Flemming Nielson
#156,511
Most Influential Person Now
Danish professor
Flemming Nielson's AcademicInfluence.com Rankings
Flemming Nielsonmathematics Degrees
Mathematics
#7212
World Rank
#9845
Historical Rank
Measure Theory
#1951
World Rank
#2373
Historical Rank

Download Badge
Computer Science Mathematics
Flemming Nielson's Degrees
- PhD Computer Science University of Copenhagen
- Masters Mathematics University of Copenhagen
Similar Degrees You Can Earn
Why Is Flemming Nielson Influential?
(Suggest an Edit or Addition)Flemming Nielson's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Principles of Program Analysis (1999) (2032)
- Semantics with applications - a formal introduction (1992) (482)
- Abstract interpretation: a semantics-based tool for program analysis (1995) (199)
- Two-level functional languages (1992) (173)
- Static validation of security protocols (2005) (142)
- Type and Effect Systems (1999) (141)
- Higher-order concurrent programs with finite communication topology (extended abstract) (1994) (135)
- Infinitary control flow analysis: a collecting semantics for closure analysis (1997) (133)
- Automatic validation of protocol narration (2003) (111)
- Semantics with Applications: An Appetizer (2007) (101)
- Flow Logic: A Multi-paradigmatic Approach to Static Analysis (2002) (99)
- Two-Level Semantics and Abstract Interpretation (1989) (98)
- Static Analysis for the pi-Calculus with Applications to Security (2001) (95)
- Two-Level Semantics and Code Generation (1988) (94)
- Abstract Interpretation of Mobile Ambients (1999) (94)
- Control Flow Analysis for the pi-calculus (1998) (87)
- Type and effect systems - behaviours for concurrency (1999) (81)
- Validating Firewalls in Mobile Ambients (1999) (79)
- A Succinct Solver for ALFP (2002) (78)
- Shape analysis for mobile ambients (2000) (76)
- Automated Generation of Attack Trees (2014) (76)
- Security for Mobility (2001) (75)
- Automatic binding time analysis for a typed λ-calculus (1988) (73)
- Automatic Binding Time Analysis for a Typed lambda-Calculus (1988) (65)
- Quantitative Verification and Synthesis of Attack-Defence Scenarios (2016) (65)
- Program transformations in a denotational setting (1981) (62)
- Where Can an Insider Attack? (2006) (60)
- The logic of XACML (2011) (60)
- The Typed lambda-Calculus with First-Class Processes (1989) (59)
- Validating firewalls using flow logics (2002) (53)
- Static Analysis for Secrecy and Non-interference in Networks of Processes (2001) (52)
- Strictness analysis and denotational abstract interpretation (1987) (52)
- Control Flow Analysis for BioAmbients (2007) (52)
- Pareto Efficient Solutions of Attack-Defence Trees (2015) (51)
- A calculus for control flow analysis of security protocols (2004) (47)
- Normalizable Horn Clauses, Strongly Recognizable Relations, and Spi (2002) (47)
- International Workshop on Principles of Program Analysis (1999) (47)
- A Calculus for Quality (2012) (44)
- The Succinct Solver Suite (2004) (42)
- A ProCos Project Description: Esprit BRA 3104 (1989) (42)
- ZigBee-2007 Security Essentials (2008) (41)
- Semantics with Applications: An Appetizer (Undergraduate Topics in Computer Science) (2007) (41)
- Systematic realisation of control flow analyses for CML (1997) (41)
- Strong Abstract Interpretation Using Power Domains (Extended Abstract) (1983) (40)
- Control flow analysis for the π-calculus (1998) (39)
- Static Analysis of Processes for No and Read-Up nad No Write-Down (1999) (38)
- Static Analysis of Processes for No Read-Up and No Write-Down (1999) (38)
- Bounded fixed point iteration (1991) (37)
- Control-Flow Analysis in Cubic Time (2001) (37)
- Broadcast, Denial-of-Service, and Secure Communication (2013) (36)
- Spatial Analysis of BioAmbients (2004) (35)
- Cryptographic Analysis in Cubic Time (2002) (35)
- A Kleene Analysis of Mobile Ambients (2000) (34)
- From CML to Process Algebras (Extended Abstract) (1993) (33)
- A Formal Type System for Comparing Partial Evaluators (1988) (33)
- Flow Logic and Operational Semantics (1998) (32)
- Efficient CSL Model Checking Using Stratification (2011) (32)
- Static analysis for systems biology (2004) (31)
- Flow logic for Dolev-Yao secrecy in cryptographic processes (2002) (30)
- Abstract interpretation using domain theory (1984) (30)
- Securing Statically-verified Communications Protocols Against Timing Attacks (2005) (29)
- From CML to its Process Algebra (1996) (28)
- Sandboxing in myKlaim (2006) (27)
- Annotated type and effect systems (1996) (27)
- A denotational framework for data flow analysis (1981) (26)
- Polymorphic Subtyping for Effect Analysis: The Static Semantics (1996) (26)
- Interprocedural Control Flow Analysis (1999) (26)
- From Flow Logic to Static Type Systems for Coordination Languages (2010) (26)
- Formal Security Analysis of the MaCAN Protocol (2014) (25)
- Flow Logics for Constraint Based Analysis (1998) (25)
- Advice for Coordination (2008) (24)
- Semantics directed compiling for functional languages (1986) (24)
- Expected forms of data flow analyses (1985) (24)
- From CML to process Algebras (1993) (24)
- Type and behaviour reconstruction for higher-order concurrent programs (1995) (23)
- Code generation from two-level denotational meta-languages (1985) (23)
- Pathway analysis for BioAmbients (2008) (23)
- Effect-driven QuickChecking of compilers (2017) (22)
- Multi-Level Lambda-Calculi: An Algebraic Description (1996) (22)
- Advice from Belnap Policies (2009) (22)
- Automata-Based CSL Model Checking (2011) (21)
- Behaviour Analysis and Safety Conditions: A Case Study in CML (1997) (21)
- Constraints for Polymorphic Behaviours of Concurrent ML (1994) (21)
- Enforcing Availability in Failure-Aware Communicating Systems (2016) (21)
- Modal Abstractions of Concurrent Behaviour (2008) (20)
- A monotone framework for CCS (2009) (20)
- Data Flow Analysis for CCS (2006) (20)
- Pragmatic Aspects of Two-Level Denotational Meta-Languages (1986) (20)
- Abstract Interpretation of Denotational Definions (A Survey) (1986) (19)
- A flow-sensitive analysis of privacy properties (2007) (19)
- Static and Dynamic Processor Allocation for Higher-Order Concurrent Languages (1994) (19)
- Set-Pi: Set Membership p-Calculus (2015) (19)
- Finiteness conditions for fixed point iteration (1992) (18)
- The Tensor Product in Wadler's Analysis of Lists (1992) (18)
- Information Flow Analysis for VHDL (2005) (18)
- A secure key establishment protocol for zigbee wireless sensor networks (2009) (17)
- XACML 3.0 in Answer Set Programming (2012) (17)
- Control Flow Analysis Can Find New Flaws Too (2004) (17)
- Eureka Definitions for Free! or Disagreement Points for Fold/Unford Transformations (1990) (16)
- Model Checking Is Static Analysis of Modal Logic (2010) (16)
- Relational Analysis of Correlation (2008) (16)
- Transformations on higher-order functions (1989) (15)
- Static Analysis of a Model of the LDL Degradation Pathway (2006) (15)
- Discretionary Information Flow Control for Interaction-Oriented Specifications (2015) (15)
- Flow Logic for Process Calculi (2012) (15)
- Operational Semantics of Termination Types (1996) (14)
