Remember Me
Or use your Academic/Social account:


Or use your Academic/Social account:


You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.


Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message


Verify Password:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Aickelin, Uwe
Languages: English
Types: Unknown
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • Aickelin U, Bentley P, Cayzer S, Kim J and McLeod J (2003): Danger Theory: The Link between Artificial Immune Systems and Intrusion Detection Systems?, Proceedings 2nd International Conference on Artificial Immune Systems, pp 147-155, Springer, Edinburgh, UK.
    • Aickelin U and Cayzer S (2002): The Danger Theory and Its Application to Artificial Immune Systems, Proceedings 1st International Conference on Artificial Immune Systems, pp 141-148, Canterbury, UK.
    • Amazon (2003), Amazon.com Recommendations, http://www.amazon.com/.
    • Cayzer S and Aickelin U (2002a), A Recommender System based on the Immune Network, in Proceedings CEC2002, pp 807-813, Honolulu, USA.
    • Cayzer S and Aickelin U (2002b), On the Effects of Idiotypic Interactions for Recommendation Communities in Artificial Immune Systems, Proceedings 1st International Conference on Artificial Immune Systems, pp 154-160, Canterbury, UK.
    • Cuppens F et al (2002), Correlation in an Intrusion Process, Internet Security Communication Workshop (SECI'02).
    • Dasgupta, D Editor) (1999), Artificial Immune Systems and Their Applications, Springer Verlag, 1999.
    • Dasgupta D, Gonzalez F (2002), An Immunity-Based Technique to Characterize Intrusions in Computer Networks, IEEE Trans. Evol. Comput. Vol 6; 3, pp 1081-1088.
    • L. N. De Castro and F. J. Von Zuben (2001), Learning and Optimization Using the Clonal Selection Principle. Accepted for publication at the IEEE Transactions on Evolutionary Computation, Special Issue on Artificial Immune Systems.
    • Delgado J and Ishii (2001), Multi-agent Learning in Recommender Systems For Information Filtering on the Internet Journal of Co-operative Information Systems, vol. 10, pp. 81-100, 2001.
    • Esponda F, Forrest S, Helman P (2002), Positive and Negative Detection, IEEE Transactions on Systems, Man and Cybernetics.
    • Farmer JD, Packard NH and Perelson AS (1986), The immune system, adaptation, and machine learning Physica, vol. 22, pp. 187-204, 1986.
    • Forrest, S,. Perelson, A. S., Allen, L., and R. Cherukuri. Self-Nonself Discrimination in a Computer. In Proceedings of IEEE Symposium on Research in Security and Privacy, pages202--212, Oakland, May 16-18 1994.
    • Goldsby R, Kindt T, Osborne B, Kuby Immunology, Fourth Edition, W H Freeman, 2000.
    • Hightower RR, Forrest S and Perelson AS (1995). The evolution of emergent organization in immune system gene libraries, Proceedings of the 6th Conference on Genetic Algorithms, pp. 344-350, 1995.
    • Hoagland J, Staniford S (2002), Viewing Intrusion Detection Systems alerts: Lessons from SnortSnarf, http://www.silicondefense.com/ software/snortsnarf
    • Hofmeyr S, Forrest S (2000), Architecture for an Artificial Immune Systems, Evolutionary Computation, Vol. 7, No. 1, pp 1289-1296.
    • Jerne NK (1973), Towards a network theory of the immune system Annals of Immunology, vol. 125, no. C, pp. 373-389, 1973.
    • Kim J, Bentley P (1999), The Artificial Immune Model for Network Intrusion Detection, 7th European Congress on Intelligent Techniques and Soft Computing (EUFIT'99).
    • Kim J, Bentley P (2001), Evaluating Negative Selection in an Artificial Immune Systems for Network Intrusion Detection, Genetic and Evolutionary Computation Conference 2001, 1330-1337.
    • Kim J, Bentley P (2002), Towards an Artificial Immune Systems for Network Intrusion Detection: An Investigation of Dynamic Clonal Selection, the Congress on Evolutionary Computation 2002, pp 1015-1020.
    • Kubi J (2002), Immunology, Fifth Edition by Richard A. Goldsby, Thomas J. Kindt, Barbara A. Osborne, W H Freeman.
    • Matzinger P (2003), http://cmmg.biosci.wayne.edu/asg/polly.html
    • Matzinger P (2001), The Danger Model in Its Historical Context, Scandinavian Journal of Immunology, 54: 4-9, 2001.
    • Matzinger P (1994), Tolerance, Danger and the Extended Family, Annual Review of Immunology, 12:991-1045, 1994.
    • Morrison T and Aickelin U (2002): An Artificial Immune Systems as a Recommender System for Web Sites, in Proceedings of the 1st International Conference on Artificial Immune Systems (ICARIS-2002), pp 161-169, Canterbury, UK.
    • Ning, P, Cui Y, Reeves S (2002), Constructing Attack Scenarios through Correlation of Intrusion Alerts, In Proceedings of the 9th ACM Conference on Computer & Communications Security, pp 245-254.
    • Perelson AS and Weisbuch G (1997), Immunology for physicists Reviews of Modern Physics, vol. 69, pp. 1219-1267, 1997.
    • Resnick P and Varian HR (1997), Recommender systems Communications of the ACM, vol. 40, pp. 56-58, 1997.
    • Valdes A, Skinner K (2001), Probabilistic Alert Correlation, RAID'2001, pp 54-68.
  • No related research data.
  • No similar publications.

Share - Bookmark

Cite this article