Name
Affiliation
Papers
SEBASTIAAN H. VON SOLMS
Department of Mathematics, University of Antwerp, U.I.A., Wilrijk, Belgium
36
Collaborators
Citations 
PageRank 
25
116
53.32
Referers 
Referees 
References 
213
163
97
Search Limit
100213
Title
Citations
PageRank
Year
Towards a Smartphone User Competency Evolution Model.00.342015
ATE: Anti-malware technique evaluator10.492012
Implementing Critical Information Infrastructure Protection Structures In Developing Countries00.342012
Implementing Rootkits to Address Operating System Vulnerabilities.30.582011
The Cloud's Core Virtual Infrastructure Security00.342010
A Multi-component View of Digital Forensics30.462010
A Virtualized Environment Security (VES) model for a secure virtualized environment.20.432010
A Framework to Guide the Implementation of Proactive Digital Forensics in Organisations100.982010
Critical Information Infrastructure Protection In The Developing World20.512010
BioVault: biometrically based encryption00.342009
Solving security issues using Information Security Awareness Portal10.392009
Investigating And Comparing Multimodal Biometric Techniques10.372007
A Control Framework for Digital Forensics151.252006
ERPSEC - A Reference Framework to Enhance Security in ERP Systems00.342005
A Case For Information Ownership in ERP Systems.10.352004
From secure wired networks to secure wireless networks – what are the extra risks?30.472004
Information Security: Mutual Authentication in E-Commerce00.342001
"DNA-proofing" for Computer Systems - A New Approach to Computer Security?00.342000
Information Security: Process Evaluation and Product Evaluation100.932000
Information Security Management Through Measurement00.342000
Electronic commerce with secure intelligent trade agent1316.501998
MoFAC: a model for fine-grained access control00.341996
A taxonomy for secure object-oriented databases278.051994
A Process Approach to Information Security Management61.191993
A Model for Information Security Management00.341993
A Model for Organising Information Security Documentation00.341993
Superseding Manual Generation of Access Control Specification - From Policies to Profiles26.081993
MAPS - Model for Automated Profile Specification15.601992
DISCO - A Discretionary Security Model for Object-oriented Databases20.961992
Random Context Array Grammmars00.341980
Priorities on context conditions in rewriting systems40.541978
Rewriting systems with a clocking mechanism00.341978
Some Aspects of Random Context Grammars00.341976
The Characterization by Automata of Certain Classes of Languages in the Context Sensititve Area71.701975
On TOL languages over terminals20.431975
The characterization of certain classes of languages in the context sensitive area by automata00.341973