- ML with Concurrency: Design, Analysis, Implementation, and Application (1996) (14)
- Context Dependent Analysis of BioAmbients (2006) (14)
- Correctness of Code Generation from a Two-Level Meta-Language (1986) (13)
- Model Checking Exact Cost for Attack Scenarios (2017) (13)
- Topology-Dependent Abstractions of Broadcast Networks (2007) (13)
- Communication Analysis for Concurrent ML (1997) (13)
- Combining Static Analysis and Runtime Checking in Security Aspects for Distributed Tuple Spaces (2011) (13)
- Static Validation of Licence Conformance Policies (2008) (12)
- Content dependent information flow control (2017) (12)
- Semantics-Directed Program Analysis: A Tool-Maker's Perspective (1996) (12)
- Model Checking Multivariate State Rewards (2010) (12)
- Kleene's Logic with Equality (2001) (11)
- Static analysis of topology-dependent broadcast networks (2010) (11)
- Polymorphic Subtyping for Effect Analysis: The Algorithm (1996) (11)
- Secure Information Release in Timed Automata (2018) (11)
- Hoare Logic for Disjunctive Information Flow (2015) (11)
- Experiments with Succinct Solvers (2002) (11)
- Modelling and Analysis of Smart Grid: A Stochastic Model Checking Case Study (2012) (11)
- Security Analysis using Flow Logics (2001) (10)
- Semantic Foundations of Data Flow Analysis (1981) (10)
- Protocol Stacks for Services (2009) (10)
- Information Flow for Timed Automata (2017) (10)
- Probabilistic Analysis of the Quality Calculus (2013) (10)
- Termination analysis based on operational semantics (1995) (9)
- Process-Local Static Analysis of Synchronous Processes (2018) (9)
- ML with Concurrency (1997) (9)
- Context information for lazy code generation (1990) (9)
- Flow Logic for Imperative Objects (1998) (9)
- Inference Systems for Binding Time Analysis (1992) (9)
- Automatic Complexity Analysis (2002) (9)
- Automated Analysis of Security in Networking Systems (2004) (9)
- Denial-of-Service Security Attack in the Continuous-Time World (2014) (9)
- Formal Methods: An Appetizer (2019) (9)
- Succinct Solvers (2001) (9)
- Using transformations in the implementation of higher-order functions (1990) (9)
- Safety versus Security in the Quality Calculus (2013) (8)
- Polymorphic Subtyping for Effect Analysis: The Dynamic Semantics (1996) (8)
- On Evaluating the Performance of Security Protocols (2005) (8)
- Disjunctive Information Flow for Communicating Processes (2015) (8)
- A Parametric Abstract Domain for Lattice-Valued Regular Expressions (2016) (8)
- Performance Evaluation of Security Protocols Specified in LySa (2004) (8)
- Relational Analysis for Delivery of Services (2007) (8)
- Logical and Operational Methods in the Analysis of Programs and Systems (1996) (8)
- A calculus of quality for robustness against unreliable communication (2015) (8)
- Cryptographic Pattern Matching (2007) (7)
- Static Analysis for Proactive Security (2019) (7)
- Locality-Based Security Policies (2006) (7)
- Behaviour Analysis for Validating Communication Patterns (1997) (7)
- 06161 Working Groups' Report: The Challlenge of Combining Simulation and Verification (2006) (7)
- The Stochastic Quality Calculus (2014) (6)
- Optimizing ZigBee Security using Stochastic Model Checking (2012) (6)
- Optimizing key updates in sensor networks (2011) (6)
- Analyzing for Absence of Timing Leaks in VHDL (2006) (6)
- 2-Level λ-lifting (1988) (6)
- Timing Leaks and Coarse-Grained Clocks (2019) (6)
- Explicit Versus Symbolic Algorithms for Solving ALFP Constraints (2010) (6)
- Layered Predicates (1992) (6)
- Finiteness Conditions for Strictness Analysis (1993) (5)
