Jamie Twycross
Cited by
Cited by
Immune system approaches to intrusion detection–a review
J Kim, PJ Bentley, U Aickelin, J Greensmith, G Tedesco, J Twycross
Natural computing 6, 413-466, 2007
A new accuracy measure based on bounded relative error for time series forecasting
C Chen, J Twycross, JM Garibaldi
PloS one 12 (3), e0174202, 2017
Immune system approaches to intrusion detection–a review
U Aickelin, J Greensmith, J Twycross
Artificial Immune Systems: Third International Conference, ICARIS 2004 …, 2004
Implementing and testing a virus throttle
J Twycross, MM Williamson
12th USENIX Security Symposium (USENIX Security 03), 2003
A thermodynamic switch modulates abscisic acid receptor sensitivity
F Dupeux, J Santiago, K Betz, J Twycross, SY Park, L Rodriguez, ...
The EMBO journal 30 (20), 4171-4184, 2011
Articulation and clarification of the dendritic cell algorithm
J Greensmith, U Aickelin, J Twycross
Artificial Immune Systems: 5th International Conference, ICARIS 2006, Oeiras …, 2006
Dendritic cells for anomaly detection
J Greensmith, J Twycross, U Aickelin
2006 IEEE international conference on evolutionary computation, 664-671, 2006
Integrated innate and adaptive artificial immune systems applied to process anomaly detection
JP Twycross, U Aickelin
University of Nottingham, 2007
Towards a conceptual framework for innate immunity
J Twycross, U Aickelin
International Conference on Artificial Immune Systems, 112-125, 2005
Libtissue-implementing innate immunity
J Twycross, U Aickelin
2006 IEEE International Conference on Evolutionary Computation, 499-506, 2006
Stochastic and deterministic multiscale models for systems biology: an auxin-transport case study
J Twycross, LR Band, MJ Bennett, JR King, N Krasnogor
BMC Systems Biology 4, 1-11, 2010
Modular assembly of cell systems biology models using P systems
FJ Romero-Campero, J Twycross, M Cámara, M Bennett, M Gheorghe, ...
International Journal of Foundations of Computer Science 20 (03), 427-442, 2009
The Infobiotics Workbench: an integrated in silico modelling platform for Systems and Synthetic Biology
J Blakes, J Twycross, FJ Romero− Campero, N Krasnogor
Bioinformatics 27 (23), 3323-3324, 2011
Malicious code execution detection and response immune system inspired by the danger theory
J Kim, J Greensmith, J Twycross, U Aickelin
arXiv preprint arXiv:1003.4142, 2010
Detecting danger: Applying a novel immunological concept to intrusion detection systems
J Greensmith, U Aickelin, J Twycross
arXiv preprint arXiv:1002.0696, 2010
Identification of gene modules associated with low temperatures response in bambara groundnut by network-based analysis
VS Bonthala, K Mayes, J Moreton, M Blythe, V Wright, ST May, ...
PLoS One 11 (2), e0148771, 2016
Information fusion in the immune system
J Twycross, U Aickelin
Information Fusion 11 (1), 35-44, 2010
Rule generalisation in intrusion detection systems using SNORT
U Aickelin, J Twycross, T Hesketh-Roberts
International Journal of Electronic Security and Digital Forensics 1 (1 …, 2007
Measuring and modelling the response of Klebsiella pneumoniae KPC prey to Bdellovibrio bacteriovorus predation, in human serum and defined buffer
M Baker, D Negus, D Raghunathan, P Radford, C Moore, G Clark, ...
Scientific reports 7 (1), 8329, 2017
Dual Predation by Bacteriophage and Bdellovibrio bacteriovorus Can Eradicate Escherichia coli Prey in Situations where Single Predation Cannot
L Hobley, JK Summers, R Till, DS Milner, RJ Atterbury, A Stroud, ...
Journal of Bacteriology 202 (6), 10.1128/jb. 00629-19, 2020
The system can't perform the operation now. Try again later.
Articles 1–20