default search action
Julie Greensmith
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c27]Julie Greensmith, Longzhi Yang:
TwoDCA: A 2-Dimensional Dendritic Cell Algorithm with Dynamic Cell Migration. CEC 2022: 1-8 - 2021
- [c26]Amanda Saunders, Daniel A. Ashlock, Julie Greensmith:
Necrotic Behavioral Control of Agent Behavior in the Iterated Prisoner's Dilemma. CEC 2021: 1593-1600 - 2020
- [c25]Daniel A. Ashlock, Julie Greensmith:
Necrotic Control of the Aesthetics of Evolved Art. CEC 2020: 1-8 - [c24]Daniel A. Ashlock, Julie Greensmith:
Further Exploration of Necrotic Control of Evolved Art. SSCI 2020: 2957-2964
2010 – 2019
- 2019
- [c23]Luke Skarth-Hayley, Julie Greensmith:
Demonstrating Customisation Markup in the Siren Songs Sonification System. Audio Mostly Conference 2019: 282-286 - [c22]Julie Greensmith:
Migration Threshold Tuning in the Deterministic Dendritic Cell Algorithm. TPNC 2019: 122-133 - 2017
- [c21]Julie Greensmith, Michael B. Gale:
The Functional Dendritic Cell Algorithm: A formal specification with Haskell. CEC 2017: 1787-1794 - 2016
- [c20]Julie Greensmith, Andrew M. Jackson, Ian Spendlove:
Exploiting the Plasticity of Primary and Secondary Response Mechanisms in Artificial Immune Systems. GECCO (Companion) 2016: 7-8 - 2015
- [c19]Julie Greensmith:
Securing the Internet of Things with Responsive Artificial Immune Systems. GECCO 2015: 113-120 - 2013
- [j6]Feng Gu, Julie Greensmith, Uwe Aickelin:
Theoretical formulation and analysis of the deterministic dendritic cell algorithm. Biosyst. 111(2): 127-135 (2013) - [c18]Emma Hart, Mark Read, Chris McEwan, Uwe Aickelin, Julie Greensmith:
On the Role of the AIS Practitioner. ECAL 2013: 891-892 - [c17]Robert S. K. Miles, Julie Greensmith, Holger Schnädelbach, Jonathan M. Garibaldi:
Towards a method of identifying the causes of poor user experience on websites. UKCI 2013: 258-265 - [i28]Uwe Aickelin, Julie Greensmith, Jamie Twycross:
Immune System Approaches to Intrusion Detection - A Review (ICARIS). CoRR abs/1305.7144 (2013) - [i27]Feng Gu, Julie Greensmith, Uwe Aickelin:
The Dendritic Cell Algorithm for Intrusion Detection. CoRR abs/1305.7416 (2013) - [i26]Feng Gu, Julie Greensmith, Uwe Aickelin:
Theoretical formulation and analysis of the deterministic dendritic cell algorithm. CoRR abs/1305.7476 (2013) - [i25]Feng Gu, Jan Feyereisl, Robert F. Oates, Jenna Reps, Julie Greensmith, Uwe Aickelin:
Quiet in Class: Classification, Noise and the Dendritic Cell Algorithm. CoRR abs/1307.1391 (2013) - [i24]Aslam Ahmed, Julie Greensmith, Uwe Aickelin:
Variance in System Dynamics and Agent Based Modelling Using the SIR Model of Infectious Disease. CoRR abs/1307.2001 (2013) - 2012
- [c16]Aslam Ahmed, Julie Greensmith, Uwe Aickelin:
Variance In System Dynamics And Agent Based Modelling Using The SIR Model Of Infectious Disease. ECMS 2012: 9-15 - [p2]Feng Gu, Julie Greensmith, Uwe Aickelin:
The Dendritic Cell Algorithm for Intrusion Detection. Biologically Inspired Networking and Sensing 2012: 84-102 - [e1]Carlos A. Coello Coello, Julie Greensmith, Natalio Krasnogor, Pietro Liò, Giuseppe Nicosia, Mario Pavone:
Artificial Immune Systems - 11th International Conference, ICARIS 2012, Taormina, Italy, August 28-31, 2012. Proceedings. Lecture Notes in Computer Science 7597, Springer 2012, ISBN 978-3-642-33756-7 [contents] - 2011
- [c15]Feng Gu, Jan Feyereisl, Robert F. Oates, Jenna Reps, Julie Greensmith, Uwe Aickelin:
