Victor Heorhiadi
Victor Heorhiadi
AWS
Verified email at victorh.net - Homepage
Title
Cited by
Cited by
Year
Gremlin: Systematic resilience testing of microservices
V Heorhiadi, S Rajagopalan, H Jamjoom, MK Reiter, V Sekar
2016 IEEE 36th International Conference on Distributed Computing Systems …, 2016
862016
Simplifying software-defined network optimization using {SOL}
V Heorhiadi, MK Reiter, V Sekar
13th {USENIX} Symposium on Networked Systems Design and Implementation …, 2016
762016
An epidemiological study of malware encounters in a large enterprise
TF Yen, V Heorhiadi, A Oprea, MK Reiter, A Juels
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
622014
New opportunities for load balancing in network-wide intrusion detection systems
V Heorhiadi, MK Reiter, V Sekar
Proceedings of the 8th international conference on Emerging networking …, 2012
372012
The frog-boiling attack: Limitations of secure network coordinate systems
E Chan-Tin, V Heorhiadi, N Hopper, Y Kim
ACM Transactions on Information and System Security (TISSEC) 14 (3), 1-23, 2011
322011
Balancing the shadows
M Schuchard, AW Dean, V Heorhiadi, N Hopper, Y Kim
Proceedings of the 9th annual ACM workshop on Privacy in the electronic …, 2010
212010
Intent-driven composition of resource-management SDN applications
V Heorhiadi, S Chandrasekaran, MK Reiter, V Sekar
Proceedings of the 14th International Conference on emerging Networking …, 2018
142018
SNIPS: A software-defined approach for scaling intrusion prevention systems via offloading
V Heorhiadi, SK Fayaz, MK Reiter, V Sekar
International Conference on Information Systems Security, 9-29, 2014
102014
Hijacking the Vuze BitTorrent network: all your hop are belong to us
E Chan‐Tin, V Heorhiadi, N Hopper, Y Kim
IET Information Security 9 (4), 203-208, 2015
52015
Accelerating the development of software-defined network optimization applications using SOL
V Heorhiadi, MK Reiter, V Sekar
arXiv preprint arXiv:1504.07704, 2015
32015
One-Way Indexing for Plausible Deniability in Censorship Resistant Storage.
EY Vasserman, V Heorhiadi, N Hopper, Y Kim
FOCI, 2012
22012
Balancing Computation-Communication Tradeoffs in Scaling Network-Wide Intrusion Detection Systems
V Heorhiadi, MK Reiter, V Sekar
Signature (P1, P2, P3) 1 (3), N2, 0
2*
Censorship resistant overlay publishing
EY Vasserman, V Heorhiadi, Y Kim, NJ Hopper
12011
Intent-driven composition of resource-management SDN applications
MKR Reiter, VH Heorhiadi, SC Chandrasekaran, VS Sekar
2018
Expression and Composition of Optimization-Based Applications for Software-Defined Networking
V Heorhiadi
2017
The system can't perform the operation now. Try again later.
Articles 1–15