Jamie Twycross
Title
Cited by
Cited by
Year
Immune system approaches to intrusion detection–a review
J Kim, PJ Bentley, U Aickelin, J Greensmith, G Tedesco, J Twycross
Natural computing 6 (4), 413-466, 2007
3742007
Immune system approaches to intrusion detection–a review
U Aickelin, J Greensmith, J Twycross
International Conference on Artificial Immune Systems, 316-329, 2004
2542004
Implementing and Testing a Virus Throttle.
J Twycross, MM Williamson
USENIX Security Symposium 285, 294, 2003
2382003
Articulation and clarification of the dendritic cell algorithm
J Greensmith, U Aickelin, J Twycross
International Conference on Artificial Immune Systems, 404-417, 2006
1532006
A thermodynamic switch modulates abscisic acid receptor sensitivity
F Dupeux, J Santiago, K Betz, J Twycross, SY Park, L Rodriguez, ...
The EMBO journal 30 (20), 4171-4184, 2011
1402011
Dendritic cells for anomaly detection
J Greensmith, J Twycross, U Aickelin
2006 IEEE International Conference on Evolutionary Computation, 664-671, 2006
1222006
A new accuracy measure based on bounded relative error for time series forecasting
C Chen, J Twycross, JM Garibaldi
PloS one 12 (3), e0174202, 2017
842017
Integrated innate and adaptive artificial immune systems applied to process anomaly detection
JP Twycross, U Aickelin
University of Nottingham, 2007
842007
Towards a conceptual framework for innate immunity
J Twycross, U Aickelin
International Conference on Artificial Immune Systems, 112-125, 2005
782005
Modular assembly of cell systems biology models using P systems
FJ Romero-Campero, J Twycross, M Cámara, M Bennett, M Gheorghe, ...
International Journal of Foundations of Computer Science 20 (03), 427-442, 2009
582009
Libtissue-implementing innate immunity
J Twycross, U Aickelin
2006 IEEE International Conference on Evolutionary Computation, 499-506, 2006
572006
Stochastic and deterministic multiscale models for systems biology: an auxin-transport case study
J Twycross, LR Band, MJ Bennett, JR King, N Krasnogor
BMC systems biology 4 (1), 34, 2010
532010
Malicious code execution detection and response immune system inspired by the danger theory
J Kim, J Greensmith, J Twycross, U Aickelin
arXiv preprint arXiv:1003.4142, 2010
522010
Detecting danger: Applying a novel immunological concept to intrusion detection systems
J Greensmith, U Aickelin, J Twycross
Available at SSRN 2832029, 2004
522004
Information fusion in the immune system
J Twycross, U Aickelin
Information Fusion 11 (1), 35-44, 2010
512010
The Infobiotics Workbench: an integrated in silico modelling platform for Systems and Synthetic Biology
J Blakes, J Twycross, FJ Romero− Campero, N Krasnogor
Bioinformatics 27 (23), 3323-3324, 2011
482011
Rule generalisation in intrusion detection systems using SNORT
U Aickelin, J Twycross, T Hesketh-Roberts
International Journal of Electronic Security and Digital Forensics 1 (1 …, 2007
382007
An immune-based approach to document classification
J Twycross, S Cayzer
Intelligent Information Processing and Web Mining, 33-46, 2003
342003
An immune system approach to document classification
J Twycross, S Cayzer
Master's thesis, COGS, University of Sussex, UK 2 (00), 2, 2002
342002
Biological inspiration for artificial immune systems
J Twycross, U Aickelin
International Conference on Artificial Immune Systems, 300-311, 2007
332007
The system can't perform the operation now. Try again later.
Articles 1–20