Alert button
Picture for Julie Greensmith

Julie Greensmith

Alert button

Quiet in Class: Classification, Noise and the Dendritic Cell Algorithm

Add code
Bookmark button
Alert button
Jul 04, 2013
Feng Gu, Jan Feyereisl, Robert Oates, Jenna Reps, Julie Greensmith, Uwe Aickelin

Figure 1 for Quiet in Class: Classification, Noise and the Dendritic Cell Algorithm
Figure 2 for Quiet in Class: Classification, Noise and the Dendritic Cell Algorithm
Viaarxiv icon

Theoretical formulation and analysis of the deterministic dendritic cell algorithm

Add code
Bookmark button
Alert button
May 31, 2013
Feng Gu, Julie Greensmith, Uwe Aickelin

Figure 1 for Theoretical formulation and analysis of the deterministic dendritic cell algorithm
Figure 2 for Theoretical formulation and analysis of the deterministic dendritic cell algorithm
Figure 3 for Theoretical formulation and analysis of the deterministic dendritic cell algorithm
Figure 4 for Theoretical formulation and analysis of the deterministic dendritic cell algorithm
Viaarxiv icon

The Dendritic Cell Algorithm for Intrusion Detection

Add code
Bookmark button
Alert button
May 31, 2013
Feng Gu, Julie Greensmith, Uwe Aickelin

Figure 1 for The Dendritic Cell Algorithm for Intrusion Detection
Figure 2 for The Dendritic Cell Algorithm for Intrusion Detection
Figure 3 for The Dendritic Cell Algorithm for Intrusion Detection
Figure 4 for The Dendritic Cell Algorithm for Intrusion Detection
Viaarxiv icon

Immune System Approaches to Intrusion Detection - A Review (ICARIS)

Add code
Bookmark button
Alert button
May 30, 2013
Uwe Aickelin, Julie Greensmith, Jamie Twycross

Figure 1 for Immune System Approaches to Intrusion Detection - A Review (ICARIS)
Viaarxiv icon

Detecting Danger: The Dendritic Cell Algorithm

Add code
Bookmark button
Alert button
Jun 25, 2010
Julie Greensmith, Uwe Aickelin, Steve Cayzer

Figure 1 for Detecting Danger: The Dendritic Cell Algorithm
Figure 2 for Detecting Danger: The Dendritic Cell Algorithm
Figure 3 for Detecting Danger: The Dendritic Cell Algorithm
Figure 4 for Detecting Danger: The Dendritic Cell Algorithm
Viaarxiv icon

Artificial Immune Systems (2010)

Add code
Bookmark button
Alert button
Jun 25, 2010
Julie Greensmith, Amanda Whitbrook, Uwe Aickelin

Figure 1 for Artificial Immune Systems (2010)
Figure 2 for Artificial Immune Systems (2010)
Figure 3 for Artificial Immune Systems (2010)
Viaarxiv icon

The DCA:SOMe Comparison A comparative study between two biologically-inspired algorithms

Add code
Bookmark button
Alert button
Jun 08, 2010
Julie Greensmith, Jan Feyereisl, Uwe Aickelin

Figure 1 for The DCA:SOMe Comparison A comparative study between two biologically-inspired algorithms
Figure 2 for The DCA:SOMe Comparison A comparative study between two biologically-inspired algorithms
Figure 3 for The DCA:SOMe Comparison A comparative study between two biologically-inspired algorithms
Figure 4 for The DCA:SOMe Comparison A comparative study between two biologically-inspired algorithms
Viaarxiv icon

The Deterministic Dendritic Cell Algorithm

Add code
Bookmark button
Alert button
Jun 08, 2010
Julie Greensmith, Uwe Aickelin

Figure 1 for The Deterministic Dendritic Cell Algorithm
Figure 2 for The Deterministic Dendritic Cell Algorithm
Figure 3 for The Deterministic Dendritic Cell Algorithm
Viaarxiv icon

The Application of a Dendritic Cell Algorithm to a Robotic Classifier

Add code
Bookmark button
Alert button
Apr 29, 2010
Robert Oates, Julie Greensmith, Uwe Aickelin, Jonathan M. Garibaldi, Graham Kendall

Figure 1 for The Application of a Dendritic Cell Algorithm to a Robotic Classifier
Figure 2 for The Application of a Dendritic Cell Algorithm to a Robotic Classifier
Figure 3 for The Application of a Dendritic Cell Algorithm to a Robotic Classifier
Figure 4 for The Application of a Dendritic Cell Algorithm to a Robotic Classifier
Viaarxiv icon

Performance Evaluation of DCA and SRC on a Single Bot Detection

Add code
Bookmark button
Alert button
Apr 22, 2010
Yousof Al-Hammadi, Uwe Aickelin, Julie Greensmith

Figure 1 for Performance Evaluation of DCA and SRC on a Single Bot Detection
Figure 2 for Performance Evaluation of DCA and SRC on a Single Bot Detection
Figure 3 for Performance Evaluation of DCA and SRC on a Single Bot Detection
Figure 4 for Performance Evaluation of DCA and SRC on a Single Bot Detection
Viaarxiv icon