Christian Wallenta : Publications
Click here to download all publications in a single bibtex file
@article{WAKIBEHAJ1, title = "Detecting Interest Cache Poisoning in Sensor Networks using an Artificial Immune Algorithm", author = "Christian Wallenta, Jungwon Kim, Peter J. Bentley and Stephen Hailes", year = "2008", journal = "Applied Intelligence, Springer", }
@techreport{wallenta_RN_08_10, title = "Analysing and Modelling Traffic of Systems with Highly Dynamic User Generated Content", author = "Christian Wallenta and Mohamed Ahmed and Ian Brown and Stephen Hailes and Felipe Huici", year = "2008", howpublished = "UCL Research Note RN_08_10", location = "http://web4.cs.ucl.ac.uk/staff/C.Wallenta/research/wallenta_RN_08_10.pdf", url = "http://web4.cs.ucl.ac.uk/staff/C.Wallenta/research/wallenta_RN_08_10.pdf", }
@inproceedings{icaris2006, title = "Danger Is Ubiquitous: Detecting Malicious Activities in Sensor Networks Using the Dendritic Cell Algorithm", author = "Jungwon Kim and Peter Bentley and Christian Wallenta and Mohamed Ahmed and Stephen Hailes", year = "2006", booktitle = "ICARIS-2006, 5th International Conference on Artificial Immune Systems", journal = "Proceedings of the 5th International Conference on Artificial Immune Systems (ICARIS-2006)", month = "September", url = "http://www.springerlink.com/content/r642624182076452/fulltext.pdf", }
@inproceedings{wtc2006, title = "Securing the Scalable Source Routing Protocol", author = "Kendy Kutzner and Christian Wallenta and Thomas Fuhrmann", year = "2006", booktitle = "Proceedings of the World Telecommunications Congress 2006", journal = "Proceedings of the World Telecommunications Congress 2006", month = "April", url = "http://i30www.ira.uka.de/research/documents/p2p/2006/kutzner06securessr.pdf", }