Vivek Nigam

Orcid: 0000-0003-4089-1218

According to our database1, Vivek Nigam authored at least 106 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Model-Based Systems Engineering Plugin for Cloud Security Architecture Design.
SN Comput. Sci., June, 2024

Design for dependability - State of the art and trends.
J. Syst. Softw., 2024

Towards an Approach to Pattern-based Domain-Specific Requirements Engineering.
CoRR, 2024

2023
A Toolchain for Synthesizing and Validating Safety Architectures.
SN Comput. Sci., July, 2023

Automating Safety and Security Co-design through Semantically Rich Architecture Patterns.
ACM Trans. Cyber Phys. Syst., January, 2023

BLE injection-free attack: a novel attack on bluetooth low energy devices.
J. Ambient Intell. Humaniz. Comput., 2023

Technical-Report: Automating Recoverability Proofs for Cyber-Physical Systems with Runtime Assurance Architectures.
CoRR, 2023

Automating Recoverability Proofs for Cyber-Physical Systems with Runtime Assurance Architectures.
Proceedings of the Theoretical Aspects of Software Engineering, 2023

Safety-Aware Deployment Synthesis and Trade-Off Analysis of Apollo Autonomous Driving Platform.
Proceedings of the 20th International Conference on Software Architecture, 2023

Automating Vehicle SOA Threat Analysis Using a Model-Based Methodology.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023

Incremental Rewriting Modulo SMT.
Proceedings of the Automated Deduction - CADE 29, 2023

2022
Detection and diagnosis of deviations in distributed systems of autonomous agents.
Math. Struct. Comput. Sci., October, 2022

On the Security and Complexity of Periodic Systems.
SN Comput. Sci., 2022

Automated construction of security integrity wrappers for Industry 4.0 applications.
J. Log. Algebraic Methods Program., 2022

Technical Report: Automating Vehicle SOA Threat Analysis using a Model-Based Methodology.
CoRR, 2022

Automating Safety and Security Co-Design through Semantically-Rich Architectural Patterns.
CoRR, 2022

Automating Safety Proofs About Cyber-Physical Systems Using Rewriting Modulo SMT.
Proceedings of the Rewriting Logic and Its Applications - 14th International Workshop, 2022

A Model-based System Engineering Plugin for Safety Architecture Pattern Synthesis.
Proceedings of the 10th International Conference on Model-Driven Engineering and Software Development, 2022

On the Formalization and Computational Complexity of Resilience Problems for Cyber-Physical Systems.
Proceedings of the Theoretical Aspects of Computing - ICTAC 2022, 2022

2021
Resource and timing aspects of security protocols.
J. Comput. Secur., 2021

On the Complexity of Verification of Time-Sensitive Distributed Systems: Technical Report.
CoRR, 2021

On Security Analysis of Periodic Systems: Expressiveness and Complexity.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021

Process-As-Formula Interpretation: A Substructural Multimodal View (Invited Talk).
Proceedings of the 6th International Conference on Formal Structures for Computation and Deduction, 2021

Proof Search and Certificates for Evidential Transactions.
Proceedings of the Automated Deduction - CADE 28, 2021

On the Complexity of Verification of Time-Sensitive Distributed Systems.
Proceedings of the Protocols, Strands, and Logic, 2021

2020
Security Engineering for ISO 21434.
CoRR, 2020

Less Manual Work for Safety Engineers: Towards an Automated Safety Reasoning with Safety Patterns.
Proceedings of the Proceedings 36th International Conference on Logic Programming (Technical Communications), 2020

Slow denial-of-service attacks on software defined networks.
Comput. Networks, 2020

A Formal Security Assessment Framework for Cooperative Adaptive Cruise Control.
Proceedings of the IEEE Vehicular Networking Conference, 2020

Soft Subexponentials and Multiplexing.
Proceedings of the Automated Reasoning - 10th International Joint Conference, 2020

2019
Logical and Semantic Frameworks with Applications.
Theor. Comput. Sci., 2019

Subexponentials in non-commutative linear logic.
Math. Struct. Comput. Sci., 2019

Towards Computer-Aided Software Requirements Process.
Proceedings of the Workshops of the Software Engineering Conference 2019, 2019

A Multi-UAV Co-Simulation Environment for Safety and Performance Analysis.
Proceedings of the IX Brazilian Symposium on Computing Systems Engineering, 2019

On Computer-Aided Techniques for Supporting Safety and Security Co-Engineering.
Proceedings of the IEEE International Symposium on Software Reliability Engineering Workshops, 2019

ExplicitCase: Tool-Support for Creating and Maintaining Assurance Arguments Integrated with System Models.
Proceedings of the IEEE International Symposium on Software Reliability Engineering Workshops, 2019

