An immunological model of distributed detection and its application to computer security
An immunological model of distributed detection and its application to computer security
Towards a conceptual framework for innate immunity
ICARIS'05 Proceedings of the 4th international conference on Artificial Immune Systems
Two ways to grow tissue for artificial immune systems
ICARIS'05 Proceedings of the 4th international conference on Artificial Immune Systems
Introducing dendritic cells as a novel immune-inspired algorithm for anomaly detection
ICARIS'05 Proceedings of the 4th international conference on Artificial Immune Systems
ICARIS'05 Proceedings of the 4th international conference on Artificial Immune Systems
Dendritic cells for SYN scan detection
Proceedings of the 9th annual conference on Genetic and evolutionary computation
Sensing danger: Innate immunology for intrusion detection
Information Security Tech. Report
Improving accuracy of immune-inspired malware detectors by using intelligent features
Proceedings of the 10th annual conference on Genetic and evolutionary computation
Theoretical advances in artificial immune systems
Theoretical Computer Science
Computing the State of Specknets: Further Analysis of an Innate Immune-Inspired Model
ICARIS '08 Proceedings of the 7th international conference on Artificial Immune Systems
A Hybrid Model for Immune Inspired Network Intrusion Detection
ICARIS '08 Proceedings of the 7th international conference on Artificial Immune Systems
Further Exploration of the Dendritic Cell Algorithm: Antigen Multiplier and Time Windows
ICARIS '08 Proceedings of the 7th international conference on Artificial Immune Systems
The Deterministic Dendritic Cell Algorithm
ICARIS '08 Proceedings of the 7th international conference on Artificial Immune Systems
The Limitations of Frequency Analysis for Dendritic Cell Population Modelling
ICARIS '08 Proceedings of the 7th international conference on Artificial Immune Systems
ARTIFICIAL IMMUNE SYSTEMS IN THE CONTEXT OF MISBEHAVIOR DETECTION
Cybernetics and Systems
Geometrical insights into the dendritic cell algorithm
Proceedings of the 11th Annual conference on Genetic and evolutionary computation
Information fusion for anomaly detection with the dendritic cell algorithm
Information Fusion
Information fusion in the immune system
Information Fusion
A Sense of `Danger' for Windows Processes
ICARIS '09 Proceedings of the 8th International Conference on Artificial Immune Systems
The implementation of a novel, bio-inspired, robotic security system
ICRA'09 Proceedings of the 2009 IEEE international conference on Robotics and Automation
The application of a dendritic cell algorithm to a robotic classifier
ICARIS'07 Proceedings of the 6th international conference on Artificial immune systems
Review Article: Recent Advances in Artificial Immune Systems: Models and Applications
Applied Soft Computing
The danger theory applied to vegetal image pattern classification
ICARIS'11 Proceedings of the 10th international conference on Artificial immune systems
ICARIS'06 Proceedings of the 5th international conference on Artificial Immune Systems
A fuzzy-rough data pre-processing approach for the dendritic cell classifier
ECSQARU'13 Proceedings of the 12th European conference on Symbolic and Quantitative Approaches to Reasoning with Uncertainty
Hi-index | 0.00 |
The Dendritic Cell algorithm (DCA) is inspired by recent work in innate immunity. In this paper a formal description of the DCA is given. The DCA is described in detail, and its use as an anomaly detector is illustrated within the context of computer security. A port scan detection task is performed to substantiate the influence of signal selection on the behaviour of the algorithm. Experimental results provide a comparison of differing input signal mappings.