LOGIN TO YOUR ACCOUNT

Username
Password
Remember Me
Or use your Academic/Social account:

CREATE AN ACCOUNT

Or use your Academic/Social account:

Congratulations!

You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.

Important!

Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message

CREATE AN ACCOUNT

Name:
Username:
Password:
Verify Password:
E-mail:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Aickelin, Uwe; Cayzer, Steve (2008)
Languages: English
Types: Article
Subjects: Computer Science - Artificial Intelligence, Computer Science - Neural and Evolutionary Computing, Computer Science - Cryptography and Security
Over the last decade, a new idea challenging the classical self-non-self viewpoint has become popular amongst immunologists. It is called the Danger Theory. In this conceptual paper, we look at this theory from the perspective of Artificial Immune System practitioners. An overview of the Danger Theory is presented with particular emphasis on analogies in the Artificial Immune Systems world. A number of potential application areas are then used to provide a framing for a critical assessment of the concept, and its relevance for Artificial Immune Systems. Notes: Uwe Aickelin, Department of Computing, University of Bradford, Bradford, BD7 1DP
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • Bradley D, Tyrell A, The Architecture for a Hardware Immune System, Proceedings of the 2002 Congress on Evolutionary Computation, 2002.
    • [2] Forrest H. Bennett III, John R. Koza, Jessen Yu, William Mydlowec, Automatic Synthesis, Placement, and Routing of an Amplifier Circuit by Means of Genetic Programming. Evolvable Systems: From Biology to Hardware, Th ird International Conference, ICES 2000: 1-10, 2000 [3] [4] [5] D. W. Bradley, Andrew M. Tyrrell, Immunotronics: Hardware Fault Tolerance Inspired by the Immune System. Evolvable Systems: From Biology to Hardware, Third International Conference, ICES 2000: 11-20, 2000 Bretscher P, Cohn M, A theory of self -nonself discrimination, Science 169, 1042-1049, 1970 Burgess M: Computer Immunology, Proceedings of LISA XII, 283-297, 1998.
    • Burnet F, The Clonal Selection Theory of Acquired Immunity, Vanderbilt University Press, Nashville, TN, 1959.
    • Cayzer S, Aickelin U, A Recommender System based on the Immune Network, Proceedings of the 2002 Congress on Evolutionary Computation , 2002.
    • Dasgupta D, Majumdar N, Nino F, Artificial Immune Systems: A Bibliography, Computer Science Division, University of Memphis, Technical Report No. CS-02-001, 2001.
    • Forrest S, Hofmeyr S, Somayaji A, Longstaff T, A sense of self for Unix processes, Proceedings of the 1996 IEEE Symposium on Research in Security and Privacy, 120-128, 1996.
    • [10] Forrest S, http://www.cs.unm.edu/~immsec/, 2002.
    • [11] Forrest S, Perelson A, Allen L, Cherukuri R, Selfnon-self discrimination in a computer, Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy, 202-212, 1994.
    • [12] Goldsby R, Kindt T, Osborne B, Kuby Immunology , Fourth Edition, W H Freeman, 2000.
    • [13] Hofmeyr S, Forrest S, Architecture for an Artificial Immune System, Evolutionary Computation 8(4), 443-473, 2000.
    • [14] Janeway C, The immune System evolved to discriminated infectious nonself from noninfectious self, Immunology Today 13, 11-16, 1992.
    • [15] Kim J, Bentley P, An evaluation of negative selection in an artificial immune for network intrusion detection, Proceedings of the 2001 Genetic and Evolutionary Computation Conference, 1330 - 1337, 2001.
    • [16] Kim J, Bentley P, Towards an Artificial Immune System for Network Intrusion Detection: An Investigation of Dynamic Clonal Selection. Proceedings of the 2002 Congress on Evolutionary Computation, 2002.
    • [17] Lafferty K, Cunningham A, A new analysis of allogeneic interactions. Australian Journal of Experimental Biology and Medical Sciences. 53:27 - 42, 1975
    • [19] Matzinger P, The Danger Model in Its Historical Context, Scandinavian Journal of Immunology, 54: 4-9, 2001.
    • [20] Matzinger P, Tolerance, Danger and the Extended Family, Annual Review of Immunology, 12:991 - 1045, 1994.
    • [21] Langman R (editor), Self non-self discrimination revisited, Seminars in Immunology 12, Issue 3, 2000.
    • [22] Somayaji A, Forrest S, Automated response using system-call delays, Proceedings of the ninth USENIX Security Symposium, 185-197, 2000.
    • [23] Williamson M, Biologically inspired approaches to computer security, HP Labs Technical Reports HPL-2002 -131, 2000 (available from http://www.hpl.hp.com/techreports/2002/HPL2002-131.html).
  • No related research data.
  • No similar publications.

Share - Bookmark

Cite this article