Immune system approaches to intrusion detection–a review

J Kim, PJ Bentley, U Aickelin, J Greensmith… - Natural computing, 2007 - Springer
The use of artificial immune systems in intrusion detection is an appealing concept for two
reasons. First, the human immune system provides the human body with a high level of …

An interdisciplinary perspective on artificial immune systems

J Timmis, P Andrews, N Owens, E Clark - Evolutionary Intelligence, 2008 - Springer
This review paper attempts to position the area of Artificial Immune Systems (AIS) in a
broader context of interdisciplinary research. We review AIS based on an established …

[图书][B] Immunological computation: theory and applications

D Dasgupta, F Nino - 2008 - taylorfrancis.com
Clearly, nature has been very effective in creating organisms that are capable of protecting
themselves against a wide variety of pathogens such as bacteria, fungi, and parasites. The …

[PDF][PDF] The dendritic cell algorithm

J Greensmith - 2007 - Citeseer
Artificial immune systems are a collection of algorithms inspired by the human immune
system. Over the past 15 years, extensive research has been performed regarding the …

Articulation and clarification of the dendritic cell algorithm

J Greensmith, U Aickelin, J Twycross - Artificial Immune Systems: 5th …, 2006 - Springer
Abstract The Dendritic Cell algorithm (DCA) is inspired by recent work in innate immunity. In
this paper a formal description of the DCA is given. The DCA is described in detail, and its …

Information fusion for anomaly detection with the dendritic cell algorithm

J Greensmith, U Aickelin, G Tedesco - Information Fusion, 2010 - Elsevier
Dendritic cells are antigen presenting cells that provide a vital link between the innate and
adaptive immune system, providing the initial detection of pathogenic invaders. Research …

Dendritic cells for anomaly detection

J Greensmith, J Twycross… - 2006 IEEE international …, 2006 - ieeexplore.ieee.org
Artificial immune systems, more specifically the negative selection algorithm, have
previously been applied to intrusion detection. The aim of this research is to develop an …

A generic cyber immune framework for anomaly detection using artificial immune systems

BJ Bejoy, G Raju, D Swain, B Acharya, YC Hu - Applied Soft Computing, 2022 - Elsevier
Intrusion detection systems play a significant role in computer security. Artificial immune
systems are the prime contender in developing an anomaly-based intrusion detection …

A review on immune-inspired node fault detection in wireless sensor networks with a focus on the danger theory

D Widhalm, KM Goeschka, W Kastner - Sensors, 2023 - mdpi.com
The use of fault detection and tolerance measures in wireless sensor networks is inevitable
to ensure the reliability of the data sources. In this context, immune-inspired concepts offer …

Sensing danger: Innate immunology for intrusion detection

U Aickelin, J Greensmith - Information Security Technical Report, 2007 - Elsevier
The immune system provides an ideal metaphor for anomaly detection in general and
computer securities in particular. Based on this idea, artificial immune systems have been …