Victor Heorhiadi
Victor Heorhiadi
Verified email at - Homepage
Cited by
Cited by
Gremlin: Systematic resilience testing of microservices
V Heorhiadi, S Rajagopalan, H Jamjoom, MK Reiter, V Sekar
2016 IEEE 36th International Conference on Distributed Computing Systems …, 2016
Simplifying {Software-Defined} Network Optimization Using {SOL}
V Heorhiadi, MK Reiter, V Sekar
13th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2016
An epidemiological study of malware encounters in a large enterprise
TF Yen, V Heorhiadi, A Oprea, MK Reiter, A Juels
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
New opportunities for load balancing in network-wide intrusion detection systems
V Heorhiadi, MK Reiter, V Sekar
Proceedings of the 8th international conference on Emerging networking …, 2012
The frog-boiling attack: Limitations of secure network coordinate systems
E Chan-Tin, V Heorhiadi, N Hopper, Y Kim
ACM Transactions on Information and System Security (TISSEC) 14 (3), 1-23, 2011
Balancing the shadows
M Schuchard, AW Dean, V Heorhiadi, N Hopper, Y Kim
Proceedings of the 9th annual ACM workshop on Privacy in the electronic …, 2010
Intent-driven composition of resource-management sdn applications
V Heorhiadi, S Chandrasekaran, MK Reiter, V Sekar
Proceedings of the 14th International Conference on emerging Networking …, 2018
SNIPS: A software-defined approach for scaling intrusion prevention systems via offloading
V Heorhiadi, SK Fayaz, MK Reiter, V Sekar
International Conference on Information Systems Security, 9-29, 2014
Hijacking the Vuze BitTorrent network: all your hop are belong to us
E Chan-Tin, V Heorhiadi, N Hopper, Y Kim
IET Information Security 9 (4), 203-208, 2015
Accelerating the development of software-defined network optimization applications using SOL
V Heorhiadi, MK Reiter, V Sekar
arXiv preprint arXiv:1504.07704, 2015
One-Way Indexing for Plausible Deniability in Censorship Resistant Storage.
EY Vasserman, V Heorhiadi, N Hopper, Y Kim
FOCI, 2012
Censorship resistant overlay publishing
EY Vasserman, V Heorhiadi, Y Kim, NJ Hopper
Balancing Computation-Communication Tradeoffs in Scaling Network-Wide Intrusion Detection Systems
V Heorhiadi, MK Reiter, V Sekar
Signature (P1, P2, P3) 1 (3), N2, 0
Intent-driven composition of resource-management SDN applications
MKR Reiter, VH Heorhiadi, SC Chandrasekaran, VS Sekar
Expression and Composition of Optimization-Based Applications for Software-Defined Networking
V Heorhiadi
The University of North Carolina at Chapel Hill, 2017
The system can't perform the operation now. Try again later.
Articles 1–15