default search action
Vladimir Marbukh
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c61]Vladimir Marbukh:
From Exploit Prediction in the Wild to System-Specific Cyber Security Risk Metrics: Work in Progress. CF 2024 - [c60]Vladimir Marbukh:
Towards Recommender System Supported Contact Tracing for Cost-Efficient and Risk Aware Infection Suppression. HealthRecSys@RecSys 2024: 63-66 - [c59]Vladimir Marbukh:
Poster: Green Network Optimization with Multi-Agent Reinforcement Learning: Work in Progress. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2024: 471-472 - 2023
- [c58]Vladimir Marbukh:
Towards Incorporating a Possibility of Zero-day Attacks Into Security Risk Metrics: Work in Progress. CCNC 2023: 947-948 - [c57]Brian Cloteaux, Vladimir Marbukh, Kamran Sayrafian:
Impact of the Exposure Time and Distance Thresholds on the Performance of Automatic Contact Tracing. ICC Workshops 2023: 1701-1706 - [c56]Vladimir Marbukh:
Towards Security Metrics Combining Risks of Known and Zero-day Attacks: Work in Progress. NOMS 2023: 1-4 - [c55]Vladimir Marbukh:
Towards Evaluation/Mitigation Risk of Systemic Failures in a Recoverable Network with Redistributed Elastic Load. ICPE (Companion) 2023: 115-116 - 2022
- [c54]Vladimir Marbukh:
Towards Risk Adjusted Wireless Access under Jamming: Reliability through Multi-Connectivity. CCNC 2022: 495-496 - [c53]Kamran Sayrafian, Brian Cloteaux, Vladimir Marbukh, Christian Emiyah:
Evaluation of the Bluetooth-based Proximity Estimation for Automatic Exposure Determination. CCNC 2022: 683-686 - [c52]Vladimir Marbukh:
Towards Robust Fog/Edge Computing Infrastructure with Risk Adjusted Multi-Connectivity. FiCloud 2022: 161-166 - [c51]Kamran Sayrafian, Brian Cloteaux, Vladimir Marbukh:
Impact of Using Soft Exposure Thresholds in Automatic Contact Tracing. HealthCom 2022: 1-6 - [c50]Kamran Sayrafian, Brian Cloteaux, Vladimir Marbukh:
On the Performance of Automatic Exposure Determination Using Bluetooth-based Proximity Estimation. ICC 2022: 3052-3057 - [c49]Vladimir Marbukh:
Poster Abstract: Towards Shapley Value based Security Risk Attribution in Sensor Networks. IPSN 2022: 519-520 - 2021
- [c48]Vladimir Marbukh:
Towards Robust Security Risk Metrics for Networked Systems: Work in Progress. IM 2021: 658-661 - 2020
- [c47]Behnam Rouzbehani, Vladimir Marbukh, Kamran Sayrafian:
Utility Proportional Resource Allocation for Users with Diverse SLAs in Virtualized Radio Access Networks. BlackSeaCom 2020: 1-6 - [c46]Onuttom Narayan, Iraj Saniee, Vladimir Marbukh:
Congestion Due to Random Walk Routing. COMPLEX NETWORKS (1) 2020: 556-567 - [c45]Vladimir Marbukh:
Towards Scalable Optimization of Large-Scale IoT Access for Mobile Users with Diverse Requirements. PIMRC 2020: 1-6
2010 – 2019
- 2019
- [c44]Behnam Rouzbehani, Vladimir Marbukh, Kamran Sayrafian:
A Joint Admission Control & Resource Management Scheme for Virtualized Radio Access Networks. CSCN 2019: 1-6 - [c43]Behnam Rouzbehani, Vladimir Marbukh, Kamran Sayrafian, Luís M. Correia:
Towards Cross-Layer Optimization of Virtualized Radio Access Networks. EuCNC 2019: 448-452 - [c42]Brian Cloteaux, Vladimir Marbukh:
SIS Contagion Avoidance on a Network Growing by Preferential Attachment. GRADES/NDA@SIGMOD/PODS 2019: 11:1-11:4 - [c41]Vladimir Marbukh:
Towards Fog Network Utility Maximization (FoNUM) for Managing Fog Computing Resources. ICFC 2019: 195-200 - 2018
- [c40]Vladimir Marbukh:
Dynamic Job Replication for Balancing Fault Tolerance, Latency, and Economic Efficiency: Work in Progress. SCC 2018: 257-260 - [c39]Vladimir Marbukh:
Network Formation by Contagion Averse Agents: Modeling Bounded Rationality with Logit Learning. ASONAM 2018: 1232-1233 - [c38]Vladimir Marbukh:
Economics of networked infrastructures at the edge of undesirable contagion: A case of SIS infection. INFOCOM Workshops 2018: 1-2 - [c37]Vladimir Marbukh:
