scispace - formally typeset
J

Julie Greensmith

Researcher at University of Nottingham

Publications -  97
Citations -  3177

Julie Greensmith is an academic researcher from University of Nottingham. The author has contributed to research in topics: Artificial immune system & Intrusion detection system. The author has an hindex of 26, co-authored 96 publications receiving 3058 citations. Previous affiliations of Julie Greensmith include Hewlett-Packard.

Papers
More filters
Journal ArticleDOI

Immune system approaches to intrusion detection --- a review

TL;DR: This work provides an introduction and analysis of the key developments within the use of artificial immune systems in intrusion detection, in addition to making suggestions for future research.
Book ChapterDOI

Introducing dendritic cells as a novel immune-inspired algorithm for anomaly detection

TL;DR: An algorithm is derived based on the functionality ofritic cells, and it is hoped that this algorithm will eventually become the key component within a large, distributed immune system, based on sound immunological concepts.
Posted Content

Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomoly Detection

TL;DR: In this paper, the authors derived an algorithm based on the functionality of Dendritic cells, and used the signals and differentiation pathways to build a control mechanism for an artificial immune system.
Posted Content

Immune System Approaches to Intrusion Detection - A Review (ICARIS)

TL;DR: The algorithms used, the development of the systems and the outcome of their implementation are collated, in order to provide an introduction and review of the key developments within this field.
Book ChapterDOI

Immune System Approaches to Intrusion Detection – A Review

TL;DR: The use of artificial immune systems in intrusion detection is an appealing concept for two reasons: Firstly, the human immune system provides the human body with a high level of protection from invading pathogens, in a robust, self-organised and distributed manner; Secondly, current techniques used in computer security are not able to cope with the dynamic and increasingly complex nature of computer systems and their security as discussed by the authors.