Principles of program analysis F Nielson, HR Nielson, C Hankin Springer, 2015 | 3110 | 2015 |
Principles of Program Analysis C Hankin, F Nielson, HR Nielson Preparation, 1999 | 3110* | 1999 |
Microservices: yesterday, today, and tomorrow N Dragoni, S Giallorenzo, AL Lafuente, M Mazzara, F Montesi, R Mustafin, ... Present and Ulterior Software Engineering, 195-216, 2017 | 1612 | 2017 |
The AVISPA tool for the automated validation of internet security protocols and applications A Armando, D Basin, Y Boichut, Y Chevalier, L Compagna, J Cuéllar, ... International conference on computer aided verification, 281-285, 2005 | 1583 | 2005 |
Semantics with applications HR Nielson, F Nielson Wiley, 1992 | 1041* | 1992 |
OFMC: A symbolic model checker for security protocols D Basin, S Mödersheim, L Vigano International Journal of Information Security 4 (3), 181-208, 2005 | 664 | 2005 |
Abstract interpretation: a semantics-based tool for program analysis F Nielson, N Jones Handbook of logic in computer science 4, 527-636, 1994 | 284 | 1994 |
An on-the-fly model-checker for security protocol analysis D Basin, S Mödersheim, L Vigano European Symposium on Research in Computer Security, 253-270, 2003 | 260 | 2003 |
Directed explicit model checking with HSF-SPIN S Edelkamp, AL Lafuente, S Leue Proceedings of the 8th international SPIN workshop on Model checking of …, 2001 | 257 | 2001 |
Two-Level Functional Languages, volume 34 of Cambridge Tracts in Theoretical Computer Science F Nielson, HR Nielson Cambridge University Press, 1992 | 255 | 1992 |
Two-level functional languages F Nielson, HR Nielson Cambridge university press, 2005 | 254* | 2005 |
Directed explicit-state model checking in the validation of communication protocols S Edelkamp, S Leue, A Lluch-Lafuente International journal on software tools for technology transfer 5 (2-3), 247-267, 2004 | 249 | 2004 |
Semantics with applications: an appetizer HR Nielson, F Nielson Springer Science & Business Media, 2007 | 245 | 2007 |
A high level protocol specification language for industrial security-sensitive protocols Y Chevalier, L Compagna, J Cuellar, PH Drielsma, J Mantovani, ... Workshop on Specification and Automated Processing of Security Requirements …, 2004 | 220 | 2004 |
Type and effect systems F Nielson, HR Nielson, C Hankin Principles of Program Analysis, 283-363, 1999 | 201 | 1999 |
Higher-order concurrent programs with finite communication topology HR Nielson, F Nielson Proceedings of the 21st ACM SIGPLAN-SIGACT symposium on Principles of …, 1994 | 180 | 1994 |
Static validation of security protocols C Bodei, M Buchholtz, P Degano, F Nielson, HR Nielson Journal of Computer Security 13 (3), 347-390, 2005 | 176 | 2005 |
Infinitary control flow analysis: a collecting semantics for closure analysis F Nielson, HR Nielson Proceedings of the 24th ACM SIGPLAN-SIGACT symposium on Principles of …, 1997 | 164 | 1997 |
Automatic validation of protocol narration C Bodei, M Buchholtz, P Degano, F Nielson, HR Nielson Computer Security Foundations Workshop, 2003. Proceedings. 16th IEEE, 126-140, 2003 | 142 | 2003 |
Automatic Validation of Protocol Narration CBMBP Degano, FNHR Nielson Proceedings, 126, 2003 | 142* | 2003 |