Sciweavers

17 search results - page 1 / 4
» Detecting Danger: The Dendritic Cell Algorithm
Sort
View
CORR
2010
Springer
124views Education» more  CORR 2010»
13 years 5 months ago
Detecting Danger: The Dendritic Cell Algorithm
l invaders in the form of pathogens. In this research, and abstract model of DC behaviour is developed and subsequently used to form an algorithm, the DCA. The abstraction process ...
Julie Greensmith, Uwe Aickelin, Steve Cayzer
ICARIS
2009
Springer
13 years 11 months ago
A Sense of 'Danger' for Windows Processes
The sophistication of modern computer malware demands run-time malware detection strategies which are not only efficient but also robust to obfuscation and evasion attempts. In thi...
Salman Manzoor, M. Zubair Shafiq, S. Momina Tabish...
CORR
2008
Springer
125views Education» more  CORR 2008»
13 years 5 months ago
Sensing Danger: Innate Immunology for Intrusion Detection
The immune system provides an ideal metaphor for anomaly detection in general and computer security in particular. Based on this idea, artificial immune systems have been used for...
Uwe Aickelin, Julie Greensmith
CORR
2010
Springer
139views Education» more  CORR 2010»
13 years 5 months ago
Information Fusion for Anomaly Detection with the Dendritic Cell Algorithm
Dendritic cells are antigen presenting cells that provide a vital link between the innate and adaptive immune system, providing the initial detection of pathogenic invaders. Resea...
Julie Greensmith, Uwe Aickelin, Gianni Tedesco
APIN
2010
172views more  APIN 2010»
13 years 5 months ago
Detecting interest cache poisoning in sensor networks using an artificial immune algorithm
The objective of this paper is to investigate how a Danger Theory based Artificial Immune System--in particular the Dendritic Cell Algorithm (DCA) can detect an attack on a sensor ...
Christian Wallenta, Jungwon Kim, Peter J. Bentley,...