default search action
Constantin Serban
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c32]Lan Wang, Alexander Lane, Constantin Serban, Jesse Elwell, Alex Afanasyev, Lixia Zhang:
Investigating the Synergy between Routing and Forwarding Strategy in NDN Networks. ICN 2023: 67-77 - [c31]Daniel Townley, Young Kim, Fred Douglis, Jesse Elwell, Constantin Serban, Lan Wang, Alex Afanasyev, Lixia Zhang:
Secure NDN Packet Encapsulation. ICC 2023: 1106-1111 - [c30]Bleema Rosenfeld, Sridhar Venkatesan, Rauf Izmailov, Matthew Yudin, Constantin Serban, Ritu Chadha:
Data-Driven Constraint Mining for Realizable Adversarial Samples. MILCOM 2023: 7-12 - 2021
- [c29]Yi Hu, Constantin Serban, Lan Wang, Alexander Afanasyev, Lixia Zhang:
PLI-Sync: Prefetch Loss-Insensitive Sync for NDN Group Streaming. ICC 2021: 1-6 - [c28]Yi Hu, Constantin Serban, Lan Wang, Alexander Afanasyev, Lixia Zhang:
BBR-Inspired Congestion Control for Data Fetching over NDN. MILCOM 2021: 426-431 - 2020
- [c27]Gi Tae Kim, Constantin Serban, Ritu Chadha:
Attack-Resistant Routing : a Framework for Enhancing Routing Robustness in Wireless Ad-hoc Networks. NOMS 2020: 1-7
2010 – 2019
- 2017
- [c26]Angelo Sapello, Constantin Serban, Ritu Chadha, Rauf Izmailov:
Application of Learning Using Privileged Information(LUPI): Botnet Detection. ICCCN 2017: 1-8 - [c25]Stefan Achleitner, Thomas La Porta, Patrick D. McDaniel, Srikanth V. Krishnamurthy, Alexander Poylisher, Constantin Serban:
Stealth migration: Hiding virtual machines on the network. INFOCOM 2017: 1-9 - 2016
- [c24]Azeem Aqil, Ahmed Osama Fathy Atya, Srikanth V. Krishnamurthy, Paul L. Yu, Ananthram Swami, Jeff Rowe, Karl N. Levitt, Alexander Poylisher, Constantin Serban, Ritu Chadha:
Automated cross layer feature selection for effective intrusion detection in networked systems. CNS 2016: 270-278 - [c23]Tom Bowen, Alexander Poylisher, Constantin Serban, Ritu Chadha, Cho-Yu Jason Chiang, Lisa M. Marvel:
Enabling reproducible cyber research - four labeled datasets. MILCOM 2016: 539-544 - [c22]Cho-Yu Jason Chiang, Yitzchak M. Gottlieb, Shridatt James Sugrim, Ritu Chadha, Constantin Serban, Alexander Poylisher, Lisa M. Marvel, Jonathan Santos:
ACyDS: An adaptive cyber deception system. MILCOM 2016: 800-805 - [c21]Ritu Chadha, Thomas Bowen, Cho-Yu Jason Chiang, Yitzchak M. Gottlieb, Alexander Poylisher, Angelo Sapello, Constantin Serban, Shridatt Sugrim, Gary Walther, Lisa M. Marvel, E. Allison Newcomb, Jonathan Santos:
CyberVAN: A Cyber Security Virtual Assured Network testbed. MILCOM 2016: 1125-1130 - 2015
- [c20]Ritu Chadha, Abhrajit Ghosh, Alexander Poylisher, Constantin Serban:
TREND: Trust estimation system for wireless networks via multi-pronged detection. MILCOM 2015: 13-18 - [c19]Constantin Serban, Alexander Poylisher, Angelo Sapello, Yitzchak M. Gottlieb, C. Jason Chiang, Ritu Chadha:
Testing android devices for tactical networks: A hybrid emulation testbed approach. MILCOM 2015: 489-494 - 2013
- [c18]Ritu Chadha, Alexander Poylisher, Constantin Serban:
Reliability estimation in mobile ad hoc networks. CNSM 2013: 189-192 - 2012
- [c17]Alexander Poylisher, Yitzchak M. Gottlieb, Constantin Serban, Keith Whittaker, James H. Nguyen, Chris Scilla, John Lee, Florin Sultan, Ritu Chadha, Cho-Yu Jason Chiang:
Building an operation support system for a fast reconfigurable network experimentation testbed. MILCOM 2012: 1-6 - [c16]Constantin Serban, Ritu Chadha, C. Jason Chiang, Feng Ge, Abhrajit Ghosh, Yitzchak M. Gottlieb, Michael Kaplan, Kathleen Kurachik, Gary Levin, Yow-Jia Lin, Alexander Poylisher, Angelo Sapello, Florin Sultan, Akshay Vashist, Michelle Wolberg, Kimberly Moeltner:
