Basie Von Solms

Professor

Official Website

PhD Students
Basie von Solms

PhD Students



  1. F Blauw (2020) : Maxima: A Model for Constructing an Online Identity Model of a User Using Identity Fragments.

  2. T van der Walt (2019) : A Model for Political Corporate Governance of ICT in South Africa’.

  3. CP Duvenage (2019) : A Conceptual Framework for Cyber Counterintelligence’.

  4. P Jacobs (2019) : A National Cybersecurity Management Framework for Developing Countries.

  5. VJ Jaquire (2018) : A Framework for a Cyber Counterintelligence Maturity Model.

  6. R de Bruin (2018) : A Maturity Framework for Cyber Security Governance.

  7. C Louw (2017) : Towards a Smartphone Application User Security Competency Evolution Model.

  8. MR Corregedor (2017) : An Architecture for Anti-malware Protection based on Collaboration.

  9. N Veerasamy (2014) : CLC- Cyberterrorism Life Cycle Model.

  10. DT van der Haar (2014) : Collective Human Biological Signal-based Identification and Authentication in Access Control Environments.

  11. D Ellefsen (2012) : Critical Information Infrastructure Protection for Developing Countries.

  12. T Grobler (2012) : DFMF – A High-level Integrated Digital Forensics Framework.

  13. A Tolnai (2012) : A Security Model for a Virtualized Information Environment.

  14. MM Grobler (2010) : Liforac: A Model for Live Forensic Acquisition.

  15. BL Tait (2009) : Biovault: A protocol to prevent replay in biometric systems.

  16. MP Hertenberger (2005) : A Reference framework for security in enterprise resource planning systems.

  17. MM Eloff (2000) : A Multi-dimensional model for information security management.

  18. CP Louwrens (2000) : A Model for computer security based on a biological immune system.

  19. J van der Merwe (1999) : Information Security using Intelligent Software Agents.

  20. JHS Geldenhuys (1999) : MOSAIC Model for secure anonymous Internet Communication.

  21. PWJ van Zyl (1998) : MOSS: A Model for open system security.

  22. D Pottas (1996) : The automatic generation of information security profiles.

  23. DNJ Mostert (1995) : Integrating computer security, safety and resilience into user requirements.

  24. R von Solms (1993) : Information Security Management: Processes and Metrics.

  25. MS Olivier (1992) : Secure object-oriented databases.

  26. WH Boshoff (1990) : A Path context model for computer security phenomena in potentially non-secure environment.

  27. EC Anderssen (1989) : ‘n Rekenaargebasseerde model vir die voorstelling van tyd-ruimtelike aspekte met verwysing na historiese veldslae.

  28. E Mulder (1989) : Formalising the object-oriented paradigm using automata theory.

  29. PG Mulder (1989) : Using Formal language in data communications protocols.

  30. EM Ehlers (1987) : A Hierarchy of Random Context Grammars and Automata.

  31. JHP Eloff (1985) : Die ontwikkeling van 'n spesifikasietaal vir 'n rekenaarsekuriteitstelsel.




© University of Johannesburg | 2022
Last updated | 09 November 2022