J
Julie Greensmith
Researcher at University of Nottingham
Publications - 97
Citations - 3177
Julie Greensmith is an academic researcher from University of Nottingham. The author has contributed to research in topics: Artificial immune system & Intrusion detection system. The author has an hindex of 26, co-authored 96 publications receiving 3058 citations. Previous affiliations of Julie Greensmith include Hewlett-Packard.
Papers
More filters
Journal ArticleDOI
Immune system approaches to intrusion detection --- a review
TL;DR: This work provides an introduction and analysis of the key developments within the use of artificial immune systems in intrusion detection, in addition to making suggestions for future research.
Book ChapterDOI
Introducing dendritic cells as a novel immune-inspired algorithm for anomaly detection
TL;DR: An algorithm is derived based on the functionality ofritic cells, and it is hoped that this algorithm will eventually become the key component within a large, distributed immune system, based on sound immunological concepts.
Posted Content
Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomoly Detection
TL;DR: In this paper, the authors derived an algorithm based on the functionality of Dendritic cells, and used the signals and differentiation pathways to build a control mechanism for an artificial immune system.
Posted Content
Immune System Approaches to Intrusion Detection - A Review (ICARIS)
TL;DR: The algorithms used, the development of the systems and the outcome of their implementation are collated, in order to provide an introduction and review of the key developments within this field.
Book ChapterDOI
Immune System Approaches to Intrusion Detection – A Review
TL;DR: The use of artificial immune systems in intrusion detection is an appealing concept for two reasons: Firstly, the human immune system provides the human body with a high level of protection from invading pathogens, in a robust, self-organised and distributed manner; Secondly, current techniques used in computer security are not able to cope with the dynamic and increasingly complex nature of computer systems and their security as discussed by the authors.