz.2018.2865134

This letter is a supplement to the previous paper “A Direct Approach for Determining the Switch Points in the Karnik-Mendel Algorithm”. In the previous paper, the enhanced iterative algorithm with stop condition (EIASC) was shown to be the most ineff... Read More about A comment on "A direct approach for determining the switch points in the Karnik-Mendel algorithm".

Type-1 and interval type-2 ANFIS: a comparison (2017)
Conference Proceeding
Chen, C., John, R., Twycross, J., & Garibaldi, J. M. (2017). Type-1 and interval type-2 ANFIS: a comparison.

In a previous paper, we proposed an extended ANFIS architecture and showed that interval type-2 ANFIS produced larger errors than type-1 ANFIS on the well-known IRIS classification problem. In this paper, more experiments on both synthetic and real-w... Read More about Type-1 and interval type-2 ANFIS: a comparison.

Measuring and modelling the response of Klebsiella pneumoniae KPC prey to Bdellovibrio bacteriovorus predation, in human serum and defined buffer (2017)
Journal Article
Baker, M., Negus, D., Raghunathan, D., Radford, P., Moore, C., Clark, G., …Sockett, R. E. (in press). Measuring and modelling the response of Klebsiella pneumoniae KPC prey to Bdellovibrio bacteriovorus predation, in human serum and defined buffer. Scientific Reports, 7(8329), https://doi.org/10.1038/s41598-017-08060-4

In worldwide conditions of increasingly antibiotic-resistant hospital infections, it is important to research alternative therapies. Bdellovibrio bacteriovorus bacteria naturally prey on Gram-negative pathogens, including antibiotic-resistant strains... Read More about Measuring and modelling the response of Klebsiella pneumoniae KPC prey to Bdellovibrio bacteriovorus predation, in human serum and defined buffer.

A Direct Approach for Determining the Switch Points in the Karnik–Mendel Algorithm (2017)
Journal Article
Chen, C., John, R., Twycross, J., & Garibaldi, J. M. (2018). A Direct Approach for Determining the Switch Points in the Karnik–Mendel Algorithm. IEEE Transactions on Fuzzy Systems, 26(2), 1079-1085. https://doi.org/10.1109/tfuzz.2017.2699168

The Karnik-Mendel algorithm is used to compute the centroid of interval type-2 fuzzy sets, determining the switch points needed for the lower and upper bounds of the centroid, through an iterative process. It is commonly acknowledged that there is n... Read More about A Direct Approach for Determining the Switch Points in the Karnik–Mendel Algorithm.

A new accuracy measure based on bounded relative error for time series forecasting (2017)
Journal Article
Chen, C., Twycross, J., & Garibaldi, J. M. (2017). A new accuracy measure based on bounded relative error for time series forecasting. PLoS ONE, 12(3), Article e0174202. https://doi.org/10.1371/journal.pone.0174202

Many accuracy measures have been proposed in the past for time series forecasting comparisons. However, many of these measures suffer from one or more issues such as poor resistance to outliers and scale dependence. In this paper, while summarising c... Read More about A new accuracy measure based on bounded relative error for time series forecasting.

An extended ANFIS architecture and its learning properties for type-1 and interval type-2 models (2016)
Conference Proceeding
Chen, C., John, R., Twycross, J., & Garibaldi, J. M. (2016). An extended ANFIS architecture and its learning properties for type-1 and interval type-2 models.

In this paper, an extended ANFIS architecture is proposed. By incorporating an extra layer for the fuzzification process, the extended architecture is able to fit both type-1 and interval type-2 models. The learning properties of the proposed archite... Read More about An extended ANFIS architecture and its learning properties for type-1 and interval type-2 models.

Identification of gene modules associated with low temperatures response in Bambara groundnut by network-based analysis (2016)
Journal Article
Bonthala, V. S., Mayes, S., Moreton, J., Blythe, M. J., Wright, V., May, S., …Twycross, J. (2016). Identification of gene modules associated with low temperatures response in Bambara groundnut by network-based analysis. PLoS ONE, 11(2), Article e0148771. https://doi.org/10.1371/journal.pone.0148771

Bambara groundnut (Vigna subterranea (L.) Verdc.) is an African legume and is a promising underutilized crop with good seed nutritional values. Low temperature stress in a number of African countries at night, such as Botswana, can effect the growth... Read More about Identification of gene modules associated with low temperatures response in Bambara groundnut by network-based analysis.