TITAN: Integrated network management in tactical mobile ad hoc networks. MILCOM 2012: 1-6 - [c15]Constantin Serban, Ritu Chadha, C. Jason Chiang, Feng Ge, Yitzchak M. Gottlieb, Angelo Sapello, Kaustubh Sinkar, Kimberly Moeltner:
A GNU-based packet radio for network management field testing. MILCOM 2012: 1-6 - [c14]Florin Sultan, Alexander Poylisher, Constantin Serban, John Lee, Ritu Chadha, C. Jason Chiang:
TimeSync: Virtual time for scalable, high-fidelity hybrid network emulation. MILCOM 2012: 1-6 - [c13]Florin Sultan, Alexander Poylisher, John Lee, Constantin Serban, C. Jason Chiang, Ritu Chadha, Keith Whittaker, Chris Scilla, Syeed E. Ali:
TimeSync: enabling scalable, high-fidelity hybrid network emulation. MSWiM 2012: 185-194 - [c12]Akshay Vashist, Rauf Izmailov, Kyriakos Manousakis, Ritu Chadha, C. Jason Chiang, Constantin Serban, Syeed E. Ali:
Towards network invariant fault diagnosis in MANETs via statistical modeling: The global strength of local weak decisions. NOMS 2012: 981-987 - 2010
- [j3]Alexander Poylisher, Constantin Serban, John Lee, Taichuan Lu, Ritu Chadha, Cho-Yu Jason Chiang, Robert Orlando, Kimberly Jakubowski:
A virtual ad hoc network testbed. Int. J. Commun. Networks Distributed Syst. 5(1/2): 5-24 (2010) - [c11]Chang-Han Jong, Cho-Yu Jason Chiang, Taichuan Lu, Alexander Poylisher, Constantin Serban:
Storage deduplication for Virtual Ad Hoc Network testbed by File-level Block Sharing. HPDC 2010: 699-706 - [c10]Constantin Serban, Alexander Poylisher, Cho-Yu Jason Chiang:
Virtual ad hoc network testbeds for network-aware applications. NOMS 2010: 432-439
2000 – 2009
- 2009
- [c9]Constantin Serban, Wenxuan Zhang, Naftaly H. Minsky:
A decentralized mechanism for application level monitoring of distributed systems. CollaborateCom 2009: 1-10 - [c8]Cho-Yu Jason Chiang, Gary Levin, Shihwei Li, Constantin Serban, Michelle Wolberg, Ritu Chadha, Gregory Hadynski, Lee LaBarre:
Enabling Distributed Management for Dynamic Airborne Networks. POLICY 2009: 102-105 - [c7]Constantin Serban, Naftaly H. Minsky:
In Vivo Evolution of Policies that Govern a Distributed System. POLICY 2009: 134-141 - [c6]Pratik K. Biswas, Constantin Serban, Alexander Poylisher, John Lee, Siun-Chuon Mau, Ritu Chadha, Cho-Yu Jason Chiang, Robert Orlando, Kimberly Jakubowski:
An integrated testbed for Virtual Ad Hoc Networks. TRIDENTCOM 2009: 1-10 - 2008
- [j2]Constantin Serban, Yingying Chen, Wenxuan Zhang, Naftaly H. Minsky:
The concept of decentralized and secure electronic marketplace. Electron. Commer. Res. 8(1-2): 79-101 (2008) - [j1]Constantin Serban, Shmuel S. Tyszberowicz, Yishai A. Feldman, Naftaly H. Minsky:
Developing Law-Governed Systems Using Aspects. J. Object Technol. 7(9): 25-46 (2008) - 2007
- [c5]Constantin Serban, Shmuel S. Tyszberowicz:
AspectJTamer: The Controlled Weaving of Independently Developed Aspects. SwSTE 2007: 57-65 - 2006
- [c4]Wenxuan Zhang, Constantin Serban, Naftaly H. Minsky:
Establishing Global Properties of Multi-Agent Systems Via Local Laws. E4MAS 2006: 170-183 - [c3]Constantin Serban, Shmuel S. Tyszberowicz:
Enforcing Interaction Properties in AOSD-Enabled Systems. ICSEA 2006: 8 - [c2]Constantin Serban, Naftaly H. Minsky:
Generalized Access Control of Synchronous Communication. Middleware 2006: 281-300 - 2001
- [c1]Constantin Serban, Xuhui Ao, Naftaly H. Minsky:
Establishing Enterprise Communities. EDOC 2001: 48-58
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint