Hrishikesh B. Acharya

Orcid: 0009-0001-2047-4292

According to our database1, Hrishikesh B. Acharya authored at least 46 papers between 2009 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
DeeP4R: Deep Packet Inspection in P4 using Packet Recirculation.
Proceedings of the IEEE INFOCOM 2023, 2023

Predictable Internet Clients and In-Switch Deep Packet Inspection.
Proceedings of the 32nd International Conference on Computer Communications and Networks, 2023

POSTER: A Cyberspace Study of the Russia-Ukraine War.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2021
Telemetron: Measuring Network Capacity Between Off-Path Remote Hosts.
Proceedings of the 46th IEEE Conference on Local Computer Networks, 2021

Demo: Simple Deep Packet Inspection with P4.
Proceedings of the 29th IEEE International Conference on Network Protocols, 2021

2020
SiegeBreaker: An SDN Based Practical Decoy Routing System.
Proc. Priv. Enhancing Technol., 2020

Maginot Lines and Tourniquets: On the Defendability of National Cyberspace.
Proceedings of the 45th IEEE LCN Symposium on Emerging Topics in Networking, 2020

Demo Abstract: Loop Avoidance in Computer Networks Using a Meshed Tree Protocol.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

From Spanning Trees to Meshed Trees.
Proceedings of the 2020 International Conference on COMmunication Systems & NETworkS, 2020

2019
Policy expressions and the bottom-up design of computing policies.
Computing, 2019

Detecting BGP Route Anomalies with Deep Learning.
Proceedings of the IEEE INFOCOM 2019, 2019

On Securing Healthcare with Software-Defined Networks.
Proceedings of the IEEE INFOCOM 2019, 2019

The World from Kabul: Internet Censorship in Afghanistan.
Proceedings of the IEEE INFOCOM 2019, 2019

2018
Parallel Processing of Packets with a PRAM.
Proceedings of the 19th International Conference on Distributed Computing and Networking, 2018

2017
The Devils in The Details: Placing Decoy Routers in the Internet.
CoRR, 2017

Mending Wall: On the Implementation of Censorship in India.
Proceedings of the Security and Privacy in Communication Networks, 2017

Few Throats to Choke: On the Current Structure of the Internet.
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017

The Devil's in The Details: Placing Decoy Routers in the Internet.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
The Internet of Things: Perspectives on Security from RFID and WSN.
CoRR, 2016

Analysis of Computing Policies Using SAT Solvers (Short Paper).
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2016

Rules in play: On the complexity of routing tables and firewalls.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

2015
Rules in Play: On the Complexity of Routing Tables and Firewalls.
CoRR, 2015

Cells in the Internet of Things.
CoRR, 2015

2014
Incremental Verification of Computing Policies.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2014

Troubleshooting blackbox SDN control software with minimal causal sequences.
Proceedings of the ACM SIGCOMM 2014 Conference, 2014

On rule width and the unreasonable effectiveness of policy verification.
Proceedings of the IEEE 39th Conference on Local Computer Networks, 2014

POPE and PaNeL : Fast lookup in routing tables.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

2013
The best keying protocol for sensor networks.
Pervasive Mob. Comput., 2013

2011
Nash equilibria in stabilizing systems.
Theor. Comput. Sci., 2011

Is that you? Authentication in a network without identities.
Int. J. Secur. Networks, 2011

Brief Announcement: A Conjecture on Traceability, and a New Class of Traceable Networks.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2011

The K-Observer Problem in Computer Networks.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2011

Brief announcement: RedRem: a parallel redundancy remover.
Proceedings of the SPAA 2011: Proceedings of the 23rd Annual ACM Symposium on Parallelism in Algorithms and Architectures, 2011

Firewall verification and redundancy checking are equivalent.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

On the Hardness of Topology Inference.
Proceedings of the Distributed Computing and Networking - 12th International Conference, 2011

TPP: The Two-Way Password Protocol.
Proceedings of 20th International Conference on Computer Communications and Networks, 2011

2010
On the Power of Non-spoofing Adversaries.
Proceedings of the Distributed Computing, 24th International Symposium, 2010

Brief Announcement: On the Hardness of Topology Inference.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2010

Firewall modules and modular firewalls.
Proceedings of the 18th annual IEEE International Conference on Network Protocols, 2010

Projection and Division: Linear-Space Verification of Firewalls.
Proceedings of the 2010 International Conference on Distributed Computing Systems, 2010

The Weak Network Tracing Problem.
Proceedings of the Distributed Computing and Networking, 11th International Conference, 2010

2009
A Theory of Network Tracing.
Proceedings of the Stabilization, 2009

Brief Announcement: Consistent Fixed Points and Negative Gain.
Proceedings of the Stabilization, 2009

Brief announcement: the theory of network tracing.
Proceedings of the 28th Annual ACM Symposium on Principles of Distributed Computing, 2009

Consistent Fixed Points and Negative Gain.
Proceedings of the 2009 International Conference on Parallel and Distributed Computing, 2009

Linear-Time Verification of Firewalls.
Proceedings of the 17th annual IEEE International Conference on Network Protocols, 2009


  Loading...