Towards efficient offloading in fog/edge computing by approximating effect of externalities. INFOCOM Workshops 2018: 754-759 - [c36]Vladimir Marbukh:
On Mitigation Inefficiency of Selfish Investment in Network Recovery from High Loss SIS Infection. TrustCom/BigDataSE 2018: 1928-1933 - 2017
- [c35]Vladimir Marbukh, Kamran Sayrafian:
Regret minimization based adaptation of the energy detection threshold in body area networks. GIoTS 2017: 1-6 - 2016
- [c34]Vladimir Marbukh:
Systemic Risks in the Cloud Computing Model: Complex Systems Perspective. CLOUD 2016: 863-866 - [c33]Vladimir Marbukh, Martina Barbi, Kamran Sayrafian, Mehdi Alasti:
A queue-size & channel quality based adaptation of the energy detection threshold in IEEE802.15.6 CSMA/CA. HealthCom 2016: 1-6 - [c32]Vladimir Marbukh:
Towards Systemic Risk Aware Engineering of Large-Scale Networks: Complex Systems Perspective. MASCOTS 2016: 391-393 - [c31]Vladimir Marbukh:
Towards cross-layer design of communication network for smart grid with real-time pricing. SmartGridComm 2016: 411-416 - 2015
- [c30]Vladimir Marbukh, Kamran Sayrafian, Martina Barbi, Mehdi Alasti:
A Regret Matching Strategy Framework for Inter-BAN Interference Mitigation. WMNC 2015: 231-234 - 2014
- [j9]Hamid Mahboubi, Kaveh Moezzi, Amir G. Aghdam, Kamran Sayrafian-Pour, Vladimir Marbukh:
Distributed Deployment Algorithms for Improved Coverage in a Network of Wireless Mobile Sensors. IEEE Trans. Ind. Informatics 10(1): 163-174 (2014) - [c29]Vladimir Marbukh:
On systemic risk in the cloud computing model. ITC 2014: 1-8 - 2013
- [c28]Vladimir Marbukh:
Perron-Frobenius measure of systemic risk of cascading overload in complex clouds: Work in progress. IM 2013: 1409-1412 - [c27]Vladimir Marbukh, Kamran Sayrafian-Pour, Mehdi Alasti:
Link layer adaptation in body area networks: Balancing reliability and longevity. PIMRC 2013: 2545-2549 - [i1]Onuttom Narayan, Iraj Saniee, Vladimir Marbukh:
Congestion Due to Random Walk Routing. CoRR abs/1309.0066 (2013) - 2012
- [j8]Hamid Mahboubi, Ahmadreza Momeni, Amir G. Aghdam, Kamran Sayrafian-Pour, Vladimir Marbukh:
An Efficient Target Monitoring Scheme With Controlled Node Mobility for Sensor Networks. IEEE Trans. Control. Syst. Technol. 20(6): 1522-1532 (2012) - [c26]Hamid Mahboubi, Walid Masoudimansour, Amir G. Aghdam, Kamran Sayrafian-Pour, Vladimir Marbukh:
Maximum life span strategy for target tracking in mobile sensor networks. ACC 2012: 5096-5101 - [c25]Assane Gueye, Vladimir Marbukh, Jean C. Walrand:
Towards a Metric for Communication Network Vulnerability to Attacks: A Game Theoretic Approach. GAMENETS 2012: 259-274 - [c24]Assane Gueye, Vladimir Marbukh:
A Game-Theoretic Framework for Network Security Vulnerability Assessment and Mitigation. GameSec 2012: 186-200 - [c23]Vladimir Marbukh:
Towards modeling effect of packet-level TCP dynamics on Internet operations and management. NOMS 2012: 470-473 - [c22]Vladimir Marbukh:
Systemic risks/benefits of selfish network operations & management in dynamic environment. NOMS 2012: 683-686 - 2011
- [j7]Vladimir Marbukh:
Poster: TCP effective bandwidth and internet performance. SIGMETRICS Perform. Evaluation Rev. 39(2): 73 (2011) - [c21]Fern Y. Hunt, Vladimir Marbukh, Yi Wang:
A mathematical model of joint congestion control and routing in multisource networks. CCA 2011: 1131-1138 - [c20]Hamid Mahboubi, Kaveh Moezzi, Amir G. Aghdam, Kamran Sayrafian-Pour, Vladimir Marbukh:
Distributed deployment algorithms for improved coverage in mobile sensor networks. CCA 2011: 1244-1249 - 2010
- [c19]Hamid Mahboubi, Ahmadreza Momeni, Amir G. Aghdam, Kamran Sayrafian-Pour, Vladimir Marbukh:
Optimal target tracking strategy with controlled node mobility in mobile sensor networks. ACC 2010: 2921-2928 - [c18]Vladimir Marbukh, Kamran Sayrafian-Pour, Hamid Mahboubi, Ahmadreza Momeni, Amir G. Aghdam:
