libtissue is a software system for implementing and testing AIS algorithms on real-world computer security problems. AIS algorithms are implemented as a collection of cells, antigen and signals interacting within a tissue compartment. Input data to the tissue comes in the form of realtime events generated by sensors monitoring a system under surveillance, and cells are actively able to affect the monitored system through response mechanisms. libtissue is being used by researchers on a project at the University of Nottingham to explore the application of a range of immune-inspired algorithms to problems in intrusion detection. This talk describes the architecture and design of libtissue, along with the implementation of a simple algorithm an...
The immune system is a complex and distributed system. It provides a multilevel form of defence, cap...
In a previous paper the authors argued the case for incorporating ideas from innate immunity into ar...
The use of artificial immune systems in intrusion detection is an appealing concept for two reasons....
libtissue is a software system for implementing and testing AIS algorithms on real-world computer se...
In a previous paper the authors argued the case for incorporating ideas from innate immunity into ar...
The immune system provides a rich metaphor for computer security: anomaly detection that works in na...
The immune system provides an ideal metaphor for anomaly detection in general and computer security ...
The immune system provides an ideal metaphor for anomaly detection in general and computer security ...
Abstract. The use of artificial immune systems in intrusion detection is an appealing concept...
Artificial Immune Systems have been successfully applied to a number of problem domains including fa...
Abstract. The use of artificial immune systems in intrusion detection is an appealing concept ...
The use of artificial immune systems in intrusion detection is an appealing concept for two reasons....
The use of artificial immune systems in intrusion detection is an appealing concept for two reasons....
The use of artificial immune systems in intrusion detection is an appealing concept for two reasons....
The immune system is a complex and distributed system. It provides a multilevel form of defence, cap...
The immune system is a complex and distributed system. It provides a multilevel form of defence, cap...
In a previous paper the authors argued the case for incorporating ideas from innate immunity into ar...
The use of artificial immune systems in intrusion detection is an appealing concept for two reasons....
libtissue is a software system for implementing and testing AIS algorithms on real-world computer se...
In a previous paper the authors argued the case for incorporating ideas from innate immunity into ar...
The immune system provides a rich metaphor for computer security: anomaly detection that works in na...
The immune system provides an ideal metaphor for anomaly detection in general and computer security ...
The immune system provides an ideal metaphor for anomaly detection in general and computer security ...
Abstract. The use of artificial immune systems in intrusion detection is an appealing concept...
Artificial Immune Systems have been successfully applied to a number of problem domains including fa...
Abstract. The use of artificial immune systems in intrusion detection is an appealing concept ...
The use of artificial immune systems in intrusion detection is an appealing concept for two reasons....
The use of artificial immune systems in intrusion detection is an appealing concept for two reasons....
The use of artificial immune systems in intrusion detection is an appealing concept for two reasons....
The immune system is a complex and distributed system. It provides a multilevel form of defence, cap...
The immune system is a complex and distributed system. It provides a multilevel form of defence, cap...
In a previous paper the authors argued the case for incorporating ideas from innate immunity into ar...
The use of artificial immune systems in intrusion detection is an appealing concept for two reasons....