Alert button
Picture for Gianni Tedesco

Gianni Tedesco

Alert button

Real-Time Alert Correlation with Type Graphs

Add code
Bookmark button
Alert button
Apr 23, 2010
Gianni Tedesco, Uwe Aickelin

Figure 1 for Real-Time Alert Correlation with Type Graphs
Figure 2 for Real-Time Alert Correlation with Type Graphs
Figure 3 for Real-Time Alert Correlation with Type Graphs
Viaarxiv icon

Integrating Innate and Adaptive Immunity for Intrusion Detection

Add code
Bookmark button
Alert button
Mar 05, 2010
Gianni Tedesco, Jamie Twycross, Uwe Aickelin

Figure 1 for Integrating Innate and Adaptive Immunity for Intrusion Detection
Figure 2 for Integrating Innate and Adaptive Immunity for Intrusion Detection
Figure 3 for Integrating Innate and Adaptive Immunity for Intrusion Detection
Viaarxiv icon

Information Fusion for Anomaly Detection with the Dendritic Cell Algorithm

Add code
Bookmark button
Alert button
Mar 03, 2010
Julie Greensmith, Uwe Aickelin, Gianni Tedesco

Figure 1 for Information Fusion for Anomaly Detection with the Dendritic Cell Algorithm
Figure 2 for Information Fusion for Anomaly Detection with the Dendritic Cell Algorithm
Figure 3 for Information Fusion for Anomaly Detection with the Dendritic Cell Algorithm
Figure 4 for Information Fusion for Anomaly Detection with the Dendritic Cell Algorithm
Viaarxiv icon

An Immune Inspired Network Intrusion Detection System Utilising Correlation Context

Add code
Bookmark button
Alert button
Oct 16, 2009
Gianni Tedesco, Uwe Aickelin

Viaarxiv icon

Data Reduction in Intrusion Alert Correlation

Add code
Bookmark button
Alert button
May 16, 2008
Gianni Tedesco, Uwe Aickelin

Viaarxiv icon

Strategic Alert Throttling for Intrusion Detection Systems

Add code
Bookmark button
Alert button
May 16, 2008
Gianni Tedesco, Uwe Aickelin

Viaarxiv icon

Immune System Approaches to Intrusion Detection - A Review

Add code
Bookmark button
Alert button
Apr 08, 2008
Jungwon Kim, Peter J. Bentley, Uwe Aickelin, Julie Greensmith, Gianni Tedesco, Jamie Twycross

Figure 1 for Immune System Approaches to Intrusion Detection - A Review
Viaarxiv icon