Gremlin: Systematic resilience testing of microservices V Heorhiadi, S Rajagopalan, H Jamjoom, MK Reiter, V Sekar 2016 IEEE 36th International Conference on Distributed Computing Systems …, 2016 | 171 | 2016 |
Simplifying {Software-Defined} Network Optimization Using {SOL} V Heorhiadi, MK Reiter, V Sekar 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2016 | 93 | 2016 |
An epidemiological study of malware encounters in a large enterprise TF Yen, V Heorhiadi, A Oprea, MK Reiter, A Juels Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014 | 84 | 2014 |
New opportunities for load balancing in network-wide intrusion detection systems V Heorhiadi, MK Reiter, V Sekar Proceedings of the 8th international conference on Emerging networking …, 2012 | 46 | 2012 |
The frog-boiling attack: Limitations of secure network coordinate systems E Chan-Tin, V Heorhiadi, N Hopper, Y Kim ACM Transactions on information and system security (TISSEC) 14 (3), 1-23, 2011 | 44 | 2011 |
Intent-driven composition of resource-management SDN applications V Heorhiadi, S Chandrasekaran, MK Reiter, V Sekar Proceedings of the 14th International Conference on emerging Networking …, 2018 | 30 | 2018 |
Balancing the shadows M Schuchard, AW Dean, V Heorhiadi, N Hopper, Y Kim Proceedings of the 9th annual ACM workshop on Privacy in the electronic …, 2010 | 28 | 2010 |
SNIPS: A software-defined approach for scaling intrusion prevention systems via offloading V Heorhiadi, SK Fayaz, MK Reiter, V Sekar Information Systems Security: 10th International Conference, ICISS 2014 …, 2014 | 11 | 2014 |
Accelerating the development of software-defined network optimization applications using SOL V Heorhiadi, MK Reiter, V Sekar arXiv preprint arXiv:1504.07704, 2015 | 6 | 2015 |
Lessons from the evolution of the Batfish configuration analysis tool M Brown, A Fogel, D Halperin, V Heorhiadi, R Mahajan, T Millstein Proceedings of the ACM SIGCOMM 2023 Conference, 122-135, 2023 | 5 | 2023 |
Hijacking the Vuze BitTorrent network: all your hop are belong to us E Chan‐Tin, V Heorhiadi, N Hopper, Y Kim IET Information Security 9 (4), 203-208, 2015 | 5 | 2015 |
One-way indexing for plausible deniability in censorship resistant storage EY Vasserman, V Heorhiadi, N Hopper, Y Kim USENIX Workshop on Free and Open Communications on the Internet (FOCI 2012), 2012 | 4 | 2012 |
Censorship resistant overlay publishing EY Vasserman, V Heorhiadi, Y Kim, NJ Hopper | 3 | 2011 |
Balancing Computation-Communication Tradeoffs in Scaling Network-Wide Intrusion Detection Systems V Heorhiadi, MK Reiter, V Sekar Signature (P1, P2, P3) 1 (3), N2, 0 | 2* | |
Expression and Composition of Optimization-Based Applications for Software-Defined Networking V Heorhiadi The University of North Carolina at Chapel Hill, 2017 | | 2017 |