Algorithmic specifications in linear logic with subexponentials V Nigam, D Miller Proceedings of the 11th ACM SIGPLAN conference on Principles and practice of …, 2009 | 113 | 2009 |
A selective defense for application layer ddos attacks YG Dantas, V Nigam, IE Fonseca 2014 IEEE Joint Intelligence and Security Informatics Conference, 75-82, 2014 | 90 | 2014 |
Slow TCAM exhaustion DDoS attack TA Pascoal, YG Dantas, IE Fonseca, V Nigam ICT Systems Security and Privacy Protection: 32nd IFIP TC 11 International …, 2017 | 79 | 2017 |
A framework for proof systems V Nigam, D Miller Journal of Automated Reasoning 45, 157-188, 2010 | 60 | 2010 |
FSR: Formal analysis and implementation toolkit for safe interdomain routing A Wang, L Jia, W Zhou, Y Ren, BT Loo, J Rexford, V Nigam, A Scedrov, ... IEEE/ACM Transactions on Networking 20 (6), 1814-1827, 2012 | 53 | 2012 |
Slow denial-of-service attacks on software defined networks TA Pascoal, IE Fonseca, V Nigam Computer Networks 173, 107223, 2020 | 52 | 2020 |
Maintaining distributed logic programs incrementally V Nigam, L Jia, B Thau Loo, A Scedrov Proceedings of the 13th international ACM SIGPLAN symposium on Principles …, 2011 | 52 | 2011 |
TSNSCHED: Automated schedule generation for time sensitive networking ACT dos Santos, B Schneider, V Nigam 2019 Formal Methods in Computer Aided Design (FMCAD), 69-77, 2019 | 50 | 2019 |
An extended framework for specifying and reasoning about proof systems V Nigam, E Pimentel, G Reis Journal of Logic and Computation 26 (2), 539-576, 2016 | 47 | 2016 |
Subexponentials in non-commutative linear logic M Kanovich, S Kuznetsov, V Nigam, A Scedrov Mathematical Structures in Computer Science 29 (8), 1217-1249, 2019 | 45 | 2019 |
Abstract effects and proof-relevant logical relations N Benton, M Hofmann, V Nigam Proceedings of the 41st ACM SIGPLAN-SIGACT Symposium on Principles of …, 2014 | 42 | 2014 |
Incorporating tables into proofs D Miller, V Nigam International workshop on computer science logic, 466-480, 2007 | 42 | 2007 |
Towards the automated verification of cyber-physical security protocols: Bounding the number of timed intruders V Nigam, C Talcott, A Aires Urquiza Computer Security–ESORICS 2016: 21st European Symposium on Research in …, 2016 | 39 | 2016 |
A general proof system for modalities in concurrent constraint programming V Nigam, C Olarte, E Pimentel International Conference on Concurrency Theory, 410-424, 2013 | 38 | 2013 |
Prova: Rule-based java scripting for distributed web applications: A case study in bioinformatics A Kozlenkov, R Penaloza, V Nigam, L Royer, G Dawelbait, M Schroeder Current Trends in Database Technology–EDBT 2006: EDBT 2006 Workshops PhD …, 2006 | 31 | 2006 |
Exploiting non-canonicity in the sequent calculus V Nigam Ecole Polytechnique X, 2009 | 29 | 2009 |
A framework for analyzing adaptive autonomous aerial vehicles IA Mason, V Nigam, C Talcott, A Brito Software Engineering and Formal Methods: SEFM 2017 Collocated Workshops …, 2018 | 27 | 2018 |
Subexponential concurrent constraint programming C Olarte, E Pimentel, V Nigam Theoretical Computer Science 606, 98-120, 2015 | 26 | 2015 |
Bounded memory Dolev–Yao adversaries in collaborative systems M Kanovich, TB Kirigin, V Nigam, A Scedrov Information and computation 238, 233-261, 2014 | 26 | 2014 |
Specifying proof systems in linear logic with subexponentials V Nigam, E Pimentel, G Reis Electronic Notes in Theoretical Computer Science 269, 109-123, 2011 | 26 | 2011 |