default search action
Hrishikesh B. Acharya
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2020
- [j5]Piyush Kumar Sharma, Devashish Gosain, Himanshu Sagar, Chaitanya Kumar, Aneesh Dogra, Vinayak Naik, Hrishikesh B. Acharya, Sambuddho Chakravarty:
SiegeBreaker: An SDN Based Practical Decoy Routing System. Proc. Priv. Enhancing Technol. 2020(3): 243-263 (2020) - 2019
- [j4]Rezwana Reaz, Hrishikesh B. Acharya, Ehab S. Elmallah, Jorge Arturo Cobb, Mohamed G. Gouda:
Policy expressions and the bottom-up design of computing policies. Computing 101(9): 1307-1326 (2019) - 2013
- [j3]Taehwan Choi, Hrishikesh B. Acharya, Mohamed G. Gouda:
The best keying protocol for sensor networks. Pervasive Mob. Comput. 9(4): 564-571 (2013) - 2011
- [j2]Taehwan Choi, Hrishikesh B. Acharya, Mohamed G. Gouda:
Is that you? Authentication in a network without identities. Int. J. Secur. Networks 6(4): 181-190 (2011) - [j1]Mohamed G. Gouda, Hrishikesh B. Acharya:
Nash equilibria in stabilizing systems. Theor. Comput. Sci. 412(33): 4325-4335 (2011)
Conference and Workshop Papers
- 2023
- [c41]Gursimran Singh, Hrishikesh B. Acharya:
POSTER: A Cyberspace Study of the Russia-Ukraine War. AsiaCCS 2023: 1016-1018 - [c40]Sahil Gupta, Devashish Gosain, Minseok Kwon, Hrishikesh B. Acharya:
Predictable Internet Clients and In-Switch Deep Packet Inspection. ICCCN 2023: 1-10 - [c39]Sahil Gupta, Devashish Gosain, Minseok Kwon, Hrishikesh B. Acharya:
DeeP4R: Deep Packet Inspection in P4 using Packet Recirculation. INFOCOM 2023: 1-10 - 2021
- [c38]Sahil Gupta, Devashish Gosain, Garegin Grigoryan, Minseok Kwon, Hrishikesh B. Acharya:
Demo: Simple Deep Packet Inspection with P4. ICNP 2021: 1-2 - [c37]Devashish Gosain, Aishwarya Jaiswal, Hrishikesh B. Acharya, Sambuddho Chakravarty:
Telemetron: Measuring Network Capacity Between Off-Path Remote Hosts. LCN 2021: 351-354 - 2020
- [c36]Hrishikesh B. Acharya, John F. Hamilton, Nirmala Shenoy:
From Spanning Trees to Meshed Trees. COMSNETS 2020: 391-395 - [c35]Peter Willis, Nirmala Shenoy, Hrishikesh B. Acharya:
Demo Abstract: Loop Avoidance in Computer Networks Using a Meshed Tree Protocol. INFOCOM Workshops 2020: 1284-1285 - [c34]Devashish Gosain, Madhur Rawat, Piyush Kumar Sharma, Hrishikesh B. Acharya:
Maginot Lines and Tourniquets: On the Defendability of National Cyberspace. LCN Symposium 2020: 19-30 - 2019
- [c33]Sahil Gupta, Hrishikesh B. Acharya, Minseok Kwon:
On Securing Healthcare with Software-Defined Networks. INFOCOM Workshops 2019: 354-359 - [c32]Kyle McGlynn, Hrishikesh B. Acharya, Minseok Kwon:
Detecting BGP Route Anomalies with Deep Learning. INFOCOM Workshops 2019: 1039-1040 - [c31]Hrishikesh B. Acharya, Ashwin Ramesh, Abulfazl Jalaly:
The World from Kabul: Internet Censorship in Afghanistan. INFOCOM Workshops 2019: 1061-1062 - 2018
- [c30]Hrishikesh B. Acharya:
Parallel Processing of Packets with a PRAM. ICDCN 2018: 45:1-45:9 - 2017
- [c29]Devashish Gosain, Anshika Agarwal, Sambuddho Chakravarty, Hrishikesh B. Acharya:
The Devil's in The Details: Placing Decoy Routers in the Internet. ACSAC 2017: 577-589 - [c28]Hrishikesh B. Acharya, Sambuddho Chakravarty, Devashish Gosain:
Few Throats to Choke: On the Current Structure of the Internet. LCN 2017: 339-346 - [c27]Rezwana Reaz, Hrishikesh B. Acharya, Ehab S. Elmallah, Jorge Arturo Cobb, Mohamed G. Gouda:
Policy Expressions and the Bottom-Up Design of Computing Policies. NETYS 2017: 151-165 - [c26]Devashish Gosain, Anshika Agarwal, Sahil Shekhawat, Hrishikesh B. Acharya, Sambuddho Chakravarty:
Mending Wall: On the Implementation of Censorship in India. SecureComm 2017: 418-437 - 2016
- [c25]Hrishikesh B. Acharya, Satyam Kumar, Mohit Wadhwa, Ayush Shah:
Rules in play: On the complexity of routing tables and firewalls. ICNP 2016: 1-10 - [c24]Marijn J. H. Heule, Rezwana Reaz, Hrishikesh B. Acharya, Mohamed G. Gouda:
Analysis of Computing Policies Using SAT Solvers (Short Paper). SSS 2016: 190-194 - 2014
- [c23]Hrishikesh B. Acharya:
POPE and PaNeL : Fast lookup in routing tables. INFOCOM Workshops 2014: 61-66 - [c22]Hrishikesh B. Acharya:
On rule width and the unreasonable effectiveness of policy verification. LCN 2014: 314-321 - [c21]Colin Scott, Andreas Wundsam, Barath Raghavan, Aurojit Panda, Andrew Or, Jefferson Lai, Eugene Huang, Zhi Liu, Ahmed El-Hassany, Sam Whitlock, Hrishikesh B. Acharya, Kyriakos Zarifis, Scott Shenker:
Troubleshooting blackbox SDN control software with minimal causal sequences. SIGCOMM 2014: 395-406 - [c20]Ehab S. Elmallah, Hrishikesh B. Acharya, Mohamed G. Gouda:
Incremental Verification of Computing Policies. SSS 2014: 226-236 - 2011
- [c19]Taehwan Choi, Hrishikesh B. Acharya, Mohamed G. Gouda:
Is That You? Authentication in a Network without Identities. GLOBECOM 2011: 1-5 - [c18]Taehwan Choi, Hrishikesh B. Acharya, Mohamed G. Gouda:
TPP: The Two-Way Password Protocol. ICCCN 2011: 1-6 - [c17]Hrishikesh B. Acharya, Mohamed G. Gouda:
On the Hardness of Topology Inference. ICDCN 2011: 251-262 - [c16]Hrishikesh B. Acharya, Mohamed G. Gouda:
Firewall verification and redundancy checking are equivalent. INFOCOM 2011: 2123-2128 - [c15]Hrishikesh B. Acharya, Mohamed G. Gouda:
Brief announcement: RedRem: a parallel redundancy remover. SPAA 2011: 267-268 - [c14]Hrishikesh B. Acharya, Taehwan Choi, Rida A. Bazzi, Mohamed G. Gouda:
The K-Observer Problem in Computer Networks. SSS 2011: 5-18 - [c13]Hrishikesh B. Acharya, Anil Kumar Katti, Mohamed G. Gouda:
Brief Announcement: A Conjecture on Traceability, and a New Class of Traceable Networks. SSS 2011: 431-432 - [c12]Taehwan Choi, Hrishikesh B. Acharya, Mohamed G. Gouda:
The best keying protocol for sensor networks. WOWMOM 2011: 1-6 - 2010
- [c11]Hrishikesh B. Acharya, Mohamed G. Gouda:
The Weak Network Tracing Problem. ICDCN 2010: 184-194 - [c10]Hrishikesh B. Acharya, Mohamed G. Gouda:
Projection and Division: Linear-Space Verification of Firewalls. ICDCS 2010: 736-743 - [c9]Hrishikesh B. Acharya, Aditya Joshi, Mohamed G. Gouda:
Firewall modules and modular firewalls. ICNP 2010: 174-182 - [c8]Hrishikesh B. Acharya, Mohamed G. Gouda:
Brief Announcement: On the Hardness of Topology Inference. SSS 2010: 285-287 - [c7]Hrishikesh B. Acharya, Mohamed G. Gouda:
On the Power of Non-spoofing Adversaries. DISC 2010: 437-449 - 2009
- [c6]Hrishikesh B. Acharya, Mohamed G. Gouda:
Linear-Time Verification of Firewalls. ICNP 2009: 133-140 - [c5]Hrishikesh B. Acharya, Ehab S. Elmallah, Mohamed G. Gouda:
Consistent Fixed Points and Negative Gain. PDCAT 2009: 299-305 - [c4]Hrishikesh B. Acharya, Mohamed G. Gouda:
Brief announcement: the theory of network tracing. PODC 2009: 318-319 - [c3]Hrishikesh B. Acharya, Mohamed G. Gouda:
A Theory of Network Tracing. SSS 2009: 62-74 - [c2]Mohamed G. Gouda, Hrishikesh B. Acharya:
Nash Equilibria in Stabilizing Systems. SSS 2009: 311-324 - [c1]Hrishikesh B. Acharya, Ehab S. Elmallah, Mohamed G. Gouda:
Brief Announcement: Consistent Fixed Points and Negative Gain. SSS 2009: 771-772
Informal and Other Publications
- 2018
- [i6]Devashish Gosain, Anshika Agarwal, Sahil Shekhawat, Hrishikesh B. Acharya, Sambuddho Chakravarty:
Mending Wall: On the Implementation of Censorship in India. CoRR abs/1806.06518 (2018) - [i5]Hrishikesh B. Acharya, Sambuddho Chakravarty, Devashish Gosain:
Few Throats to Choke: On the Current Structure of the Internet. CoRR abs/1806.07038 (2018) - 2017
- [i4]Devashish Gosain, Anshika Agarwal, Sambuddho Chakravarty, Hrishikesh B. Acharya:
The Devils in The Details: Placing Decoy Routers in the Internet. CoRR abs/1710.05527 (2017) - 2016
- [i3]Ayush Shah, Ambar Pal, Hrishikesh B. Acharya:
The Internet of Things: Perspectives on Security from RFID and WSN. CoRR abs/1604.00389 (2016) - 2015
- [i2]Ayush Shah, Hrishikesh B. Acharya, Ambar Pal:
Cells in the Internet of Things. CoRR abs/1510.07861 (2015) - [i1]Mohit Wadhwa, Ambar Pal, Ayush Shah, Paritosh Mittal, Hrishikesh B. Acharya:
Rules in Play: On the Complexity of Routing Tables and Firewalls. CoRR abs/1510.07880 (2015)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint