Sciweavers

17 search results - page 3 / 4
» Detecting Danger: The Dendritic Cell Algorithm
Sort
View
GECCO
2007
Springer
149views Optimization» more  GECCO 2007»
13 years 12 months ago
Dendritic cells for SYN scan detection
Artificial immune systems have previously been applied to the problem of intrusion detection. The aim of this research is to develop an intrusion detection system based on the fu...
Julie Greensmith, Uwe Aickelin
CORR
2010
Springer
106views Education» more  CORR 2010»
13 years 5 months ago
Further Exploration of the Dendritic Cell Algorithm: Antigen Multiplier and Time Windows
Abstract. As an immune-inspired algorithm, the Dendritic Cell Algorithm (DCA), produces promising performance in the field of anomaly detection. This paper presents the application...
Feng Gu, Julie Greensmith, Uwe Aickelin
CORR
2010
Springer
167views Education» more  CORR 2010»
13 years 5 months ago
The DCA:SOMe Comparison A comparative study between two biologically-inspired algorithms
The Dendritic Cell Algorithm (DCA) is an immune-inspired algorithm, developed for the purpose of anomaly detection. The algorithm performs multi-sensor data fusion and correlation ...
Julie Greensmith, Jan Feyereisl, Uwe Aickelin
CEC
2008
IEEE
14 years 7 days ago
DCA for bot detection
Abstract— Ensuring the security of computers is a nontrivial task, with many techniques used by malicious users to compromise these systems. In recent years a new threat has emer...
Yousof Al-Hammadi, Uwe Aickelin, Julie Greensmith
CORR
2010
Springer
140views Education» more  CORR 2010»
13 years 5 months ago
Performance Evaluation of DCA and SRC on a Single Bot Detection
: Malicious users try to compromise systems using new techniques. One of the recent techniques used by the attacker is to perform complex distributed attacks such as denial of serv...
Yousof Al-Hammadi, Uwe Aickelin, Julie Greensmith