- Time Dependent Policy-Based Access Control (2017) (5)
- Prescriptive Frameworks for Multi-Level Lambda-Calculi (1997) (5)
- Characteristics of Key Update Strategies for Wireless Sensor Networks (2011) (5)
- Stochastic Model Checking of the Stochastic Quality Calculus (2015) (5)
- Recursive Advice for Coordination (2012) (5)
- Behavior analysis for validating communication patterns (1998) (5)
- How to Trust the Re-use of Data (2015) (5)
- Uniform Protection for Multi-exposed Targets (2014) (5)
- Flow logic for language-based safety and security (2005) (5)
- Validating "rewalls using #ow logics (2002) (4)
- Designing, Capturing and Validating History-Sensitive Security Policies for Distributed Systems (2011) (4)
- The Type and Effect System (1999) (4)
- The Guided System Development Framework: Modeling and Verifying Communication Systems (2014) (4)
- Lazy Mobile Intruders (2013) (4)
- Klaim-DB: A Modeling Language for Distributed Database Applications (2015) (4)
- Aspects with Program Analysis for Security Policies (2010) (4)
- A Scalable Inclusion Constraint Solver Using Unification (2008) (4)
- AspectKE*: Security Aspects with Program Analysis for Distributed Systems (2010) (4)
- A Framework for Hybrid Systems with Denial-of-Service Security Attack (2014) (4)
- Key Update Assistant for resource-constrained networks (2012) (4)
- Predictive access control for distributed computation (2013) (4)
- Galois Connections for Flow Algebras (2011) (4)
- Static Analysis of IMC (2012) (3)
- Quantitative modelling and analysis of a Chinese smart grid: a stochastic model checking case study (2014) (3)
- Lightweight Information Flow (2019) (3)
- The Logic of XACML - Extended (2011) (3)
- Analysing Protocol Stacks for Services (2011) (3)
- Trustworthy Global Computing, 4th International Symposium, TGC 2008, Barcelona, Spain, November 3-4, 2008, Revised Selected Papers (2009) (3)
- Modelling Chinese Smart Grid: A Stochastic Model Checking Case Study (2012) (3)
- Iterated process analysis over lattice-valued regular expressions (2016) (3)
- Factorization of Behavioral Integrity (2015) (3)
- Reachability for Finite-State Process Algebras Using Static Analysis (2011) (3)
- Heuristics for Safety and Security Constraints (2007) (3)
- Discovering, quantifying, and displaying attacks (2016) (3)
- What is a free name in a process algebra? (2007) (3)
- Verification of Stochastic Process Calculi (2011) (3)
- Future-dependent Flow Policies with Prophetic Variables (2016) (3)
- Forced transformation of Occam programs (1992) (3)
- Language-based Security for VHDL (2006) (3)
- Automati Complexity Analysis (2002) (3)
- History-sensitive versus future-sensitive approaches to security in distributed systems (2010) (3)
- Model Checking as Static Analysis: Revisited (2012) (3)
- Layered fixed point logic (2012) (3)
- Types from Control Flow Analysis (2006) (3)
- Proceedings of the 10th International Conference on Coordination Models and Languages (Coordination'08) (2008) (3)
- Hardest Attackers (2000) (3)
- Iterative Specialisation of Horn Clauses (2008) (2)
- From Explicit to Symbolic Types for Communication Protocols in CCS (2011) (2)
- Data Structures in the Succinct Solver (V1.0) (2002) (2)
- Two-Level Functional Languages: Abstract Interpretation (1992) (2)
- Secure Guarded Commands (2020) (2)
- Comments on Georgeff's “transformations and reduction strategies for typed lambda expressions” (1986) (2)
- On Building Secure Communication Systems (2013) (2)
- Towards Static Analysis of Policy-Based Self-adaptive Computing Systems (2016) (2)
