Christian Wallenta : Publications
-
[1]
Detecting Interest Cache Poisoning in Sensor Networks using an Artificial Immune Algorithm
Peter J. Bentley Christian Wallenta Jungwon Kim and Stephen Hailes
In Applied Intelligence‚ Springer. 2008.
Details about Detecting Interest Cache Poisoning in Sensor Networks using an Artificial Immune Algorithm | BibTeX data for Detecting Interest Cache Poisoning in Sensor Networks using an Artificial Immune Algorithm | Download (pdf) of Detecting Interest Cache Poisoning in Sensor Networks using an Artificial Immune Algorithm
-
[2]
Analysing and Modelling Traffic of Systems with Highly Dynamic User Generated Content
Christian Wallenta‚ Mohamed Ahmed‚ Ian Brown‚ Stephen Hailes and Felipe Huici
2008.
Details about Analysing and Modelling Traffic of Systems with Highly Dynamic User Generated Content | BibTeX data for Analysing and Modelling Traffic of Systems with Highly Dynamic User Generated Content | Download (pdf) of Analysing and Modelling Traffic of Systems with Highly Dynamic User Generated Content | Download (pdf) of Analysing and Modelling Traffic of Systems with Highly Dynamic User Generated Content
-
[3]
Danger Is Ubiquitous: Detecting Malicious Activities in Sensor Networks Using the Dendritic Cell Algorithm
Jungwon Kim‚ Peter Bentley‚ Christian Wallenta‚ Mohamed Ahmed and Stephen Hailes
In ICARIS−2006‚ 5th International Conference on Artificial Immune Systems. September, 2006.
Details about Danger Is Ubiquitous: Detecting Malicious Activities in Sensor Networks Using the Dendritic Cell Algorithm | BibTeX data for Danger Is Ubiquitous: Detecting Malicious Activities in Sensor Networks Using the Dendritic Cell Algorithm | Download (pdf) of Danger Is Ubiquitous: Detecting Malicious Activities in Sensor Networks Using the Dendritic Cell Algorithm | Download (pdf) of Danger Is Ubiquitous: Detecting Malicious Activities in Sensor Networks Using the Dendritic Cell Algorithm
-
[4]
Securing the Scalable Source Routing Protocol
Kendy Kutzner‚ Christian Wallenta and Thomas Fuhrmann
In Proceedings of the World Telecommunications Congress 2006. April, 2006.
Details about Securing the Scalable Source Routing Protocol | BibTeX data for Securing the Scalable Source Routing Protocol | Download (pdf) of Securing the Scalable Source Routing Protocol | Download (pdf) of Securing the Scalable Source Routing Protocol