H-Index & Metrics Top Publications

H-Index & Metrics

Discipline name H-index Citations Publications World Ranking National Ranking
Computer Science H-index 59 Citations 16,699 147 World Ranking 1680 National Ranking 939

Overview

What is he best known for?

The fields of study he is best known for:

  • Computer network
  • The Internet
  • Operating system

His main research concerns Computer network, Middlebox, Distributed computing, Key and Computer security. His Computer network research is multidisciplinary, incorporating elements of Throughput and Software deployment. His research investigates the connection between Middlebox and topics such as Access control that intersect with problems in Cache, Network management, Routing and Software-defined networking.

His Distributed computing research integrates issues from Provisioning and Adaptation. The concepts of his Key study are interwoven with issues in Security policy, Telecommunications, Information sensitivity and Cloud computing security. He combines subjects such as Network processing and Internet privacy with his study of Computer security.

His most cited work include:

  • Making middleboxes someone else's problem: network processing as a cloud service (677 citations)
  • Understanding the impact of video quality on user engagement (584 citations)
  • SIMPLE-fying middlebox policy enforcement using SDN (567 citations)

What are the main themes of his work throughout his whole career to date?

His primary areas of study are Computer network, Computer security, Distributed computing, Key and The Internet. His Computer network research incorporates elements of Scalability and Internet video. His work on Network security as part of general Computer security study is frequently linked to Context, therefore connecting diverse disciplines of science.

His Distributed computing study combines topics from a wide range of disciplines, such as Cloud computing and Throughput. The various areas that Vyas Sekar examines in his Key study include Web service, Leverage, Adaptation, Bottleneck and Data science. His studies deal with areas such as Provisioning and Access control as well as Middlebox.

He most often published in these fields:

  • Computer network (35.16%)
  • Computer security (21.43%)
  • Distributed computing (18.13%)

What were the highlights of his more recent work (between 2017-2021)?

  • Computer network (35.16%)
  • Denial-of-service attack (10.44%)
  • Computer security (21.43%)

In recent papers he was focusing on the following fields of study:

Vyas Sekar mainly focuses on Computer network, Denial-of-service attack, Computer security, Distributed computing and Key. His Computer network research includes themes of Enhanced Data Rates for GSM Evolution and Verifiable secret sharing. His Denial-of-service attack research is multidisciplinary, incorporating perspectives in Embedded system and Backup.

His Computer security research incorporates themes from Software and Automatic summarization. His biological study spans a wide range of topics, including Domain, Performance prediction, Network Functions Virtualization and Test scheduling. His studies in Key integrate themes in fields like Web service, Metadata, Data access, Critical infrastructure and Data science.

Between 2017 and 2021, his most popular works were:

  • Nitrosketch: robust and general sketch-based monitoring in software switches (37 citations)
  • Hyperloop: group-based NIC-offloading to accelerate replicated transactions in multi-tenant storage systems (25 citations)
  • How to Catch when Proxies Lie: Verifying the Physical Locations of Network Proxies with Active Geolocation (21 citations)

In his most recent research, the most cited papers focused on:

  • Computer network
  • The Internet
  • Operating system

His primary scientific interests are in Computer security, Remote direct memory access, Operating system, Stateful firewall and Programming language. His primary area of study in Computer security is in the field of Access control. His work carried out in the field of Remote direct memory access brings together such families of science as Forwarding plane, Latency, Critical path method and Data availability.

The Forwarding plane study combines topics in areas such as Dram, Network address, Lookup table, Block and Systems architecture. His Operating system research includes themes of Isolation and Kernel. His Stateful firewall study combines topics in areas such as Model checking and Network verification.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Top Publications

Making middleboxes someone else's problem: network processing as a cloud service

Justine Sherry;Shaddi Hasan;Colin Scott;Arvind Krishnamurthy.
acm special interest group on data communication (2012)

971 Citations

SIMPLE-fying middlebox policy enforcement using SDN

Zafar Ayyub Qazi;Cheng-Chun Tu;Luis Chiang;Rui Miao.
acm special interest group on data communication (2013)

887 Citations

Understanding the impact of video quality on user engagement

Florin Dobrian;Vyas Sekar;Asad Awan;Ion Stoica.
acm special interest group on data communication (2011)

841 Citations

Improving fairness, efficiency, and stability in HTTP-based adaptive video streaming with FESTIVE

Junchen Jiang;Vyas Sekar;Hui Zhang.
conference on emerging network experiment and technology (2012)

772 Citations

A Control-Theoretic Approach for Dynamic Adaptive Video Streaming over HTTP

Xiaoqi Yin;Abhishek Jindal;Vyas Sekar;Bruno Sinopoli.
acm special interest group on data communication (2015)

667 Citations

Less pain, most of the gain: incrementally deployable ICN

Seyed Kaveh Fayazbakhsh;Yin Lin;Amin Tootoonchian;Ali Ghodsi.
acm special interest group on data communication (2013)

568 Citations

Design and implementation of a consolidated middlebox architecture

Vyas Sekar;Norbert Egi;Sylvia Ratnasamy;Michael K. Reiter.
networked systems design and implementation (2012)

530 Citations

Measuring user confidence in smartphone security and privacy

Erika Chin;Adrienne Porter Felt;Vyas Sekar;David Wagner.
symposium on usable privacy and security (2012)

433 Citations

Developing a predictive model of quality of experience for internet video

Athula Balachandran;Vyas Sekar;Aditya Akella;Srinivasan Seshan.
acm special interest group on data communication (2013)

428 Citations

An empirical evaluation of entropy-based traffic anomaly detection

George Nychis;Vyas Sekar;David G. Andersen;Hyong Kim.
internet measurement conference (2008)

382 Citations

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us

Top Scientists Citing Vyas Sekar

Stefan Schmid

Stefan Schmid

University of Vienna

Publications: 71

Jennifer Rexford

Jennifer Rexford

Princeton University

Publications: 45

Aditya Akella

Aditya Akella

University of Wisconsin–Madison

Publications: 43

Kadangode K. Ramakrishnan

Kadangode K. Ramakrishnan

University of California, Riverside

Publications: 41

Feng Qian

Feng Qian

University of Minnesota

Publications: 36

Hongxin Hu

Hongxin Hu

University at Buffalo, State University of New York

Publications: 33

Anja Feldmann

Anja Feldmann

Max Planck Society

Publications: 33

Yong Cui

Yong Cui

Tsinghua University

Publications: 31

Jun Bi

Jun Bi

Nanjing University

Publications: 31

Jiangchuan Liu

Jiangchuan Liu

Simon Fraser University

Publications: 29

J.J. Garcia-Luna-Aceves

J.J. Garcia-Luna-Aceves

University of California, Santa Cruz

Publications: 26

Steve Uhlig

Steve Uhlig

Queen Mary University of London

Publications: 26

Dario Rossi

Dario Rossi

Télécom ParisTech

Publications: 26

Raouf Boutaba

Raouf Boutaba

University of Waterloo

Publications: 26

Zhi-Li Zhang

Zhi-Li Zhang

University of Minnesota

Publications: 25

Something went wrong. Please try again later.