Infobiotics workbench: a P systems based tool for systems and synthetic biology (2013)
Book Chapter
Blakes, J., Twycross, J., Konur, S., Romero-Campero, F. J., Krasnogor, N., & Gheorghe, M. (2014). Infobiotics workbench: a P systems based tool for systems and synthetic biology. In Applications of membrane computing in systems and synthetic biology. Springer International Publishing. https://doi.org/10.1007/978-3-319-03191-0_1

This chapter gives an overview of an integrated software suite, the Infobiotics Workbench, which is based on a novel spatial discrete-stochastic P systems modelling framework. The Workbench incorporates three important features, simulation, model che... Read More about Infobiotics workbench: a P systems based tool for systems and synthetic biology.

Hormone transport (2010)
Book Chapter
Kerr, I. D., Carrier, D. J., & Twycross, J. (2010). Hormone transport. In The Plant Plasma Membrane, (379-397). Springer. https://doi.org/10.1007/978-3-642-13431-9_17

Hormone transport in plants is a fundamental process governing all aspects of plant development. Identification and functional analysis of plasma membrane proteins, which regulate the import and export of plant hormones, is a requirement if we are to... Read More about Hormone transport.

Stochastic and deterministic multiscale models for systems biology: An auxin-transport case study (2010)
Journal Article
Twycross, J., Band, L. R., Bennett, M. J., King, J. R., & Krasnogor, N. (2010). Stochastic and deterministic multiscale models for systems biology: An auxin-transport case study. BMC Systems Biology, 4, https://doi.org/10.1186/1752-0509-4-34

Background: Stochastic and asymptotic methods are powerful tools in developing multiscale systems biology models; however, little has been done in this context to compare the efficacy of these methods. The majority of current systems biology modellin... Read More about Stochastic and deterministic multiscale models for systems biology: An auxin-transport case study.

Detecting anomalous process behaviour using second generation Artificial Immune Systems (2010)
Journal Article
Twycross, J., Aickelin, U., & Whitbrook, A. (2010). Detecting anomalous process behaviour using second generation Artificial Immune Systems. International Journal of Unconventional Computing, 6(3-4),

Artificial Immune Systems have been successfully applied to a number of problem domains including fault tolerance and data mining, but have been shown to scale poorly when applied to computer intrusion detection despite the fact that the biological i... Read More about Detecting anomalous process behaviour using second generation Artificial Immune Systems.

Modular assembly of cell systems biology models using P systems (2009)
Journal Article
Romero-Campero, F. J., Twycross, J., Camara, M., Bennett, M., Gheorghe, M., & Krasnogor, N. (2009). Modular assembly of cell systems biology models using P systems. International Journal of Foundations of Computer Science, 20(3), 427-442. https://doi.org/10.1142/S0129054109006668

In this paper we propose an extension of a systems/synthetic biology modelling framework based on P systems that explicitly includes modularity. Modularisation in cellular systems can be produced by chemical specificity, spatial localisation and/or t... Read More about Modular assembly of cell systems biology models using P systems.

An Immune Inspired Approach to Anomaly Detection (2008)
Book Chapter
Twycross, J., & Aickelin, U. (2009). An Immune Inspired Approach to Anomaly Detection. In Handbook of Research on Information Assurance and Security (109-121). IDEAS Publishing

The immune system provides a rich metaphor for computer security: anomaly detection that works in nature should work for machines. However, early artificial immune system approaches for computer security had only limited success. Arguably, this was d... Read More about An Immune Inspired Approach to Anomaly Detection.

Immune system approaches to intrusion detection - a review (2007)
Journal Article
Kim, J., Bentley, P., Aickelin, U., Greensmith, J., Tedesco, G., & Twycross, J. (2007). Immune system approaches to intrusion detection - a review. Natural Computing, 6(4), 413-466

The use of artificial immune systems in intrusion detection is an appealing concept for two reasons. Firstly, the human immune system provides the human body with a high level of protection from invading pathogens, in a robust, self-organised and dis... Read More about Immune system approaches to intrusion detection - a review.

Rule Generalisation in Intrusion Detection Systems using Snort (2007)
Journal Article
Aickelin, U., Twycross, J., & Hesketh-Roberts, T. (2007). Rule Generalisation in Intrusion Detection Systems using Snort. International Journal of Electronic Security and Digital Forensics, 1(1), 101-116. https://doi.org/10.1504/IJESDF.2007.013596

Intrusion Detection Systems (IDSs) provide an important layer of security for computer systems and networks, and are becoming more and more necessary as reliance on Internet services increases and systems with sensitive data are more commonly open to... Read More about Rule Generalisation in Intrusion Detection Systems using Snort.

