An immunological model of distributed detection and its application to computer security
An immunological model of distributed detection and its application to computer security
Searching for diverse, cooperative populations with genetic algorithms
Evolutionary Computation
Dendritic cells for SYN scan detection
Proceedings of the 9th annual conference on Genetic and evolutionary computation
Application areas of AIS: The past, the present and the future
Applied Soft Computing
Sensing danger: Innate immunology for intrusion detection
Information Security Tech. Report
Information Security Tech. Report
A sense of danger: dendritic cells inspired artificial immune system for manet security
Proceedings of the 10th annual conference on Genetic and evolutionary computation
A Hybrid Model for Immune Inspired Network Intrusion Detection
ICARIS '08 Proceedings of the 7th international conference on Artificial Immune Systems
Further Exploration of the Dendritic Cell Algorithm: Antigen Multiplier and Time Windows
ICARIS '08 Proceedings of the 7th international conference on Artificial Immune Systems
The Deterministic Dendritic Cell Algorithm
ICARIS '08 Proceedings of the 7th international conference on Artificial Immune Systems
The Limitations of Frequency Analysis for Dendritic Cell Population Modelling
ICARIS '08 Proceedings of the 7th international conference on Artificial Immune Systems
Information fusion for anomaly detection with the dendritic cell algorithm
Information Fusion
The future of biologically-inspired security: is there anything left to learn?
NSPW '07 Proceedings of the 2007 Workshop on New Security Paradigms
A Sense of `Danger' for Windows Processes
ICARIS '09 Proceedings of the 8th International Conference on Artificial Immune Systems
Review: The use of computational intelligence in intrusion detection systems: A review
Applied Soft Computing
Design of a four-layer IDS model based on immune danger theory
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
A novel immune inspired approach to fault detection
ICARIS'07 Proceedings of the 6th international conference on Artificial immune systems
Towards a novel immune inspired approach to temporal anomaly detection
ICARIS'07 Proceedings of the 6th international conference on Artificial immune systems
The application of a dendritic cell algorithm to a robotic classifier
ICARIS'07 Proceedings of the 6th international conference on Artificial immune systems
Regulatory T cells: inspiration for artificial immune systems
ICARIS'07 Proceedings of the 6th international conference on Artificial immune systems
A Survey of artificial immune applications
Artificial Intelligence Review
Review Article: Recent Advances in Artificial Immune Systems: Models and Applications
Applied Soft Computing
Fault detection in analog circuits using a fuzzy dendritic cell algorithm
ICARIS'11 Proceedings of the 10th international conference on Artificial immune systems
The danger theory applied to vegetal image pattern classification
ICARIS'11 Proceedings of the 10th international conference on Artificial immune systems
Further exploration of the fuzzy dendritic cell method
ICARIS'11 Proceedings of the 10th international conference on Artificial immune systems
Run-time malware detection based on positive selection
Journal in Computer Virology
Integrating innate and adaptive immunity for intrusion detection
ICARIS'06 Proceedings of the 5th international conference on Artificial Immune Systems
Don't touch me, i'm fine: robot autonomy using an artificial innate immune system
ICARIS'06 Proceedings of the 5th international conference on Artificial Immune Systems
ICARIS'06 Proceedings of the 5th international conference on Artificial Immune Systems
Articulation and clarification of the dendritic cell algorithm
ICARIS'06 Proceedings of the 5th international conference on Artificial Immune Systems
ICARIS'05 Proceedings of the 4th international conference on Artificial Immune Systems
COID-FDCM: the fuzzy maintained dendritic cell classification method
ICAISC'12 Proceedings of the 11th international conference on Artificial Intelligence and Soft Computing - Volume Part II
Alert correlation using artificial immune recognition system
International Journal of Bio-Inspired Computation
An artificial immune system approach to associative classification
ICCSA'12 Proceedings of the 12th international conference on Computational Science and Its Applications - Volume Part I
A transitional view of immune inspired techniques for anomaly detection
IDEAL'12 Proceedings of the 13th international conference on Intelligent Data Engineering and Automated Learning
Real-Valued negative selection algorithm with variable-sized self radius
ICICA'12 Proceedings of the Third international conference on Information Computing and Applications
Clustering-Based multi-objective immune optimization evolutionary algorithm
ICARIS'12 Proceedings of the 11th international conference on Artificial Immune Systems
AC-CS: an immune-inspired associative classification algorithm
ICARIS'12 Proceedings of the 11th international conference on Artificial Immune Systems
ICARIS'12 Proceedings of the 11th international conference on Artificial Immune Systems
RST-DCA: a dendritic cell algorithm based on rough set theory
ICONIP'12 Proceedings of the 19th international conference on Neural Information Processing - Volume Part III
A new data pre-processing approach for the dendritic cellalgorithm based on fuzzy rough set theory
Proceedings of the 15th annual conference companion on Genetic and evolutionary computation
Design of a parallel immune algorithm based on the germinal center reaction
Proceedings of the 15th annual conference companion on Genetic and evolutionary computation
A survey on optimization metaheuristics
Information Sciences: an International Journal
A fuzzy-rough data pre-processing approach for the dendritic cell classifier
ECSQARU'13 Proceedings of the 12th European conference on Symbolic and Quantitative Approaches to Reasoning with Uncertainty
Hi-index | 0.00 |
Dendritic cells are antigen presenting cells that provide a vital link between the innate and adaptive immune system. Research into this family of cells has revealed that they perform the role of co-ordinating T-cell based immune responses, both reactive and for generating tolerance. We have derived an algorithm based on the functionality of these cells, and have used the signals and differentiation pathways to build a control mechanism for an artificial immune system. We present our algorithmic details in addition to some preliminary results, where the algorithm was applied for the purpose of anomaly detection. We hope that this algorithm will eventually become the key component within a large, distributed immune system, based on sound immunological concepts.