Troubleshooting blackbox SDN control software with minimal causal sequences C Scott, A Wundsam, B Raghavan, A Panda, A Or, J Lai, E Huang, Z Liu, ... Proceedings of the 2014 ACM Conference on SIGCOMM, 395-406, 2014 | 164 | 2014 |
The best keying protocol for sensor networks T Choi, HB Acharya, MG Gouda Pervasive and Mobile Computing 9 (4), 564-571, 2013 | 48* | 2013 |
The best keying protocol for sensor networks T Choi, HB Acharya, MG Gouda Pervasive and Mobile Computing 9 (4), 564-571, 2013 | 39 | 2013 |
Firewall verification and redundancy checking are equivalent HB Acharya, MG Gouda 2011 Proceedings IEEE INFOCOM, 2123-2128, 2011 | 35 | 2011 |
Projection and division: Linear-space verification of firewalls HB Acharya, MG Gouda 2010 IEEE 30th International Conference on Distributed Computing Systems …, 2010 | 35 | 2010 |
Nash equilibria in stabilizing systems MG Gouda, HB Acharya Symposium on Self-Stabilizing Systems, 311-324, 2009 | 24 | 2009 |
Nash equilibria in stabilizing systems MG Gouda, HB Acharya Symposium on Self-Stabilizing Systems, 311-324, 2009 | 24 | 2009 |
Linear-time verification of firewalls HB Acharya, MG Gouda 2009 17th IEEE International Conference on Network Protocols, 133-140, 2009 | 22 | 2009 |
Mending wall: On the implementation of censorship in India D Gosain, A Agarwal, S Shekhawat, HB Acharya, S Chakravarty International Conference on Security and Privacy in Communication Systems …, 2017 | 20 | 2017 |
Few throats to choke: On the current structure of the internet HB Acharya, S Chakravarty, D Gosain 2017 IEEE 42nd conference on local computer networks (LCN), 339-346, 2017 | 19 | 2017 |
Delay tolerant networking-a tutorial V Venkataraman, HB Acharya, H Shah, S Lam Department of Computer Science, The University of Texas, 72-78, 2009 | 19 | 2009 |
Firewall modules and modular firewalls HB Acharya, A Joshi, MG Gouda The 18th IEEE International Conference on Network Protocols, 174-182, 2010 | 18 | 2010 |
A theory of network tracing HB Acharya, MG Gouda Stabilization, Safety, and Security of Distributed Systems: 11th …, 2009 | 18 | 2009 |
Detecting BGP route anomalies with deep learning K McGlynn, HB Acharya, M Kwon IEEE INFOCOM 2019-IEEE Conference on Computer Communications Workshops …, 2019 | 17 | 2019 |
Is that you? Authentication in a network without identities T Choi, HB Acharya, MG Gouda International Journal of Security and Networks 6 (4), 181-190, 2011 | 16 | 2011 |
The K-observer problem in computer networks HB Acharya, T Choi, RA Bazzi, MG Gouda Networking Science 1, 15-22, 2012 | 15 | 2012 |
The devil's in the details: Placing decoy routers in the internet D Gosain, A Agarwal, S Chakravarty, HB Acharya Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017 | 12 | 2017 |
On the hardness of topology inference HB Acharya, MG Gouda International Conference on Distributed Computing and Networking, 251-262, 2011 | 10 | 2011 |
Siegebreaker: An sdn based practical decoy routing system PK Sharma, D Gosain, H Sagar, C Kumar, A Dogra, V Naik, HB Acharya, ... Proceedings on Privacy Enhancing Technologies, 2020 | 9 | 2020 |
Nash equilibria in stabilizing systems MG Gouda, HB Acharya Theoretical Computer Science 412 (33), 4325-4335, 2011 | 8 | 2011 |