Articulation and Clarification of the Dendritic Cell Algorithm (2006)
Book Chapter
Greensmith, J., Aickelin, U., & Twycross, J. (2006). Articulation and Clarification of the Dendritic Cell Algorithm. In Artificial Immune Systems: 5th International Conference, ICARIS 2006, Oeiras, Portugal, September 4-6, 2006. ProceedingsSpringer. https://doi.org/10.1007/11823940_31

The Dendritic Cell algorithm (DCA) is inspired by recent work in innate immunity. In this paper a formal description of the DCA is given. The DCA is described in detail, and its use as an anomaly detector is illustrated within the context of computer... Read More about Articulation and Clarification of the Dendritic Cell Algorithm.

'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory' (2005)
Conference Proceeding
Kim, J., Greensmith, J., Twycross, J., & Aickelin, U. (2005). 'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory'.

The analysis of system calls is one method employed by anomaly detection systems to recognise malicious code execution. Similarities can be drawn between this process and the behaviour of certain cells belonging to the human immune system, and can be... Read More about 'Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory'.

Immune System Approaches to Intrusion Detection - A Review (ICARIS) (2004)
Conference Proceeding
Aickelin, U., Greensmith, J., & Twycross, J. (2004). Immune System Approaches to Intrusion Detection - A Review (ICARIS). In Artificial Immune Systems: Third International Conference, ICARIS 2004, Catania, Sicily, Italy, September 13-16, 2004. Proceedings. https://doi.org/10.1007/978-3-540-30220-9_26

The use of artificial immune systems in intrusion detection is an appealing concept for two reasons. Firstly, the human immune system provides the human body with a high level of protection from invading pathogens, in a robust, self-organised and dis... Read More about Immune System Approaches to Intrusion Detection - A Review (ICARIS).

Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems' (2004)
Conference Proceeding
Greensmith, J., Aickelin, U., & Twycross, J. (2004). Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems'.

INTRODUCTION In recent years computer systems have become increasingly complex and consequently the challenge of protecting these systems has become increasingly difficult. Various techniques have been implemented to counteract the misuse of com... Read More about Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems'.

'Immune System Approaches to Intrusion Detection - A Review' (2004)
Conference Proceeding
Aickelin, U., Greensmith, J., & Twycross, J. (2004). 'Immune System Approaches to Intrusion Detection - A Review'.

Abstract. The use of artificial immune systems in intrusion detection is an appealing concept for two reasons. Firstly, the human immune system provides the human body with a high level of protection from invading pathogens, in a robust, s... Read More about 'Immune System Approaches to Intrusion Detection - A Review'.

Integrating Innate and Adaptive Immunity for Intrusion Detection
Conference Proceeding
Tedesco, G., Twycross, J., & Aickelin, U. Integrating Innate and Adaptive Immunity for Intrusion Detection.

Network Intrusion Detection Systems (NIDS) monitor a net- work with the aim of discerning malicious from benign activity on that network. While a wide range of approaches have met varying levels of success, most IDS’s rely on having access to a data... Read More about Integrating Innate and Adaptive Immunity for Intrusion Detection.

Experimenting with Innate Immunity
Conference Proceeding
Twycross, J., & Aickelin, U. Experimenting with Innate Immunity.

libtissue is a software system for implementing and testing AIS algorithms on real-world computer security problems. AIS algorithms are implemented as a collection of cells, antigen and signals interacting within a tissue compartment. Input data to t... Read More about Experimenting with Innate Immunity.

Articulation and Clarification of the Dendric Cell Algorithm
Conference Proceeding
Greensmith, J., Aickelin, U., & Twycross, J. Articulation and Clarification of the Dendric Cell Algorithm.

The Dendritic Cell algorithm (DCA) is inspired by recent work in innate immunity. In this paper a formal description of the DCA is given. The DCA is described in detail, and its use as an anomaly detector is illustrated within the context of compute... Read More about Articulation and Clarification of the Dendric Cell Algorithm.

Information fusion in the immune system
Journal Article
Twycross, J., & Aickelin, U. Information fusion in the immune system. Information Fusion, 11(1), https://doi.org/10.1016/j.inffus.2009.04.008

Biologically-inspired methods such as evolutionary algorithms and neural networks are proving useful in the field of information fusion. Artificial immune systems (AISs) are a biologically-inspired approach which take inspiration from the biological... Read More about Information fusion in the immune system.