Follow
H. B. Acharya
H. B. Acharya
Unknown affiliation
No verified email
Title
Cited by
Cited by
Year
Troubleshooting blackbox SDN control software with minimal causal sequences
C Scott, A Wundsam, B Raghavan, A Panda, A Or, J Lai, E Huang, Z Liu, ...
Proceedings of the 2014 ACM Conference on SIGCOMM, 395-406, 2014
1642014
The best keying protocol for sensor networks
T Choi, HB Acharya, MG Gouda
Pervasive and Mobile Computing 9 (4), 564-571, 2013
48*2013
The best keying protocol for sensor networks
T Choi, HB Acharya, MG Gouda
Pervasive and Mobile Computing 9 (4), 564-571, 2013
392013
Firewall verification and redundancy checking are equivalent
HB Acharya, MG Gouda
2011 Proceedings IEEE INFOCOM, 2123-2128, 2011
352011
Projection and division: Linear-space verification of firewalls
HB Acharya, MG Gouda
2010 IEEE 30th International Conference on Distributed Computing Systems …, 2010
352010
Nash equilibria in stabilizing systems
MG Gouda, HB Acharya
Symposium on Self-Stabilizing Systems, 311-324, 2009
242009
Nash equilibria in stabilizing systems
MG Gouda, HB Acharya
Symposium on Self-Stabilizing Systems, 311-324, 2009
242009
Linear-time verification of firewalls
HB Acharya, MG Gouda
2009 17th IEEE International Conference on Network Protocols, 133-140, 2009
222009
Mending wall: On the implementation of censorship in India
D Gosain, A Agarwal, S Shekhawat, HB Acharya, S Chakravarty
International Conference on Security and Privacy in Communication Systems …, 2017
202017
Few throats to choke: On the current structure of the internet
HB Acharya, S Chakravarty, D Gosain
2017 IEEE 42nd conference on local computer networks (LCN), 339-346, 2017
192017
Delay tolerant networking-a tutorial
V Venkataraman, HB Acharya, H Shah, S Lam
Department of Computer Science, The University of Texas, 72-78, 2009
192009
Firewall modules and modular firewalls
HB Acharya, A Joshi, MG Gouda
The 18th IEEE International Conference on Network Protocols, 174-182, 2010
182010
A theory of network tracing
HB Acharya, MG Gouda
Stabilization, Safety, and Security of Distributed Systems: 11th …, 2009
182009
Detecting BGP route anomalies with deep learning
K McGlynn, HB Acharya, M Kwon
IEEE INFOCOM 2019-IEEE Conference on Computer Communications Workshops …, 2019
172019
Is that you? Authentication in a network without identities
T Choi, HB Acharya, MG Gouda
International Journal of Security and Networks 6 (4), 181-190, 2011
162011
The K-observer problem in computer networks
HB Acharya, T Choi, RA Bazzi, MG Gouda
Networking Science 1, 15-22, 2012
152012
The devil's in the details: Placing decoy routers in the internet
D Gosain, A Agarwal, S Chakravarty, HB Acharya
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
122017
On the hardness of topology inference
HB Acharya, MG Gouda
International Conference on Distributed Computing and Networking, 251-262, 2011
102011
Siegebreaker: An sdn based practical decoy routing system
PK Sharma, D Gosain, H Sagar, C Kumar, A Dogra, V Naik, HB Acharya, ...
Proceedings on Privacy Enhancing Technologies, 2020
92020
Nash equilibria in stabilizing systems
MG Gouda, HB Acharya
Theoretical Computer Science 412 (33), 4325-4335, 2011
82011
The system can't perform the operation now. Try again later.
Articles 1–20