- Adaptive Security Policies (2020) (2)
- Content-Dependent Security Policies in Avionics (2016) (2)
- Polymorphic Subtyping for Side Effects (1997) (2)
- A Theory of Available-by-Design Communicating Systems (2016) (2)
- Functional Completeness of the Mixed lambda-Calculus and Combinatory Logic (1990) (2)
- Belief Bisimulation for Hidden Markov Models - Logical Characterisation and Decision Algorithm (2012) (2)
- Modeling and Analysing Socio-Technical Systems (2015) (2)
- Constraint Based Analysis (1999) (2)
- Secondary use of data in EHR systems (2012) (2)
- Fitness Conditions for fixed Point Iteration (1992) (2)
- Atomistic Galois insertions for flow sensitive integrity (2017) (2)
- Perspectives on program analysis (1996) (2)
- Fixpoints vs Moore Families (2012) (2)
- Su in t Solvers (2001) (2)
- Probabilistic Aspects: Checking Security in an Imperfect World (2010) (2)
- Active Evaluation Contexts for Reaction Semantics (2007) (2)
- LBTool: A stochastic toolkit for leave-based key updates (2012) (1)
- Modelling and Analysing Socio-Technical Systems (2015) (1)
- Lattice based Least Fixed Point Logic (2012) (1)
- A Succinct Approach to Static Analysis and Model Checking (2012) (1)
- Pathway analysis of IMC (2009) (1)
- Perspectives on program analysis (1997) (1)
- Resilience analysis of key update strategies for resource-constrained networks (2011) (1)
- Multi-Level Languages: a Descriptive Framework (1996) (1)
- Position paper: A generic approach for security policies composition - DTU Orbit (06/11/2017) (2012) (1)
- Data Flow Analysis (1999) (1)
- Observation Predicates in Flow Logic (2003) (1)
- Quantitative modelling and analysis of a Chinese smart grid: a stochastic model checking case study (2014) (1)
- Validating Programs in Concurrent ML (1999) (1)
- Polymorphic Subtyping for Effect Analysis: The Integration (1996) (1)
- Polymorphic Subtyping for Effect Analysis: The Semantics (1996) (1)
- Iterative Algorithms for Fixed Point Comutation (1993) (1)
- Design, Analysis and Reasoning about Tools: Abstracts from the First Workshop (Aarhus, Danmark, 1991, September 16-17 (1991) (1)
- Modelling and Verifying Communication Failure of Hybrid Systems in HCSP (2016) (1)
- Model Checking as Static Analysis (2012) (1)
- Set-π: Set Membership π-calculus (2015) (1)
- Trust-Based Enforcement of Security Policies (2014) (1)
- Modal abstractions of concurrent behavior (2011) (1)
- Lazy Mobile Intruders ? (Extended Version) (2013) (1)
- A Stochastic Broadcast Pi-Calculus (2011) (1)
- Pareto Efficient Solutions of Attack Trees (2014) (1)
- Constraint Solver Techniques for Implementing Precise and Scalable Static Program Analysis (2009) (1)
- Automatic Information Flow Validation for High-Assurance Systems (2017) (1)
- Belief Bisimulation for Hidden Markov Models (2012) (1)
- Multi-valued Logic for Static Analysis and Model Checking (2018) (1)
- From generic to specific: off-line optimization for a general constraint solver (2008) (1)
- Availability by Design (2014) (1)
- Semantics with Applications : Model-Based Program Analysis c © (0)
- Language-Based Security (2019) (0)
- Program Analysis (2019) (0)
- Summary of Transformation Functions (1992) (0)
- The CaPiTo Approach to Protocol Validation - (Invited Talk) (2010) (0)
- Design-Efficiency in Security (2013) (0)
- Security through Analysis and Verification (Dagstuhl Seminar 00501) (2021) (0)
- A generic approach for security policies composition: position paper (2012) (0)
- Program Analysis (an Appetizer) (2020) (0)
- D8.8 Sensoria Results Applied to the Case Studies (0)
