Basie Von Solms

Professor

Official Website

PhD Students
Basie von Solms

PhD Students



  1. VJ Jaquire (2018) : A Framework for a Cyber Counterintelligence Maturity Model.

  2. R de Bruin (2018) : A Maturity Framework for Cyber Security Governance.

  3. C Louw (2017) : Towards a Smartphone Application User Security Competency Evolution Model.

  4. MR Corregedor (2017) : An Architecture for Anti-malware Protection based on Collaboration.

  5. N Veerasamy (2014) : CLC- Cyberterrorism Life Cycle Model.

  6. DT van der Haar (2014) : Collective Human Biological Signal-based Identification and Authentication in Access Control Environments.

  7. D Ellefsen (2012) : Critical Information Infrastructure Protection for Developing Countries.

  8. T Grobler (2012) : DFMF – A High-level Integrated Digital Forensics Framework.

  9. A Tolnai (2012) : A Security Model for a Virtualized Information Environment.

  10. MM Grobler (2010) : Liforac: A Model for Live Forensic Acquisition.

  11. BL Tait (2009) : Biovault: A protocol to prevent replay in biometric systems.

  12. MP Hertenberger (2005) : A Reference framework for security in enterprise resource planning systems.

  13. MM Eloff (2000) : A Multi-dimensional model for information security management.

  14. CP Louwrens (2000) : A Model for computer security based on a biological immune system.

  15. JHS Geldenhuys (1999) : MOSAIC Model for secure anonymous Internet Communication.

  16. PWJ van Zyl (1998) : MOSS: A Model for open system security.

  17. D Pottas (1996) : The automatic generation of information security profiles.

  18. DNJ Mostert (1995) : Integrating computer security, safety and resilience into user requirements.

  19. R von Solms (1993) : Information Security Management: Processes and Metrics.

  20. MS Olivier (1992) : Secure object-oriented databases.

  21. WH Boshoff (1990) : A Path context model for computer security phenomena in potentially non-secure environment.

  22. EC Anderssen (1989) : ‘n Rekenaargebasseerde model vir die voorstelling van tyd-ruimtelike aspekte met verwysing na historiese veldslae.

  23. E Mulder (1989) : Formalising the object-oriented paradigm using automata theory.

  24. PG Mulder (1989) : Using Formal language in data communications protocols.

  25. EM Ehlers (1987) : A Hierarchy of Random Context Grammars and Automata.

  26. JHP Eloff (1985) : Die ontwikkeling van 'n spesifikasietaal vir 'n rekenaarsekuriteitstelsel.




© University of Johannesburg | 2018
Last updated | 30 July 2018