Remember Me
Or use your Academic/Social account:


Or use your Academic/Social account:


You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.


Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message


Verify Password:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Twycross, Jamie; Aickelin, Uwe (2010)
Languages: English
Types: Unknown
Subjects: Computer Science - Artificial Intelligence, Computer Science - Neural and Evolutionary Computing
In a previous paper the authors argued the case for incorporating ideas from innate immunity into artificial\ud immune systems (AISs) and presented an outline for a conceptualframework for such systems. A number of key general properties observed in the biological innate and adaptive immune systems were highlighted, and how such properties might be instantiated in artificial systems was discussed in detail. The next logical step is to take these ideas and build a software system with which AISs with these properties can be implemented and experimentally evaluated. This paper reports on the results of that step - the libtissue system.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • [1] P. Bentley, J. Greensmith, and S. Ujjin, “Two ways to grow tissue for artificial immune systems,” in 4th Int. Conference on Artificial Immune Systems. Banff, Canada: LNCS 3627, 2005, pp. 139-152.
    • [2] J. Twycross and U. Aickelin, “Towards a conceptual framework for innate immunity,” in 4th Int. Conference on Artificial Immune Systems. Banff, Canada: LNCS 3627, 2005, pp. 112-125.
    • [3] R. N. Germain, “An innately interesting decade of research in immunology,” Nature Medicine, vol. 10, no. 12, pp. 1307-1320, 2004.
    • [4] N. Provos, “Improving host security with system call policies,” in Proc. of the 12th USENIX Security Symposium, Washington, D.C., August 2003, pp. 257-272.
    • [5] “Lincoln Labs DARPA Intrusion Detection Evaluation,” http://www.ll. mit.edu/IST/ideval/.
    • [6] “strace homepage,” http://www.liacs.nl/∼wichert/strace/.
    • [7] C. Kruegel, D. Mutz, F. Valeur, and G. Vigna, “On the detection of anomalous system call arguments,” in Proc. of the 8th European Symposium on Research in Computer Security (ESORICS '03), Gjovik, Norway, October 2003, pp. 326-343.
    • [8] D. Gao, M. K. Reiter, and D. Song, “On gray-box program tracking for anomaly detection,” in Proc. of the 13th USENIX Security Symposium, San Diego, CA, August 2004, pp. 103-118.
    • [9] J. Greensmith, J. Twycross, and U. Aickelin, “Dendritic cells for anomaly detection,” Submitted to CEC06, 2006.
  • No related research data.
  • Discovered through pilot similarity algorithms. Send us your feedback.

    Title Year Similarity

    Experimenting with Innate Immunity


Share - Bookmark

Cite this article