Connecting the Physical World with Pervasive Networks
IEEE Pervasive Computing
Directed diffusion for wireless sensor networking
IEEE/ACM Transactions on Networking (TON)
Dendritic cells for SYN scan detection
Proceedings of the 9th annual conference on Genetic and evolutionary computation
Articulation and clarification of the dendritic cell algorithm
ICARIS'06 Proceedings of the 5th international conference on Artificial Immune Systems
Towards a conceptual framework for innate immunity
ICARIS'05 Proceedings of the 4th international conference on Artificial Immune Systems
Two ways to grow tissue for artificial immune systems
ICARIS'05 Proceedings of the 4th international conference on Artificial Immune Systems
Introducing dendritic cells as a novel immune-inspired algorithm for anomaly detection
ICARIS'05 Proceedings of the 4th international conference on Artificial Immune Systems
ICARIS'05 Proceedings of the 4th international conference on Artificial Immune Systems
Application areas of AIS: the past, the present and the future
ICARIS'05 Proceedings of the 4th international conference on Artificial Immune Systems
IEEE Communications Magazine
Sensing danger: Innate immunology for intrusion detection
Information Security Tech. Report
The Limitations of Frequency Analysis for Dendritic Cell Population Modelling
ICARIS '08 Proceedings of the 7th international conference on Artificial Immune Systems
ARTIFICIAL IMMUNE SYSTEMS IN THE CONTEXT OF MISBEHAVIOR DETECTION
Cybernetics and Systems
Designing Biological Computers: Systemic Computation and Sensor Networks
Bio-Inspired Computing and Communication
Information fusion for anomaly detection with the dendritic cell algorithm
Information Fusion
An Error Propagation Algorithm for Ad Hoc Wireless Networks
ICARIS '09 Proceedings of the 8th International Conference on Artificial Immune Systems
Review: The use of computational intelligence in intrusion detection systems: A review
Applied Soft Computing
Anomaly detection inspired by immune network theory: a proposal
CEC'09 Proceedings of the Eleventh conference on Congress on Evolutionary Computation
The application of a dendritic cell algorithm to a robotic classifier
ICARIS'07 Proceedings of the 6th international conference on Artificial immune systems
Computer Networks: The International Journal of Computer and Telecommunications Networking
Review Article: Recent Advances in Artificial Immune Systems: Models and Applications
Applied Soft Computing
Immune-Inspired self healing in wireless sensor networks
ICARIS'12 Proceedings of the 11th international conference on Artificial Immune Systems
Rethinking concepts of the dendritic cell algorithm for multiple data stream analysis
ICARIS'12 Proceedings of the 11th international conference on Artificial Immune Systems
Hi-index | 0.00 |
There is a list of unique immune features that are currently absent from the existing artificial immune systems and other intelligent paradigms. We argue that some of AIS features can be inherent in an application itself, and thus this type of application would be a more appropriate substrate in which to develop and integrate the benefits brought by AIS. We claim here that sensor networks are such an application area, in which the ideas from AIS can be readily applied. The objective of this paper is to illustrate how closely a Danger Theory based AIS – in particular the Dendritic Cell Algorithm matches the structure and functional requirements of sensor networks. This paper also introduces a new sensor network attack called an Interest Cache Poisoning Attack and discusses how the DCA can be applied to detect this attack.