Seguir
Victor Heorhiadi
Victor Heorhiadi
Otros nombresViktor Heorhiadi
AWS
Dirección de correo verificada de victorh.net - Página principal
Título
Citado por
Citado por
Año
Gremlin: Systematic resilience testing of microservices
V Heorhiadi, S Rajagopalan, H Jamjoom, MK Reiter, V Sekar
2016 IEEE 36th International Conference on Distributed Computing Systems …, 2016
1862016
Simplifying {Software-Defined} Network Optimization Using {SOL}
V Heorhiadi, MK Reiter, V Sekar
13th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2016
952016
An epidemiological study of malware encounters in a large enterprise
TF Yen, V Heorhiadi, A Oprea, MK Reiter, A Juels
Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014
882014
New opportunities for load balancing in network-wide intrusion detection systems
V Heorhiadi, MK Reiter, V Sekar
Proceedings of the 8th international conference on Emerging networking …, 2012
472012
The frog-boiling attack: Limitations of secure network coordinate systems
E Chan-Tin, V Heorhiadi, N Hopper, Y Kim
ACM Transactions on information and system security (TISSEC) 14 (3), 1-23, 2011
442011
Intent-driven composition of resource-management SDN applications
V Heorhiadi, S Chandrasekaran, MK Reiter, V Sekar
Proceedings of the 14th International Conference on emerging Networking …, 2018
302018
Balancing the shadows
M Schuchard, AW Dean, V Heorhiadi, N Hopper, Y Kim
Proceedings of the 9th annual ACM workshop on Privacy in the electronic …, 2010
292010
Lessons from the evolution of the Batfish configuration analysis tool
M Brown, A Fogel, D Halperin, V Heorhiadi, R Mahajan, T Millstein
Proceedings of the ACM SIGCOMM 2023 Conference, 122-135, 2023
182023
SNIPS: A software-defined approach for scaling intrusion prevention systems via offloading
V Heorhiadi, SK Fayaz, MK Reiter, V Sekar
Information Systems Security: 10th International Conference, ICISS 2014 …, 2014
112014
Accelerating the development of software-defined network optimization applications using SOL
V Heorhiadi, MK Reiter, V Sekar
arXiv preprint arXiv:1504.07704, 2015
62015
Hijacking the Vuze BitTorrent network: all your hop are belong to us
E Chan‐Tin, V Heorhiadi, N Hopper, Y Kim
IET Information Security 9 (4), 203-208, 2015
52015
One-way indexing for plausible deniability in censorship resistant storage
EY Vasserman, V Heorhiadi, N Hopper, Y Kim
USENIX Workshop on Free and Open Communications on the Internet (FOCI 2012), 2012
42012
Censorship resistant overlay publishing
EY Vasserman, V Heorhiadi, Y Kim, NJ Hopper
32011
Balancing Computation-Communication Tradeoffs in Scaling Network-Wide Intrusion Detection Systems
V Heorhiadi, MK Reiter, V Sekar
Signature (P1, P2, P3) 1 (3), N2, 0
2*
Expression and Composition of Optimization-Based Applications for Software-Defined Networking
V Heorhiadi
The University of North Carolina at Chapel Hill, 2017
2017
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–15