ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 0804.1266
  4. Cited By
Immune System Approaches to Intrusion Detection - A Review

Immune System Approaches to Intrusion Detection - A Review

Natural Computing (Nat. Comput.), 2004
8 April 2008
Jungwon Kim
Peter J. Bentley
U. Aickelin
Julie Greensmith
Gianni Tedesco
J. Twycross
ArXiv (abs)PDFHTML

Papers citing "Immune System Approaches to Intrusion Detection - A Review"

31 / 31 papers shown
A Real-Time Remote IDS Testbed for Connected Vehicles
A Real-Time Remote IDS Testbed for Connected Vehicles
Valentin Zieglmeier
Severin Kacianka
T. Hutzelmann
A. Pretschner
119
5
0
27 Nov 2018
Anomaly Detection with the Voronoi Diagram Evolutionary Algorithm
Anomaly Detection with the Voronoi Diagram Evolutionary Algorithm
Luis Martí
Arsène Fansi Tchango
Laurent Navarro
Marc Schoenauer
62
6
0
27 Oct 2016
Modelling Cyber-Security Experts' Decision Making Processes using
  Aggregation Operators
Modelling Cyber-Security Experts' Decision Making Processes using Aggregation Operators
Simon Miller
Christian Wagner
U. Aickelin
J. Garibaldi
73
24
0
30 Aug 2016
Anomaly Detection Framework Using Rule Extraction for Efficient
  Intrusion Detection
Anomaly Detection Framework Using Rule Extraction for Efficient Intrusion Detection
Antti Juvonen
T. Sipola
95
8
0
28 Oct 2014
A Self-Adaptive Network Protection System
A Self-Adaptive Network Protection System
Mohamed A. Hassan
94
0
0
08 May 2014
Relevant Feature Selection Model Using Data Mining for Intrusion
  Detection System
Relevant Feature Selection Model Using Data Mining for Intrusion Detection System
Ayman I. Madbouly
A. Gody
T. Barakat
193
30
0
30 Mar 2014
Negative Selection Approach Application in Network Intrusion Detection
  Systems
Negative Selection Approach Application in Network Intrusion Detection Systems
A. Aziz
A. Azar
Aboul Ella Hassanien
Sanaa El-Ola Hanafi
AAML
120
7
0
11 Mar 2014
Continuous Features Discretization for Anomaly Intrusion Detectors
  Generation
Continuous Features Discretization for Anomaly Intrusion Detectors Generation
A. Aziz
A. Azar
Aboul Ella Hassanien
Sanaa El-Ola Hanafi
186
27
0
07 Mar 2014
Machine Learning Techniques for Intrusion Detection
Machine Learning Techniques for Intrusion Detection
M. Zamani
Mahnush Movahedi
250
135
0
08 Dec 2013
A hybrid artificial immune system and Self Organising Map for network
  intrusion detection
A hybrid artificial immune system and Self Organising Map for network intrusion detectionInformation Sciences (Inf. Sci.), 2008
Simon T. Powers
Jun He
154
137
0
02 Aug 2012
Learning under Concept Drift: an Overview
Learning under Concept Drift: an Overview
Indrė Žliobaitė
208
474
0
22 Oct 2010
Detecting Danger: The Dendritic Cell Algorithm
Detecting Danger: The Dendritic Cell Algorithm
Julie Greensmith
U. Aickelin
Steve Cayzer
264
58
0
25 Jun 2010
Detecting Anomalous Process Behaviour using Second Generation Artificial
  Immune Systems
Detecting Anomalous Process Behaviour using Second Generation Artificial Immune Systems
J. Twycross
U. Aickelin
Amanda M. Whitbrook
232
22
0
18 Jun 2010
Towards a Conceptual Framework for Innate Immunity
Towards a Conceptual Framework for Innate Immunity
J. Twycross
U. Aickelin
AI4CE
205
73
0
08 Jun 2010
The DCA:SOMe Comparison A comparative study between two
  biologically-inspired algorithms
The DCA:SOMe Comparison A comparative study between two biologically-inspired algorithms
Julie Greensmith
Jan Feyereisl
U. Aickelin
334
40
0
08 Jun 2010
Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for
  Anomoly Detection
Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomoly Detection
Julie Greensmith
U. Aickelin
Steve Cayzer
219
330
0
19 Apr 2010
Malicious Code Execution Detection and Response Immune System inspired
  by the Danger Theory
Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory
Jungwon Kim
Julie Greensmith
J. Twycross
U. Aickelin
178
33
0
22 Mar 2010
Information Fusion in the Immune System
Information Fusion in the Immune SystemInformation Fusion (Inf. Fusion), 2010
J. Twycross
U. Aickelin
182
40
0
08 Mar 2010
Dendritic Cells for SYN Scan Detection
Dendritic Cells for SYN Scan DetectionAnnual Conference on Genetic and Evolutionary Computation (GECCO), 2007
Julie Greensmith
U. Aickelin
224
75
0
01 Feb 2010
Dendritic Cells for Anomaly Detection
Dendritic Cells for Anomaly DetectionInternational Conference on Evolutionary Computation (ICEC), 2006
Julie Greensmith
J. Twycross
U. Aickelin
262
105
0
14 Jan 2010
Cooperative Automated Worm Response and Detection Immune Algorithm
Cooperative Automated Worm Response and Detection Immune AlgorithmInternational Conference on Artificial Immune Systems (ICARIS), 2005
Jungwon Kim
William O. Wilson
U. Aickelin
J. McLeod
211
55
0
13 Jan 2010
Inspiration from genetics to promote recognition and protection within
  ad hoc sensor networks
Inspiration from genetics to promote recognition and protection within ad hoc sensor networks
R. Korsnes
Knut Øvsthus
142
0
0
28 Dec 2009
Articulation and Clarification of the Dendritic Cell Algorithm
Articulation and Clarification of the Dendritic Cell Algorithm
Julie Greensmith
U. Aickelin
J. Twycross
178
128
0
26 Oct 2009
An Immune Inspired Approach to Anomaly Detection
An Immune Inspired Approach to Anomaly Detection
J. Twycross
U. Aickelin
128
19
0
16 Oct 2009
AIS for Misbehavior Detection in Wireless Sensor Networks: Performance
  and Design Principles
AIS for Misbehavior Detection in Wireless Sensor Networks: Performance and Design PrinciplesIEEE Congress on Evolutionary Computation (CEC), 2007
M. Drozda
S. Schaust
H. Szczerbicka
195
64
0
18 Jun 2009
A Network Protection Framework through Artificial Immunity
A Network Protection Framework through Artificial Immunity
M. Hilker
Christoph Schommer
166
0
0
13 May 2008
Next Challenges in Bringing Artificial Immune Systems to Production in
  Network Security
Next Challenges in Bringing Artificial Immune Systems to Production in Network Security
M. Hilker
235
3
0
13 May 2008
Distributed Self Management for Distributed Security Systems
Distributed Self Management for Distributed Security Systems
M. Hilker
GNN
393
3
0
13 May 2008
SANA - Network Protection through artificial Immunity
SANA - Network Protection through artificial Immunity
M. Hilker
Christoph Schommer
359
2
0
07 May 2008
Rule Generalisation in Intrusion Detection Systems using Snort
Rule Generalisation in Intrusion Detection Systems using SnortInternational Journal of Electronic Security and Digital Forensics (IJESDF), 2008
U. Aickelin
J. Twycross
Thomas Hesketh-Roberts
270
24
0
20 Mar 2008
Sensing Danger: Innate Immunology for Intrusion Detection
Sensing Danger: Innate Immunology for Intrusion DetectionInformation Security Technical Report (ISTR), 2007
U. Aickelin
Julie Greensmith
450
67
0
27 Feb 2008
1
Page 1 of 1