Thomas Heyman

413 total citations
23 papers, 243 citations indexed

About

Thomas Heyman is a scholar working on Information Systems, Computer Networks and Communications and Artificial Intelligence. According to data from OpenAlex, Thomas Heyman has authored 23 papers receiving a total of 243 indexed citations (citations by other indexed papers that have themselves been cited), including 16 papers in Information Systems, 11 papers in Computer Networks and Communications and 11 papers in Artificial Intelligence. Recurrent topics in Thomas Heyman's work include Information and Cyber Security (7 papers), Advanced Software Engineering Methodologies (6 papers) and Software Engineering Research (5 papers). Thomas Heyman is often cited by papers focused on Information and Cyber Security (7 papers), Advanced Software Engineering Methodologies (6 papers) and Software Engineering Research (5 papers). Thomas Heyman collaborates with scholars based in Belgium, United Kingdom and Russia. Thomas Heyman's co-authors include Wouter Joosen, Riccardo Scandariato, Koen Yskout, Christophe Huygens, Davy Preuveneers, Wim Maes, Lieven Desmet, Yolande Berbers, Artsiom Yautsiukhin and Jacques Klein and has published in prestigious journals such as Biomaterials, Molecules and Journal of Vision.

In The Last Decade

Thomas Heyman

22 papers receiving 215 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Thomas Heyman Belgium 10 190 97 86 70 45 23 243
Neetu Sardana India 10 168 0.9× 92 0.9× 70 0.8× 41 0.6× 58 1.3× 49 245
Yiannis Kanellopoulos Greece 9 143 0.8× 81 0.8× 52 0.6× 19 0.3× 88 2.0× 12 224
Bill Tsoumas Greece 4 111 0.6× 40 0.4× 52 0.6× 51 0.7× 8 0.2× 4 155
Golnaz Elahi Canada 7 154 0.8× 71 0.7× 34 0.4× 47 0.7× 28 0.6× 14 182
Jiamou Sun Australia 8 196 1.0× 90 0.9× 61 0.7× 65 0.9× 46 1.0× 18 242
John Businge Netherlands 9 201 1.1× 71 0.7× 82 1.0× 48 0.7× 70 1.6× 18 233
John Slankas United States 9 226 1.2× 98 1.0× 47 0.5× 33 0.5× 81 1.8× 15 294
Ruian Duan United States 9 171 0.9× 71 0.7× 109 1.3× 176 2.5× 76 1.7× 10 269
Daoyuan Wu Hong Kong 9 94 0.5× 58 0.6× 72 0.8× 73 1.0× 30 0.7× 24 185
Allen D. Householder United States 6 114 0.6× 43 0.4× 100 1.2× 65 0.9× 23 0.5× 9 183

Countries citing papers authored by Thomas Heyman

Since Specialization
Citations

This map shows the geographic impact of Thomas Heyman's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Thomas Heyman with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Thomas Heyman more than expected).

Fields of papers citing papers by Thomas Heyman

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Thomas Heyman. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Thomas Heyman. The network helps show where Thomas Heyman may publish in the future.

Co-authorship network of co-authors of Thomas Heyman

This figure shows the co-authorship network connecting the top 25 collaborators of Thomas Heyman. A scholar is included among the top collaborators of Thomas Heyman based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Thomas Heyman. Thomas Heyman is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Clarke, David, Aleksandra V. Sen’kova, Thomas Heyman, et al.. (2024). Engineering supramolecular dynamics of self-assembly and turnover of oncogenic microRNAs to drive their synergistic destruction in tumor models. Biomaterials. 309. 122604–122604. 1 indexed citations
2.
Мирошниченко, С. К., et al.. (2021). Site-Selective Artificial Ribonucleases: Renaissance of Oligonucleotide Conjugates for Irreversible Cleavage of RNA Sequences. Molecules. 26(6). 1732–1732. 11 indexed citations
3.
Yskout, Koen, Thomas Heyman, Dimitri Van Landuyt, et al.. (2020). Threat modeling. Lirias (KU Leuven). 9–12. 6 indexed citations
4.
Heyman, Thomas, et al.. (2018). K8-Scalar: a workbench to compare autoscalers for container-orchestrated services (Artifact). DROPS (Schloss Dagstuhl – Leibniz Center for Informatics). 1 indexed citations
5.
Preuveneers, Davy, Thomas Heyman, Yolande Berbers, & Wouter Joosen. (2015). Systematic scalability assessment for feature oriented multi-tenant services. Journal of Systems and Software. 116. 162–176. 10 indexed citations
6.
Nguyen, Phu H., Koen Yskout, Thomas Heyman, et al.. (2015). SoSPa: A system of Security design Patterns for systematically engineering secure systems. Lirias (KU Leuven). 246–255. 11 indexed citations
7.
Moors, Pieter & Thomas Heyman. (2014). Unconscious semantic processing? No evidence for extracting the semantics of words during interocular suppression.. Journal of Vision. 14(10). 1247–1247. 1 indexed citations
8.
Heyman, Thomas, Davy Preuveneers, & Wouter Joosen. (2014). Scalar: Systematic Scalability Analysis with the Universal Scalability Law. Lirias (KU Leuven). 497–504. 1 indexed citations
9.
Heyman, Thomas, Davy Preuveneers, & Wouter Joosen. (2014). Scalability Analysis of the OpenAM Access Control System with the Universal Scalability Law. Lirias (KU Leuven). 43. 505–512. 4 indexed citations
10.
Heyman, Thomas. (2013). A Formal Analysis Technique for Secure Software Architectures (Een formele analysetechniek voor veilige softwarearchitecturen). 1 indexed citations
11.
Heyman, Thomas, Riccardo Scandariato, & Wouter Joosen. (2012). Reusable Formal Models for Secure Software Architectures. Lirias (KU Leuven). 41–50. 17 indexed citations
12.
Wuyts, Kim, Thomas Heyman, Riccardo Scandariato, Christophe Huygens, & Wouter Joosen. (2010). Towards a reference framework for legal compliance: a detailed overview. Lirias (KU Leuven).
13.
Heyman, Thomas, Riccardo Scandariato, & Wouter Joosen. (2010). Security in Context: Analysis and Refinement of Software Architectures. Lirias (KU Leuven). 161–170. 6 indexed citations
14.
Maes, Wim, Thomas Heyman, Lieven Desmet, & Wouter Joosen. (2009). Browser protection against cross-site request forgery. Lirias (KU Leuven). 3–10. 11 indexed citations
15.
Yskout, Koen, Thomas Heyman, Riccardo Scandariato, & Wouter Joosen. (2008). Security patterns: 10 years later. Lirias (KU Leuven). 5 indexed citations
16.
Heyman, Thomas, Riccardo Scandariato, Christophe Huygens, & Wouter Joosen. (2008). Using Security Patterns to Combine Security Metrics. Lirias (KU Leuven). 1156–1163. 46 indexed citations
17.
Scandariato, Riccardo, Koen Yskout, Thomas Heyman, & Wouter Joosen. (2008). Architecting software with security patterns. Lirias (KU Leuven). 12 indexed citations
18.
Heyman, Thomas, Bart De Win, Christophe Huygens, & Wouter Joosen. (2006). Improving Intrusion Detection through Alert Verification. 207–216. 3 indexed citations
19.
Heyman, Thomas & Christophe Huygens. (2006). Software security patterns and risk. 1 indexed citations
20.
Yskout, Koen, Thomas Heyman, Riccardo Scandariato, & Wouter Joosen. (2006). A system of security patterns. 30 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026