default search action
Jamie Twycross
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c17]Hamza Abdi, Steven R. Bagley, Steven Furnell, Jamie Twycross:
Automatically Labeling Cyber Threat Intelligence reports using Natural Language Processing. DocEng 2023: 23:1-23:4 - 2022
- [j13]Nicole Pearcy, Marco Garavaglia, Thomas Millat, James P. Gilbert, Yoseb Song, Hassan Hartman, Craig Woods, Claudio Tomi-Andrino, Rajesh Reddy Bommareddy, Byung-Kwan Cho, David A. Fell, Mark Poolman, John R. King, Klaus Winzer, Jamie Twycross, Nigel P. Minton:
A genome-scale metabolic model of Cupriavidus necator H16 integrated with TraDIS and transcriptomic data reveals metabolic insights for biotechnological applications. PLoS Comput. Biol. 18(5) (2022) - 2021
- [j12]Chao Chen, Dongrui Wu, Jonathan M. Garibaldi, Robert I. John, Jamie Twycross, Jerry M. Mendel:
A Comprehensive Study of the Efficiency of Type-Reduction Algorithms. IEEE Trans. Fuzzy Syst. 29(6): 1556-1566 (2021) - 2020
- [c16]Alexandre Maciel-Guerra, Grazziela P. Figueredo, Eliane Marti, Marcos J. C. Alcocer, Jamie Twycross:
Subspace-Based Dynamic Selection: A Proof of Concept Using Protein Microarray Data. IJCNN 2020: 1-8 - [c15]Alexandre Maciel-Guerra, Grazziela P. Figueredo, Jamie Twycross:
Dynamic Selection of Classifiers Applied to High-Dimensional Small-Instance Data Sets: Problems and Challenges. LOD (1) 2020: 637-649
2010 – 2019
- 2019
- [j11]James P. Gilbert, Nicole Pearcy, Rupert Norman, Thomas Millat, Klaus Winzer, John R. King, Charlie Hodgman, Nigel P. Minton, Jamie Twycross:
Gsmodutils: a python based framework for test-driven genome scale metabolic model development. Bioinform. 35(18): 3397-3403 (2019) - [j10]Edward Acheampong, Ian L. Dryden, Jonathan A. D. Wattis, Jamie Twycross, Mark D. Scrimshaw, Rachel L. Gomes:
Modelling emerging pollutants in wastewater treatment: A Case study using the pharmaceutical 17α-ethinylestradiol. Comput. Chem. Eng. 128: 477-487 (2019) - [c14]Alexandre Maciel-Guerra, Grazziela P. Figueredo, Fernando J. Von Zuben, Eliane Marti, Jamie Twycross, Marcos J. C. Alcocer:
Microarray Feature Selection and Dynamic Selection of Classifiers for Early Detection of Insect Bite Hypersensitivity in Horses. CEC 2019: 1157-1164 - 2018
- [j9]Chao Chen, Robert I. John, Jamie Twycross, Jonathan M. Garibaldi:
A Direct Approach for Determining the Switch Points in the Karnik-Mendel Algorithm. IEEE Trans. Fuzzy Syst. 26(2): 1079-1085 (2018) - [j8]Chao Chen, Dongrui Wu, Jonathan M. Garibaldi, Robert I. John, Jamie Twycross, Jerry M. Mendel:
A Comment on "A Direct Approach for Determining the Switch Points in the Karnik-Mendel Algorithm". IEEE Trans. Fuzzy Syst. 26(6): 3905-3907 (2018) - [i16]James P. Gilbert, Jamie Twycross:
From clusters to queries: exploiting uncertainty in the modularity landscape of complex networks. CoRR abs/1806.10904 (2018) - 2017
- [c13]Chao Chen, Robert I. John, Jamie Twycross, Jonathan M. Garibaldi:
Type-1 and interval type-2 ANFIS: A comparison. FUZZ-IEEE 2017: 1-6 - 2016
- [c12]Chao Chen, Robert I. John, Jamie Twycross, Jonathan M. Garibaldi:
An extended ANFIS architecture and its learning properties for type-1 and interval type-2 models. FUZZ-IEEE 2016: 602-609 - 2013
- [i15]Uwe Aickelin, Julie Greensmith, Jamie Twycross:
Immune System Approaches to Intrusion Detection - A Review (ICARIS). CoRR abs/1305.7144 (2013) - 2011
- [j7]Jonathan Blakes, Jamie Twycross, Francisco José Romero-Campero, Natalio Krasnogor:
The Infobiotics Workbench: an integrated in silico modelling platform for Systems and Synthetic Biology. Bioinform. 27(23): 3323-3324 (2011) - 2010
- [j6]Jamie Twycross, Leah R. Band, Malcolm Bennett, John R. King, Natalio Krasnogor:
Stochastic and deterministic multiscale models for systems biology: an auxin-transport case study. BMC Syst. Biol. 4: 34 (2010) - [j5]Jamie Twycross, Uwe Aickelin, Amanda M. Whitbrook:
Detecting Anomalous Process Behaviour Using Second Generation Artificial Immune Systems. Int. J. Unconv. Comput. 6(3-4): 301-326 (2010) - [j4]Jamie Twycross, Uwe Aickelin:
Information fusion in the immune system. Inf. Fusion 11(1): 35-44 (2010) - [c11]Carlos García-Martínez, Claudio Lima, Jamie Twycross, Natalio Krasnogor, Manuel Lozano:
P system model optimisation by means of evolutionary based search algorithms. GECCO 2010: 187-194 - [i14]Jamie Twycross, Uwe Aickelin:
Biological Optimisation for Nurse Scheduling. CoRR abs/1001.2208 (2010) - [i13]Julie Greensmith, Jamie Twycross, Uwe Aickelin:
Dendritic Cells for Anomaly Detection. CoRR abs/1001.2411 (2010) - [i12]Julie Greensmith, Uwe Aickelin, Jamie Twycross:
Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems. CoRR abs/1002.0696 (2010) - [i11]Jamie Twycross, Uwe Aickelin:
libtissue - implementing innate immunity. CoRR abs/1003.0339 (2010) - [i10]Gianni Tedesco, Jamie Twycross, Uwe Aickelin:
Integrating Innate and Adaptive Immunity for Intrusion Detection. CoRR abs/1003.1256 (2010) - [i9]Jamie Twycross, Uwe Aickelin:
Information Fusion in the Immune System. CoRR abs/1003.1598 (2010) - [i8]Jungwon Kim, Julie Greensmith, Jamie Twycross, Uwe Aickelin:
Malicious Code Execution Detection and Response Immune System inspired by the Danger Theory. CoRR abs/1003.4142 (2010) - [i7]Jamie Twycross, Uwe Aickelin:
Experimenting with Innate Immunity. CoRR abs/1004.2854 (2010) - [i6]Jamie Twycross, Uwe Aickelin:
Towards a Conceptual Framework for Innate Immunity. CoRR abs/1006.1568 (2010) - [i5]Jamie Twycross, Uwe Aickelin, Amanda M. Whitbrook:
Detecting Anomalous Process Behaviour using Second Generation Artificial Immune Systems. CoRR abs/1006.3654 (2010)
2000 – 2009
- 2009
- [j3]Francisco José Romero-Campero, Jamie Twycross, Miguel Cámara, Malcolm Bennett, Marian Gheorghe, Natalio Krasnogor:
Modular Assembly of Cell Systems Biology Models Using P Systems. Int. J. Found. Comput. Sci. 20(3): 427-442 (2009) - [i4]Jamie Twycross, Uwe Aickelin:
An Immune Inspired Approach to Anomaly Detection. CoRR abs/0910.3117 (2009) - [i3]Julie Greensmith, Uwe Aickelin, Jamie Twycross:
Articulation and Clarification of the Dendritic Cell Algorithm. CoRR abs/0910.4903 (2009) - 2008
- [c10]Francisco José Romero-Campero, Jamie Twycross, Hongqing Cao, Jonathan Blakes, Natalio Krasnogor:
A Multiscale Modeling Framework Based on P Systems. Workshop on Membrane Computing 2008: 63-77 - [i2]Uwe Aickelin, Jamie Twycross, Thomas Hesketh-Roberts:
Rule Generalisation in Intrusion Detection Systems using Snort. CoRR abs/0803.2973 (2008) - [i1]Jungwon Kim, Peter J. Bentley, Uwe Aickelin, Julie Greensmith, Gianni Tedesco, Jamie Twycross:
Immune System Approaches to Intrusion Detection - A Review. CoRR abs/0804.1266 (2008) - 2007
- [b1]Jamie Paul Twycross:
Integrated innate and adaptive artificial immune systems applied to process anomaly detection. University of Nottingham, UK, 2007 - [j2]Uwe Aickelin, Jamie Twycross, Thomas Hesketh-Roberts:
Rule generalisation in intrusion detection systems using SNORT. Int. J. Electron. Secur. Digit. Forensics 1(1): 101-116 (2007) - [j1]Jungwon Kim, Peter J. Bentley, Uwe Aickelin, Julie Greensmith, Gianni Tedesco, Jamie Twycross:
Immune system approaches to intrusion detection - a review. Nat. Comput. 6(4): 413-466 (2007) - [c9]Jamie Twycross, Uwe Aickelin:
Biological Inspiration for Artificial Immune Systems. ICARIS 2007: 300-311 - 2006
- [c8]Jamie Twycross, Uwe Aickelin:
libtissue - implementing innate immunity. IEEE Congress on Evolutionary Computation 2006: 499-506 - [c7]Julie Greensmith, Jamie Twycross, Uwe Aickelin:
Dendritic Cells for Anomaly Detection. IEEE Congress on Evolutionary Computation 2006: 664-671 - [c6]Gianni Tedesco, Jamie Twycross, Uwe Aickelin:
Integrating Innate and Adaptive Immunity for Intrusion Detection. ICARIS 2006: 193-202 - [c5]Julie Greensmith, Uwe Aickelin, Jamie Twycross:
Articulation and Clarification of the Dendritic Cell Algorithm. ICARIS 2006: 404-417 - 2005
- [c4]Jamie Twycross, Uwe Aickelin:
Towards a Conceptual Framework for Innate Immunity. ICARIS 2005: 112-125 - 2004
- [c3]Uwe Aickelin, Julie Greensmith, Jamie Twycross:
Immune System Approaches to Intrusion Detection - A Review. ICARIS 2004: 316-329 - 2003
- [c2]Jamie Twycross, Steve Cayzer:
An Immune-based Approach to Document Classification. IIS 2003: 33-46 - [c1]Jamie Twycross, Matthew M. Williamson:
Implementing and Testing a Virus Throttle. USENIX Security Symposium 2003
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:50 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint