As an immune inspired algorithm, the Dendritic Cell Algorithm (DCA) has been applied to a range of problems, particularly in the area of intrusion detection. Ideally, the intrusio...
l invaders in the form of pathogens. In this research, and abstract model of DC behaviour is developed and subsequently used to form an algorithm, the DCA. The abstraction process ...
The sophistication of modern computer malware demands run-time malware detection strategies which are not only efficient but also robust to obfuscation and evasion attempts. In thi...
Salman Manzoor, M. Zubair Shafiq, S. Momina Tabish...
In this chapter we consider a cell phone network as a set of automatically deployed sensors that records movement and interaction patterns of the population. We discuss methods fo...
Abstract. In this conceptual paper, we report on studies and initial definitions of an immune-inspired approach to temporal anomaly detection problems, where there is a strict temp...
Thiago S. Guzella, Tomaz A. Mota-Santos, Walmir M....