Towards evolutionary-pricing framework for Mobile Sensor Network self-organization. IEEE Congress on Evolutionary Computation 2010: 1-8 - [c17]Hamid Mahboubi, Kaveh Moezzi, Amir G. Aghdam, Kamran Sayrafian-Pour, Vladimir Marbukh:
Self-Deployment Algorithms for Coverage Problem in a Network of Mobile Sensors with Unidentical Sensing Ranges. GLOBECOM 2010: 1-6
2000 – 2009
- 2009
- [c16]Daniel Genin, Vladimir Marbukh:
Bursty fluid approximation of TCP for modeling internet congestion at the flow level. Allerton 2009: 1300-1306 - [c15]Fern Y. Hunt, Vladimir Marbukh:
Measuring the utility/path diversity trade off in multipath protocols. VALUETOOLS 2009: 41 - 2008
- [c14]Vladimir Marbukh, Kamran Sayrafian-Pour:
A Framework for Joint Cross-Layer and Node Location Optimization in Mobile Sensor Networks. ADHOC-NOW 2008: 487-496 - [c13]Daniel Genin, Vladimir Marbukh:
Toward Understanding of Metastability in Cellular Networks: Emergence and Implications for Performance. GLOBECOM 2008: 1293-1298 - [c12]Vladimir Marbukh, Kevin Mills:
Demand Pricing & Resource Allocation in Market-Based Compute Grids: A Model and Initial Results. ICN 2008: 752-757 - 2007
- [j6]Vladimir Marbukh:
Fair bandwidth sharing under flow arrivals/departures: effect of retransmissions on stability and performance. SIGMETRICS Perform. Evaluation Rev. 35(2): 6-8 (2007) - [c11]Vladimir Marbukh, Kevin Mills:
On Maximizing Provider Revenue in Market-Based Compute Grids. ICNS 2007: 22 - [c10]Vladimir Marbukh, Stephan Klink:
Decentralized control of large-scale networks as a game with local interactions: cross-layer TCP/IP optimization. VALUETOOLS 2007: 22 - [c9]Vladimir Marbukh:
Utility maximization for resolving throughput/reliability trade-offs in an unreliable network with multipath routing. VALUETOOLS 2007: 35 - 2006
- [j5]Anastase Nakassis, Vladimir Marbukh:
Towards power and QoS aware wireless networks. SIGMETRICS Perform. Evaluation Rev. 34(3): 3-5 (2006) - 2004
- [j4]Vladimir Marbukh:
A knowledge plane as a pricing mechanism for aggregate, user-centric utility maximization. SIGMETRICS Perform. Evaluation Rev. 32(2): 22-24 (2004) - [c8]Vladimir Marbukh:
On aggregate utility maximization based network management: challenges and possible approaches. ICC 2004: 1212-1216 - 2003
- [j3]Vladimir Marbukh:
Towards mean field theory of wireless networks. SIGMETRICS Perform. Evaluation Rev. 31(2): 17-19 (2003) - [c7]Vladimir Marbukh:
Network provisioning as a game against nature: a multicommodity network flow model under uncertain demands. ICC 2003: 1631-1635 - [c6]Sri Kumar, Vladimir Marbukh:
A Game Theoretic Approach to Analysis and Design of Survivable and Secure Systems and Protocols. MMM-ACNS 2003: 440-443 - [c5]Vladimir Marbukh:
A cognitive framework for performance/resilience optimized multipath routing in networks with unstable topologies. WCNC 2003: 1149-1154 - 2002
- [j2]Vladimir Marbukh:
Robust traffic engineering: game theoretic perspective. SIGMETRICS Perform. Evaluation Rev. 30(3): 17-19 (2002) - [c4]Vladimir Marbukh:
QoS routing under adversarial binary uncertainty. ICC 2002: 2268-2272 - 2001
- [c3]Vladimir Marbukh:
Minimum Regret Approach to Network Management under Uncertainty with Application to Connection Admission Control and Routing. ICN (2) 2001: 309-318 - [c2]Vladimir Marbukh:
A framework for performance evaluation and optimization of an emerging multimedia DS-CDMA network. WOWMOM 2001: 55-64
1990 – 1999
- 1993
- [j1]Vladimir Marbukh:
Loss circuit switched communication network-performance analysis and dynamic routing. Queueing Syst. Theory Appl. 13(1-3): 111-141 (1993) - [c1]Vladimir Marbukh:
Routing and congestion control in ATM networks. ICNP 1993: 344-349
Coauthor Index
aka: Kamran Sayrafian
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-05 20:48 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint