|
Search the dblp DataBase
Jamie Twycross:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Uwe Aickelin, Julie Greensmith, Jamie Twycross
Immune System Approaches to Intrusion Detection - A Review. [Citation Graph (0, 0)][DBLP] ICARIS, 2004, pp:316-329 [Conf]
- Jamie Twycross, Uwe Aickelin
Towards a Conceptual Framework for Innate Immunity. [Citation Graph (0, 0)][DBLP] ICARIS, 2005, pp:112-125 [Conf]
- Gianni Tedesco, Jamie Twycross, Uwe Aickelin
Integrating Innate and Adaptive Immunity for Intrusion Detection. [Citation Graph (0, 0)][DBLP] ICARIS, 2006, pp:193-202 [Conf]
- Julie Greensmith, Uwe Aickelin, Jamie Twycross
Articulation and Clarification of the Dendritic Cell Algorithm. [Citation Graph (0, 0)][DBLP] ICARIS, 2006, pp:404-417 [Conf]
- Jamie Twycross, Steve Cayzer
An Immune-based Approach to Document Classification. [Citation Graph (0, 0)][DBLP] IIS, 2003, pp:33-46 [Conf]
- Jamie Twycross, Uwe Aickelin
Biological Inspiration for Artificial Immune Systems. [Citation Graph (0, 0)][DBLP] ICARIS, 2007, pp:300-311 [Conf]
P system model optimisation by means of evolutionary based search algorithms. [Citation Graph (, )][DBLP]
A Multiscale Modeling Framework Based on P Systems. [Citation Graph (, )][DBLP]
Rule Generalisation in Intrusion Detection Systems using Snort [Citation Graph (, )][DBLP]
Immune System Approaches to Intrusion Detection - A Review [Citation Graph (, )][DBLP]
An Immune Inspired Approach to Anomaly Detection [Citation Graph (, )][DBLP]
Articulation and Clarification of the Dendritic Cell Algorithm [Citation Graph (, )][DBLP]
Biological Optimisation for Nurse Scheduling [Citation Graph (, )][DBLP]
Dendritic Cells for Anomaly Detection [Citation Graph (, )][DBLP]
Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems [Citation Graph (, )][DBLP]
libtissue - implementing innate immunity [Citation Graph (, )][DBLP]
Integrating Innate and Adaptive Immunity for Intrusion Detection [Citation Graph (, )][DBLP]
Information Fusion in the Immune System [Citation Graph (, )][DBLP]
Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory [Citation Graph (, )][DBLP]
Experimenting with Innate Immunity [Citation Graph (, )][DBLP]
Towards a Conceptual Framework for Innate Immunity [Citation Graph (, )][DBLP]
Detecting Anomalous Process Behaviour using Second Generation Artificial Immune Systems [Citation Graph (, )][DBLP]
Search in 0.014secs, Finished in 0.016secs
|