- Roadmap Document on Stochastic Analysis (2012) (0)
- A Coordination Language for Databases (2016) (0)
- More on Axiomatic Program Verification (2007) (0)
- Polymorphic Subtyping for Effect Analysis: the Algroithm (1996) (0)
- Types Made Explicit (1992) (0)
- Design, analysis and Reasoning about Tools: Abstracts from the Second Workshop (Aalborg, 1992, 20-21 August) (1992) (0)
- Benign Interaction of Security Domains (2021) (0)
- More on Operational Semantics (2007) (0)
- Design, Analysis and Reasoning about Tools: Abstracts from the Third Workshop (1993) (0)
- Two-Level Functional Languages: Combinators Made Explicit (1992) (0)
- Static analysis for system biology (2004) (0)
- Provably Correct Implementation (2007) (0)
- Design , Analysis and Reasoning about Tools : Abstracts from the First Workshop (2004) (0)
- CaPiTo: protocol stacks for services (2011) (0)
- A Verifiable Language for Cryptographic Protocols (2009) (0)
- An algebraic approach to analysis of recursive and concurrent programs (2013) (0)
- Two-Level Functional Languages: Parameterized Semantics (1992) (0)
- Program Graphs (2019) (0)
- Principles of Security and Trust (2019) (0)
- Type-checking Availability in Choreographic Programming (2016) (0)
- Preface Imperative Programming: Functional Programming: Logic Programming: Metacomputation by Supercompilation: Generating Extensions: Multi-level Systems: Program Analyses: Further Partial-evaluation Resources (0)
- Two-Level Functional Languages: Conclusion (1992) (0)
- Verification of Stateful Protocols - Set-Based Abstractions in the Applied Pi-Calculus (2014) (0)
- Effect-DrivenQuickChecking of Compilers (2017) (0)
- The Logic of XACML Carroline (2011) (0)
- Bounds on the leakage of the input ’ s distribution in information-hiding protocols (2019) (0)
- The Mixed Lambda-Calculus and Combinatory Logic (an overview) (1989) (0)
- 2-level Lambda-lifting (1988) (0)
- Eureka Definitions for Free! (2005) (0)
- Control Flow Analysis for BioAmbients 1 (2003) (0)
- More on Denotational Semantics (2007) (0)
- Interprocedural Control Flow Analysis (Extended version) (1998) (0)
- The Inference Algorithm: Completeness (1999) (0)
- From CML to Process (1998) (0)
- ARES 2008: Proceedings of the Third International Conference on Availability, Security and Reliability (2008) (0)
- Axiomatic Program Verification (2007) (0)
- Model Checking (2019) (0)
- Binding Time Made Explicit (1992) (0)
- Enforcing globally dependent flow policies in message-passing systems (2019) (0)
- Pushdown Systems for Monotone Frameworks (2013) (0)
- The Inference Algorithm (1999) (0)
- Post-processing the Analysis (1999) (0)
- Enhancing Creativity by Test Diversity (2006) (0)
- ICT-powered Health Care Processes - (Position Paper) (2013) (0)
- Model-based Verification of Service-oriented Systems Proposal in the Programme for International PhD Studentships (2006) (0)
- D3.b: Challenging Analysis Scenarios and Language Primitives (2007) (0)
- Theoretical Aspects of Semantics-Based Language Implementation (1990) (0)
- CORRECTNESS OF CODE GENERATION (2005) (0)
- More on Program Analysis (2007) (0)
- Controlling Modelling Artifacts (2011) (0)
- D3.a: Advances in Analysis Technology (2007) (0)
- The Guided System Development Framework (2018) (0)
- Reachability for Finite-State Process Algebras using Horn Clauses (2013) (0)
This paper list is powered by the following services:
Other Resources About Flemming Nielson
What Schools Are Affiliated With Flemming Nielson?
Flemming Nielson is affiliated with the following schools: