Immune system approaches to intrusion detection–a review J Kim, PJ Bentley, U Aickelin, J Greensmith, G Tedesco, J Twycross Natural computing 6, 413-466, 2007 | 424 | 2007 |
A new accuracy measure based on bounded relative error for time series forecasting C Chen, J Twycross, JM Garibaldi PloS one 12 (3), e0174202, 2017 | 306 | 2017 |
Immune system approaches to intrusion detection–a review U Aickelin, J Greensmith, J Twycross Artificial Immune Systems: Third International Conference, ICARIS 2004 …, 2004 | 280 | 2004 |
Implementing and testing a virus throttle J Twycross, MM Williamson 12th USENIX Security Symposium (USENIX Security 03), 2003 | 251 | 2003 |
A thermodynamic switch modulates abscisic acid receptor sensitivity F Dupeux, J Santiago, K Betz, J Twycross, SY Park, L Rodriguez, ... The EMBO journal 30 (20), 4171-4184, 2011 | 189 | 2011 |
Articulation and clarification of the dendritic cell algorithm J Greensmith, U Aickelin, J Twycross Artificial Immune Systems: 5th International Conference, ICARIS 2006, Oeiras …, 2006 | 185 | 2006 |
Dendritic cells for anomaly detection J Greensmith, J Twycross, U Aickelin 2006 IEEE international conference on evolutionary computation, 664-671, 2006 | 139 | 2006 |
Integrated innate and adaptive artificial immune systems applied to process anomaly detection JP Twycross, U Aickelin University of Nottingham, 2007 | 97 | 2007 |
Towards a conceptual framework for innate immunity J Twycross, U Aickelin International Conference on Artificial Immune Systems, 112-125, 2005 | 87 | 2005 |
Libtissue-implementing innate immunity J Twycross, U Aickelin 2006 IEEE International Conference on Evolutionary Computation, 499-506, 2006 | 65 | 2006 |
Modular assembly of cell systems biology models using P systems FJ Romero-Campero, J Twycross, M Cámara, M Bennett, M Gheorghe, ... International Journal of Foundations of Computer Science 20 (03), 427-442, 2009 | 64 | 2009 |
Stochastic and deterministic multiscale models for systems biology: an auxin-transport case study J Twycross, LR Band, MJ Bennett, JR King, N Krasnogor BMC Systems Biology 4, 1-11, 2010 | 63 | 2010 |
The Infobiotics Workbench: an integrated in silico modelling platform for Systems and Synthetic Biology J Blakes, J Twycross, FJ Romero− Campero, N Krasnogor Bioinformatics 27 (23), 3323-3324, 2011 | 59 | 2011 |
Malicious code execution detection and response immune system inspired by the danger theory J Kim, J Greensmith, J Twycross, U Aickelin arXiv preprint arXiv:1003.4142, 2010 | 54 | 2010 |
Detecting danger: Applying a novel immunological concept to intrusion detection systems J Greensmith, U Aickelin, J Twycross arXiv preprint arXiv:1002.0696, 2010 | 54 | 2010 |
Identification of gene modules associated with low temperatures response in bambara groundnut by network-based analysis VS Bonthala, K Mayes, J Moreton, M Blythe, V Wright, ST May, ... PLoS One 11 (2), e0148771, 2016 | 53 | 2016 |
Information fusion in the immune system J Twycross, U Aickelin Information Fusion 11 (1), 35-44, 2010 | 53 | 2010 |
Rule generalisation in intrusion detection systems using SNORT U Aickelin, J Twycross, T Hesketh-Roberts International Journal of Electronic Security and Digital Forensics 1 (1 …, 2007 | 48 | 2007 |
Dual Predation by Bacteriophage and Bdellovibrio bacteriovorus Can Eradicate Escherichia coli Prey in Situations where Single Predation Cannot L Hobley, JK Summers, R Till, DS Milner, RJ Atterbury, A Stroud, ... Journal of Bacteriology 202 (6), 10.1128/jb. 00629-19, 2020 | 40 | 2020 |
Measuring and modelling the response of Klebsiella pneumoniae KPC prey to Bdellovibrio bacteriovorus predation, in human serum and defined buffer M Baker, D Negus, D Raghunathan, P Radford, C Moore, G Clark, ... Scientific Reports 7 (1), 8329, 2017 | 40 | 2017 |