TSNSCHED: Automated Schedule Generation for Time Sensitive Networking.
Proceedings of the 2019 Formal Methods in Computer Aided Design, 2019

Formal Security Verification of Industry 4.0 Applications.
Proceedings of the 24th IEEE International Conference on Emerging Technologies and Factory Automation, 2019

Resource-Bounded Intruders in Denial of Service Attacks.
Proceedings of the 32nd IEEE Computer Security Foundations Symposium, 2019

Selectivity and Autoscaling as Complementary Defenses for DDoS Protection to Cloud Services.
Proceedings of the 2019 IEEE 8th International Conference on Cloud Networking, 2019

Symbolic Timed Trace Equivalence.
Proceedings of the Foundations of Security, Protocols, and Equational Reasoning, 2019

A Multiset Rewriting Model for Specifying and Verifying Timing Aspects of Security Protocols.
Proceedings of the Foundations of Security, Protocols, and Equational Reasoning, 2019

2018
Effect-dependent transformations for concurrent programs.
Sci. Comput. Program., 2018

Proof-Relevant Logical Relations for Name Generation.
Log. Methods Comput. Sci., 2018

On the accuracy of formal verification of selective defenses for TDoS attacks.
J. Log. Algebraic Methods Program., 2018

Compliance in Real Time Multiset Rewriting Models.
CoRR, 2018

Model-Based Safety and Security Engineering.
CoRR, 2018

Symbolic Timed Observational Equivalence.
CoRR, 2018

Formal Analysis of Sneak-Peek: A Data Centre Attack and Its Mitigations.
Proceedings of the ICT Systems Security and Privacy Protection, 2018

Statistical Model Checking of Distance Fraud Attacks on the Hancke-Kuhn Family of Protocols.
Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy, 2018

A Logical Framework with Commutative and Non-commutative Subexponentials.
Proceedings of the Automated Reasoning - 9th International Joint Conference, 2018

2017
On subexponentials, focusing and modalities in concurrent systems.
Theor. Comput. Sci., 2017

A rewriting framework and logic for activities subject to regulations.
Math. Struct. Comput. Sci., 2017

Time, computational complexity, and probability in the analysis of distance-bounding protocols.
J. Comput. Secur., 2017

Mechanizing Focused Linear Logic in Coq.
Proceedings of the 12th Workshop on Logical and Semantic Frameworks, with Applications, 2017

Analysis of design strategies for unmanned aerial vehicles using co-simulation.
Des. Autom. Embed. Syst., 2017

A Framework for Analyzing Adaptive Autonomous Aerial Vehicles.
Proceedings of the Software Engineering and Formal Methods, 2017

Slow TCAM Exhaustion DDoS Attack.
Proceedings of the ICT Systems Security and Privacy Protection, 2017

Módulo de Proteção contra Ataques de Negação de Serviço na Camada de Aplicação: uma Análise de Qualidade de Serviço e Experiência de Usuá rio∗.
Proceedings of the XXXV Brazilian Symposium on Computer Networks and Distributed Systems, 2017

2016
An extended framework for specifying and reasoning about proof systems.
J. Log. Comput., 2016

Preface.
Proceedings of the 11th Workshop on Logical and Semantic Frameworks with Applications, 2016

Formal Specification and Verification of a Selective Defense for TDoS Attacks.
Proceedings of the Rewriting Logic and Its Applications - 11th International Workshop, 2016

Formal Specification and Analysis of Robust Adaptive Distributed Cyber-Physical Systems.
Proceedings of the Formal Methods for the Quantitative Evaluation of Collective Adaptive Systems, 2016

A Framework for the Analysis of UAV Strategies Using Co-simulation.
Proceedings of the VI Brazilian Symposium on Computing Systems Engineering, 2016

Timed Multiset Rewriting and the Verification of Time-Sensitive Distributed Systems.
Proceedings of the Formal Modeling and Analysis of Timed Systems, 2016

Towards the Automated Verification of Cyber-Physical Security Protocols: Bounding the Number of Timed Intruders.
Proceedings of the Computer Security - ESORICS 2016, 2016

Counting Successes: Effects and Transformations for Non-deterministic Programs.
Proceedings of the A List of Successes That Can Change the World, 2016

2015
Subexponential concurrent constraint programming.
Theor. Comput. Sci., 2015

Logic and Verification Methods in Security and Privacy (NII Shonan Meeting 2015-16).
NII Shonan Meet. Rep., 2015

Multi-focused Proofs with Different Polarity Assignments.
Proceedings of the Tenth Workshop on Logical and Semantic Frameworks, with Applications, 2015

Towards the Automated Generation of Focused Proof Systems.
Proceedings of the Proceedings First International Workshop on Focusing, 2015

Discrete vs. Dense Times in the Analysis of Cyber-Physical Security Protocols.
Proceedings of the Principles of Security and Trust - 4th International Conference, 2015

Inferring Executable Models from Formalized Experimental Evidence.
Proceedings of the Computational Methods in Systems Biology, 2015

2014
A Proof Theoretic Study of Soft Concurrent Constraint Programming.
Theory Pract. Log. Program., 2014

A framework for linear authorization logics.
Theor. Comput. Sci., 2014

Bounded memory Dolev-Yao adversaries in collaborative systems.
Inf. Comput., 2014

Bounded memory protocols.
Comput. Lang. Syst. Struct., 2014

Abstract effects and proof-relevant logical relations.
Proceedings of the 41st Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2014

A Selective Defense for Application Layer DDoS Attacks.
Proceedings of the IEEE Joint Intelligence and Security Informatics Conference, 2014

Quati: An Automated Tool for Proving Permutation Lemmas.
Proceedings of the Automated Reasoning - 7th International Joint Conference, 2014

2013
Checking Proof Transformations with ASP.
Theory Pract. Log. Program., 2013

Preface.
Proceedings of the 6th Workshop on Intuitionistic Modal Logic and Applications, 2013

Dynamic Spaces in Concurrent Constraint Programming.
Proceedings of the 8th Workshop on Logical and Semantic Frameworks, 2013

Bounded Memory Protocols and Progressing Collaborative Systems.
Proceedings of the Computer Security - ESORICS 2013, 2013

A General Proof System for Modalities in Concurrent Constraint Programming.
Proceedings of the CONCUR 2013 - Concurrency Theory - 24th International Conference, 2013

2012
FSR: formal analysis and implementation toolkit for safe interdomain routing.
IEEE/ACM Trans. Netw., 2012

Maintaining distributed logic programs incrementally.
Comput. Lang. Syst. Struct., 2012

A Rewriting Framework for Activities Subject to Regulations.
Proceedings of the 23rd International Conference on Rewriting Techniques and Applications (RTA'12) , 2012

On the Complexity of Linear Authorization Logics.
Proceedings of the 27th Annual IEEE Symposium on Logic in Computer Science, 2012

Towards an automated assistant for clinical investigations.
Proceedings of the ACM International Health Informatics Symposium, 2012

2010
A Framework for Proof Systems.
J. Autom. Reason., 2010

Specifying Proof Systems in Linear Logic with Subexponentials.
Proceedings of the Fifth Logical and Semantic Frameworks, with Applications Workshop, 2010

An Operational Semantics for Network Datalog.
Proceedings of the 3rd International Workshop on Logics, Agents, and Mobility, 2010

2009
Algorithmic specifications in linear logic with subexponentials.
Proceedings of the 11th International ACM SIGPLAN Conference on Principles and Practice of Declarative Programming, 2009

2008
Compound noise separation in digital circuits using blind source separation.
Microelectron. J., 2008

Generalized Blind Delayed Source Separation Model for Online Non-invasive Twin-fetal Sound Separation: A Phantom Study.
J. Medical Syst., 2008

Focusing in Linear Meta-logic.
Proceedings of the Automated Reasoning, 4th International Joint Conference, 2008

2007
Incorporating Tables into Proofs.
Proceedings of the Computer Science Logic, 21st International Workshop, 2007

2006
A Snore Extraction Method from Mixed Sound for a Mobile Snore Recorder.
J. Medical Syst., 2006

Fuzzy logic based variable step size algorithm for blind delayed source separation.
Fuzzy Sets Syst., 2006

Adding Knowledge Updates to 3APL.
Proceedings of the Programming Multi-Agent Systems, 4th International Workshop, 2006

Compound noise analysis in digital circuits using blind source separation.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2006), 2006

A Procedure to Extract the Aortic and the Pulmonary Sounds from the Phonocardiogram.
Proceedings of the 28th International Conference of the IEEE Engineering in Medicine and Biology Society, 2006

Prova: Rule-Based Java Scripting for Distributed Web Applications: A Case Study in Bioinformatics.
Proceedings of the Current Trends in Database Technology - EDBT 2006, 2006

A Dynamic Logic Programming Based System for Agents with Declarative Goals.
Proceedings of the Declarative Agent Languages and Technologies IV, 2006

Separation of Individual Noise Sources from Compound Noise Measurements in Digital Circuits.
Proceedings of the IEEE Asia Pacific Conference on Circuits and Systems 2006, 2006


  Loading...