The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Jamie Twycross: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Uwe Aickelin, Julie Greensmith, Jamie Twycross
    Immune System Approaches to Intrusion Detection - A Review. [Citation Graph (0, 0)][DBLP]
    ICARIS, 2004, pp:316-329 [Conf]
  2. Jamie Twycross, Uwe Aickelin
    Towards a Conceptual Framework for Innate Immunity. [Citation Graph (0, 0)][DBLP]
    ICARIS, 2005, pp:112-125 [Conf]
  3. Gianni Tedesco, Jamie Twycross, Uwe Aickelin
    Integrating Innate and Adaptive Immunity for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    ICARIS, 2006, pp:193-202 [Conf]
  4. Julie Greensmith, Uwe Aickelin, Jamie Twycross
    Articulation and Clarification of the Dendritic Cell Algorithm. [Citation Graph (0, 0)][DBLP]
    ICARIS, 2006, pp:404-417 [Conf]
  5. Jamie Twycross, Steve Cayzer
    An Immune-based Approach to Document Classification. [Citation Graph (0, 0)][DBLP]
    IIS, 2003, pp:33-46 [Conf]
  6. Jamie Twycross, Uwe Aickelin
    Biological Inspiration for Artificial Immune Systems. [Citation Graph (0, 0)][DBLP]
    ICARIS, 2007, pp:300-311 [Conf]

  7. P system model optimisation by means of evolutionary based search algorithms. [Citation Graph (, )][DBLP]


  8. A Multiscale Modeling Framework Based on P Systems. [Citation Graph (, )][DBLP]


  9. Rule Generalisation in Intrusion Detection Systems using Snort [Citation Graph (, )][DBLP]


  10. Immune System Approaches to Intrusion Detection - A Review [Citation Graph (, )][DBLP]


  11. An Immune Inspired Approach to Anomaly Detection [Citation Graph (, )][DBLP]


  12. Articulation and Clarification of the Dendritic Cell Algorithm [Citation Graph (, )][DBLP]


  13. Biological Optimisation for Nurse Scheduling [Citation Graph (, )][DBLP]


  14. Dendritic Cells for Anomaly Detection [Citation Graph (, )][DBLP]


  15. Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems [Citation Graph (, )][DBLP]


  16. libtissue - implementing innate immunity [Citation Graph (, )][DBLP]


  17. Integrating Innate and Adaptive Immunity for Intrusion Detection [Citation Graph (, )][DBLP]


  18. Information Fusion in the Immune System [Citation Graph (, )][DBLP]


  19. Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory [Citation Graph (, )][DBLP]


  20. Experimenting with Innate Immunity [Citation Graph (, )][DBLP]


  21. Towards a Conceptual Framework for Innate Immunity [Citation Graph (, )][DBLP]


  22. Detecting Anomalous Process Behaviour using Second Generation Artificial Immune Systems [Citation Graph (, )][DBLP]


Search in 0.014secs, Finished in 0.016secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002