Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Tidjani Négadi
Matteo Pascucci
Qing-Hao Meng
Anthony Quelen
Jhonathan Pinzon
Liangliang Shang
Giovanni Venturelli
Chen Ma
Jing-Sheng Wong
Radu Timofte
Home
/
Author
/
SEBASTIAAN H. VON SOLMS
Author Info
Open Visualization
Name
Affiliation
Papers
SEBASTIAAN H. VON SOLMS
Department of Mathematics, University of Antwerp, U.I.A., Wilrijk, Belgium
36
Collaborators
Citations
PageRank
25
116
53.32
Referers
Referees
References
213
163
97
Search Limit
100
213
Publications (36 rows)
Collaborators (25 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
Towards a Smartphone User Competency Evolution Model.
0
0.34
2015
ATE: Anti-malware technique evaluator
1
0.49
2012
Implementing Critical Information Infrastructure Protection Structures In Developing Countries
0
0.34
2012
Implementing Rootkits to Address Operating System Vulnerabilities.
3
0.58
2011
The Cloud's Core Virtual Infrastructure Security
0
0.34
2010
A Multi-component View of Digital Forensics
3
0.46
2010
A Virtualized Environment Security (VES) model for a secure virtualized environment.
2
0.43
2010
A Framework to Guide the Implementation of Proactive Digital Forensics in Organisations
10
0.98
2010
Critical Information Infrastructure Protection In The Developing World
2
0.51
2010
BioVault: biometrically based encryption
0
0.34
2009
Solving security issues using Information Security Awareness Portal
1
0.39
2009
Investigating And Comparing Multimodal Biometric Techniques
1
0.37
2007
A Control Framework for Digital Forensics
15
1.25
2006
ERPSEC - A Reference Framework to Enhance Security in ERP Systems
0
0.34
2005
A Case For Information Ownership in ERP Systems.
1
0.35
2004
From secure wired networks to secure wireless networks – what are the extra risks?
3
0.47
2004
Information Security: Mutual Authentication in E-Commerce
0
0.34
2001
"DNA-proofing" for Computer Systems - A New Approach to Computer Security?
0
0.34
2000
Information Security: Process Evaluation and Product Evaluation
10
0.93
2000
Information Security Management Through Measurement
0
0.34
2000
Electronic commerce with secure intelligent trade agent
13
16.50
1998
MoFAC: a model for fine-grained access control
0
0.34
1996
A taxonomy for secure object-oriented databases
27
8.05
1994
A Process Approach to Information Security Management
6
1.19
1993
A Model for Information Security Management
0
0.34
1993
A Model for Organising Information Security Documentation
0
0.34
1993
Superseding Manual Generation of Access Control Specification - From Policies to Profiles
2
6.08
1993
MAPS - Model for Automated Profile Specification
1
5.60
1992
DISCO - A Discretionary Security Model for Object-oriented Databases
2
0.96
1992
Random Context Array Grammmars
0
0.34
1980
Priorities on context conditions in rewriting systems
4
0.54
1978
Rewriting systems with a clocking mechanism
0
0.34
1978
Some Aspects of Random Context Grammars
0
0.34
1976
The Characterization by Automata of Certain Classes of Languages in the Context Sensititve Area
7
1.70
1975
On TOL languages over terminals
2
0.43
1975
The characterization of certain classes of languages in the context sensitive area by automata
0
0.34
1973
1