Vivek Nigam
TitleCited byYear
Algorithmic specifications in linear logic with subexponentials
V Nigam, D Miller
Proceedings of the 11th ACM SIGPLAN conference on Principles and practice of …, 2009
772009
A selective defense for application layer ddos attacks
YG Dantas, V Nigam, IE Fonseca
2014 IEEE Joint Intelligence and Security Informatics Conference, 75-82, 2014
462014
Maintaining distributed logic programs incrementally
V Nigam, L Jia, BT Loo, A Scedrov
Computer Languages, Systems & Structures 38 (2), 158-180, 2012
422012
A framework for proof systems
V Nigam, D Miller
Journal of Automated Reasoning 45 (2), 157-188, 2010
422010
FSR: Formal analysis and implementation toolkit for safe interdomain routing
A Wang, L Jia, W Zhou, Y Ren, BT Loo, J Rexford, V Nigam, A Scedrov, ...
IEEE/ACM Transactions on Networking (ToN) 20 (6), 1814-1827, 2012
402012
Incorporating tables into proofs
D Miller, V Nigam
International Workshop on Computer Science Logic, 466-480, 2007
372007
An extended framework for specifying and reasoning about proof systems
V Nigam, E Pimentel, G Reis
Journal of Logic and Computation 26 (2), 539-576, 2016
272016
Exploiting non-canonicity in the sequent calculus
V Nigam
262009
A general proof system for modalities in concurrent constraint programming
V Nigam, C Olarte, E Pimentel
International Conference on Concurrency Theory, 410-424, 2013
252013
Abstract effects and proof-relevant logical relations
N Benton, M Hofmann, V Nigam
ACM SIGPLAN Notices 49 (1), 619-631, 2014
242014
Prova: Rule-based java scripting for distributed web applications: A case study in bioinformatics
A Kozlenkov, R Penaloza, V Nigam, L Royer, G Dawelbait, M Schroeder
International Conference on Extending Database Technology, 899-908, 2006
242006
Profile based scheme against DDoS attack in WSN
V Nigam, S Jain, K Burse
2014 Fourth international conference on communication systems and network …, 2014
212014
Specifying proof systems in linear logic with subexponentials
V Nigam, E Pimentel, G Reis
Electronic Notes in Theoretical Computer Science 269, 109-123, 2011
212011
Towards the automated verification of cyber-physical security protocols: Bounding the number of timed intruders
V Nigam, C Talcott, AA Urquiza
European Symposium on Research in Computer Security, 450-470, 2016
192016
Slow TCAM exhaustion DDoS attack
TA Pascoal, YG Dantas, IE Fonseca, V Nigam
IFIP International Conference on ICT Systems Security and Privacy Protection …, 2017
172017
Subexponential concurrent constraint programming
C Olarte, E Pimentel, V Nigam
Theoretical Computer Science 606, 98-120, 2015
162015
A rewriting framework for activities subject to regulations
M Kanovich, T Ban Kirigin, V Nigam, A Scedrov, C Talcott, R Perovic
23rd International Conference on Rewriting Techniques and Applications (RTA'12), 2012
162012
Focusing in linear meta-logic
V Nigam, D Miller
International Joint Conference on Automated Reasoning, 507-522, 2008
162008
A dynamic logic programming based system for agents with declarative goals
V Nigam, J Leite
International Workshop on Declarative Agent Languages and Technologies, 174-190, 2006
152006
Bounded memory Dolev–Yao adversaries in collaborative systems
M Kanovich, TB Kirigin, V Nigam, A Scedrov
Information and Computation 238, 233-261, 2014
132014
The system can't perform the operation now. Try again later.
Articles 1–20