3 research outputs found

    Sensing Danger: Innate Immunology for Intrusion Detection

    Get PDF
    The immune system provides an ideal metaphor for anomaly detection in general and computer security in particular. Based on this idea, artificial immune systems have been used for a number of years for intrusion detection, unfortunately so far with little success. However, these previous systems were largely based on immunological theory from the 1970s and 1980s and over the last decade our understanding of immunological processes has vastly improved. In this paper we present two new immune inspired algorithms based on the latest immunological discoveries, such as the behaviour of Dendritic Cells. The resultant algorithms are applied to real world intrusion problems and show encouraging results. Overall, we believe there is a bright future for these next generation artificial immune algorithms

    Multi-method research: Reception in context

    No full text
    This chapter discusses research approaches that investigate reception in its context, both the audiovisual context in which the translation appears and the social context in which it is being viewed. The studies introduced in this chapter include thematic studies which focus on examining the viewers’ interpretations of a specific aspect of the translated programme, as well as wide-ranging studies which explore viewers’ attitudes and expectations towards audiovisual translations. The methods introduced in the chapter include questionnaires with qualitative and quantitative approaches, interviews, focus group research, observation, and some novel research approaches arising from the model of user-centered translation and the concepts of usability and user experience. Finally, the chapter argues for the benefits of large-scale, collective research approaches and replication of research designs in a variety of contexts
    corecore