Quiet in Class: Classification, Noise and the Dendritic Cell Algorithm. ICARIS 2011: 173-186 - [c14]Stefan Rennick Egglestone, Amanda M. Whitbrook, Caroline Leygue, Julie Greensmith, Brendan Walker, Steve Benford, Holger Schnädelbach, Stuart Reeves, Joe Marshall, David S. Kirk, Paul Tennent, Ainojie Alexander Irune, Duncan Rowland:
Personalizing the Theme Park: Psychometric Profiling and Physiological Monitoring. UMAP 2011: 281-292 - 2010
- [j5]Stefan Rennick Egglestone, Amanda M. Whitbrook, Julie Greensmith, Brendan Walker, Steve Benford, Joe Marshall, David S. Kirk, Holger Schnädelbach, Ainojie Alexander Irune, Duncan Rowland:
Recommending Rides: Psychometric Profiling in the Theme Park. Comput. Entertain. 8(3): 21:1-21:17 (2010) - [j4]Julie Greensmith, Uwe Aickelin, Gianni Tedesco:
Information fusion for anomaly detection with the dendritic cell algorithm. Inf. Fusion 11(1): 21-34 (2010) - [i23]Yousof Al-Hammadi, Uwe Aickelin, Julie Greensmith:
DCA for Bot Detection. CoRR abs/1001.2195 (2010) - [i22]Julie Greensmith, Uwe Aickelin:
Dendritic Cells for Real-Time Anomaly Detection. CoRR abs/1001.2405 (2010) - [i21]Julie Greensmith, Jamie Twycross, Uwe Aickelin:
Dendritic Cells for Anomaly Detection. CoRR abs/1001.2411 (2010) - [i20]Julie Greensmith, Uwe Aickelin:
Dendritic Cells for SYN Scan Detection. CoRR abs/1002.0276 (2010) - [i19]Julie Greensmith, Uwe Aickelin, Jamie Twycross:
Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems. CoRR abs/1002.0696 (2010) - [i18]Feng Gu, Julie Greensmith, Uwe Aickelin:
Further Exploration of the Dendritic Cell Algorithm: Antigen Multiplier and Time Windows. CoRR abs/1003.0319 (2010) - [i17]Feng Gu, Julie Greensmith, Uwe Aickelin:
Exploration Of The Dendritic Cell Algorithm Using The Duration Calculus. CoRR abs/1003.0404 (2010) - [i16]Julie Greensmith, Uwe Aickelin, Gianni Tedesco:
Information Fusion for Anomaly Detection with the Dendritic Cell Algorithm. CoRR abs/1003.0789 (2010) - [i15]Feng Gu, Julie Greensmith, Uwe Aickelin:
Integrating Real-Time Analysis With The Dendritic Cell Algorithm Through Segmentation. CoRR abs/1003.4140 (2010) - [i14]Jungwon Kim, Julie Greensmith, Jamie Twycross, Uwe Aickelin:
Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory. CoRR abs/1003.4142 (2010) - [i13]Julie Greensmith, Uwe Aickelin, Steve Cayzer:
Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomoly Detection. CoRR abs/1004.3196 (2010) - [i12]Feng Gu, Julie Greensmith, Robert F. Oates, Uwe Aickelin:
PCA 4 DCA: The Application Of Principal Component Analysis To The Dendritic Cell Algorithm. CoRR abs/1004.3460 (2010) - [i11]Yousof Al-Hammadi, Uwe Aickelin, Julie Greensmith:
Performance Evaluation of DCA and SRC on a Single Bot Detection. CoRR abs/1004.3919 (2010) - [i10]Robert F. Oates, Julie Greensmith, Uwe Aickelin, Jonathan M. Garibaldi, Graham Kendall:
The Application of a Dendritic Cell Algorithm to a Robotic Classifier. CoRR abs/1004.5222 (2010) - [i9]Julie Greensmith, Uwe Aickelin:
The Deterministic Dendritic Cell Algorithm. CoRR abs/1006.1512 (2010) - [i8]Julie Greensmith, Jan Feyereisl, Uwe Aickelin:
The DCA:SOMe Comparison A comparative study between two biologically-inspired algorithms. CoRR abs/1006.1518 (2010) - [i7]Julie Greensmith, Amanda M. Whitbrook, Uwe Aickelin:
Artificial Immune Systems (2010). CoRR abs/1006.4949 (2010) - [i6]Julie Greensmith, Uwe Aickelin, Steve Cayzer:
Detecting Danger: The Dendritic Cell Algorithm. CoRR abs/1006.5008 (2010)
2000 – 2009
- 2009
- [c13]Feng Gu, Julie Greensmith, Uwe Aickelin:
Integrating real-time analysis with the dendritic cell algorithm through segmentation. GECCO 2009: 1203-1210 - [c12]Feng Gu, Julie Greensmith, Uwe Aickelin:
Exploration of the Dendritic Cell Algorithm Using the Duration Calculus. ICARIS 2009: 54-66 - [p1]Julie Greensmith, Uwe Aickelin:
Artificial Dendritic Cells: Multi-faceted Perspectives. Human-Centric Information Processing Through Granular Modelling 2009: 375-395 - [i5]Julie Greensmith, Uwe Aickelin:
Artificial Dendritic Cells: Multi-faceted Perspectives. CoRR abs/0907.3867 (2009) - [i4]Feng Gu, Uwe Aickelin, Julie Greensmith:
An Agent Based Classification Model. CoRR abs/0910.2874 (2009) - [i3]Julie Greensmith, Uwe Aickelin, Jamie Twycross:
Articulation and Clarification of the Dendritic Cell Algorithm. CoRR abs/0910.4903 (2009) - 2008
- [j3]Julie Greensmith, Jan Feyereisl, Uwe Aickelin:
The DCA: SOMe comparison - A comparative study between two biologically inspired algorithms. Evol. Intell. 1(2): 85-112 (2008) - [c11]Yousof Al-Hammadi, Uwe Aickelin, Julie Greensmith:
DCA for bot detection. IEEE Congress on Evolutionary Computation 2008: 1807-1816 - [c10]Feng Gu, Julie Greensmith, Uwe Aickelin:
Further Exploration of the Dendritic Cell Algorithm: Antigen Multiplier and Time Windows. ICARIS 2008: 142-153 - [c9]Julie Greensmith, Uwe Aickelin:
The Deterministic Dendritic Cell Algorithm. ICARIS 2008: 291-302 - [i2]Uwe Aickelin, Julie Greensmith:
Sensing Danger: Innate Immunology for Intrusion Detection. CoRR abs/0802.4002 (2008) - [i1]Jungwon Kim, Peter J. Bentley, Uwe Aickelin, Julie Greensmith, Gianni Tedesco, Jamie Twycross:
Immune System Approaches to Intrusion Detection - A Review. CoRR abs/0804.1266 (2008) - 2007
- [b1]Julie Greensmith:
The dendritic cell algorithm. University of Nottingham, UK, 2007 - [j2]Uwe Aickelin, Julie Greensmith:
Sensing danger: Innate immunology for intrusion detection. Inf. Secur. Tech. Rep. 12(4): 218-227 (2007) - [j1]Jungwon Kim, Peter J. Bentley, Uwe Aickelin, Julie Greensmith, Gianni Tedesco, Jamie Twycross:
Immune system approaches to intrusion detection - a review. Nat. Comput. 6(4): 413-466 (2007) - [c8]Julie Greensmith, Uwe Aickelin:
Dendritic cells for SYN scan detection. GECCO 2007: 49-56 - [c7]Robert F. Oates, Julie Greensmith, Uwe Aickelin, Jonathan M. Garibaldi, Graham Kendall:
The Application of a Dendritic Cell Algorithm to a Robotic Classifier. ICARIS 2007: 204-215 - 2006
- [c6]Julie Greensmith, Jamie Twycross, Uwe Aickelin:
Dendritic Cells for Anomaly Detection. IEEE Congress on Evolutionary Computation 2006: 664-671 - [c5]Julie Greensmith, Uwe Aickelin, Jamie Twycross:
Articulation and Clarification of the Dendritic Cell Algorithm. ICARIS 2006: 404-417 - 2005
- [c4]Peter J. Bentley, Julie Greensmith, Supiya Ujjin:
Two Ways to Grow Tissue for Artificial Immune Systems. ICARIS 2005: 139-152 - [c3]Julie Greensmith, Uwe Aickelin, Steve Cayzer:
Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection. ICARIS 2005: 153-167 - 2004
- [c2]Uwe Aickelin, Julie Greensmith, Jamie Twycross:
Immune System Approaches to Intrusion Detection - A Review. ICARIS 2004: 316-329 - 2003
- [c1]Julie Greensmith, Steve Cayzer:
An Artificial Immune System Approach to Semantic Document Classification. ICARIS 2003: 136-146
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:47 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint