BibTeX records: Haralambos Mouratidis

download as .bib file

@article{DBLP:journals/fcsc/ParraSRSBMF24,
  author       = {Antonio Santos{-}Olmo Parra and
                  Luis Enrique S{\'{a}}nchez and
                  David Garcia Rosado and
                  Manuel A. Serrano and
                  Carlos Blanco and
                  Haralambos Mouratidis and
                  Eduardo Fern{\'{a}}ndez{-}Medina},
  title        = {Towards an integrated risk analysis security framework according to
                  a systematic analysis of existing proposals},
  journal      = {Frontiers Comput. Sci.},
  volume       = {18},
  number       = {3},
  pages        = {183808},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11704-023-1582-6},
  doi          = {10.1007/S11704-023-1582-6},
  timestamp    = {Mon, 08 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fcsc/ParraSRSBMF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MouratidisIPSI23,
  author       = {Haralambos Mouratidis and
                  Shareeful Islam and
                  Antonio Santos{-}Olmo Parra and
                  Luis Enrique S{\'{a}}nchez and
                  Umar Mukhtar Ismail},
  title        = {Modelling language for cyber security incident handling for critical
                  infrastructures},
  journal      = {Comput. Secur.},
  volume       = {128},
  pages        = {103139},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103139},
  doi          = {10.1016/J.COSE.2023.103139},
  timestamp    = {Mon, 08 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MouratidisIPSI23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/SanchezPMF23,
  author       = {Luis Enrique S{\'{a}}nchez and
                  Antonio Santos{-}Olmo Parra and
                  Haralambos Mouratidis and
                  Eduardo Fern{\'{a}}ndez{-}Medina},
  title        = {New Frontiers in Security Risk Management},
  journal      = {{IT} Prof.},
  volume       = {25},
  number       = {3},
  pages        = {61--67},
  year         = {2023},
  url          = {https://doi.org/10.1109/MITP.2023.3251720},
  doi          = {10.1109/MITP.2023.3251720},
  timestamp    = {Fri, 23 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itpro/SanchezPMF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsoft/Al-ObeidallahPI23,
  author       = {Mohammed Ghazi Al{-}Obeidallah and
                  Luca Piras and
                  Onyinye Iloanugo and
                  Haralambos Mouratidis and
                  Duaa Alkubaisy and
                  Daniele Dellagiacoma},
  editor       = {Hans{-}Georg Fill and
                  Francisco Jos{\'{e}} Dom{\'{\i}}nguez Mayo and
                  Marten van Sinderen and
                  Leszek A. Maciaszek},
  title        = {Goal-Modeling Privacy-by-Design Patterns for Supporting {GDPR} Compliance},
  booktitle    = {Proceedings of the 18th International Conference on Software Technologies,
                  {ICSOFT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {361--368},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012080700003538},
  doi          = {10.5220/0012080700003538},
  timestamp    = {Mon, 04 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icsoft/Al-ObeidallahPI23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/rcis/2023,
  editor       = {Selmin Nurcan and
                  Andreas L. Opdahl and
                  Haralambos Mouratidis and
                  Aggeliki Tsohou},
  title        = {Research Challenges in Information Science: Information Science and
                  the Connected World - 17th International Conference, {RCIS} 2023,
                  Corfu, Greece, May 23-26, 2023, Proceedings},
  series       = {Lecture Notes in Business Information Processing},
  volume       = {476},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-33080-3},
  doi          = {10.1007/978-3-031-33080-3},
  isbn         = {978-3-031-33079-7},
  timestamp    = {Thu, 25 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/rcis/2023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/AlamZNAM22,
  author       = {Sana Alam and
                  Shehnila Zardari and
                  Shaheena Noor and
                  Shakil Ahmed and
                  Haralambos Mouratidis},
  title        = {Trust Management in Social Internet of Things (SIoT): {A} Survey},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {108924--108954},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3213699},
  doi          = {10.1109/ACCESS.2022.3213699},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/AlamZNAM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cii/RosadoPSSBMF22,
  author       = {David Garcia Rosado and
                  Antonio Santos{-}Olmo Parra and
                  Luis Enrique S{\'{a}}nchez and
                  Manuel A. Serrano and
                  Carlos Blanco and
                  Haralambos Mouratidis and
                  Eduardo Fern{\'{a}}ndez{-}Medina},
  title        = {Managing cybersecurity risks of cyber-physical systems: The {MARISMA-CPS}
                  pattern},
  journal      = {Comput. Ind.},
  volume       = {142},
  pages        = {103715},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.compind.2022.103715},
  doi          = {10.1016/J.COMPIND.2022.103715},
  timestamp    = {Mon, 08 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cii/RosadoPSSBMF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/icae/IslamAIMP22,
  author       = {Shareeful Islam and
                  Abdulrazaq Abba and
                  Umar Mukhtar Ismail and
                  Haralambos Mouratidis and
                  Spyridon Papastergiou},
  title        = {Vulnerability prediction for secure healthcare supply chain service
                  delivery},
  journal      = {Integr. Comput. Aided Eng.},
  volume       = {29},
  number       = {4},
  pages        = {389--409},
  year         = {2022},
  url          = {https://doi.org/10.3233/ICA-220689},
  doi          = {10.3233/ICA-220689},
  timestamp    = {Wed, 05 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/icae/IslamAIMP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/KioskliDFM22,
  author       = {Kitty Kioskli and
                  Daniele Dellagiacoma and
                  Theofanis Fotis and
                  Haralambos Mouratidis},
  title        = {The supply chain of a Living Lab: Modelling security, privacy, and
                  vulnerability issues alongside with their impact and potential mitigation
                  strategies},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {13},
  number       = {2},
  pages        = {147--182},
  year         = {2022},
  url          = {https://doi.org/10.22667/JOWUA.2022.06.30.147},
  doi          = {10.22667/JOWUA.2022.06.30.147},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/KioskliDFM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nca/KureIM22,
  author       = {Halima Ibrahim Kure and
                  Shareeful Islam and
                  Haralambos Mouratidis},
  title        = {An integrated cyber security risk management framework and risk predication
                  for the critical infrastructure protection},
  journal      = {Neural Comput. Appl.},
  volume       = {34},
  number       = {18},
  pages        = {15241--15271},
  year         = {2022},
  url          = {https://doi.org/10.1007/s00521-022-06959-2},
  doi          = {10.1007/S00521-022-06959-2},
  timestamp    = {Tue, 06 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/nca/KureIM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/AdeeM22,
  author       = {Rose Adee and
                  Haralambos Mouratidis},
  title        = {A Dynamic Four-Step Data Security Model for Data in Cloud Computing
                  Based on Cryptography and Steganography},
  journal      = {Sensors},
  volume       = {22},
  number       = {3},
  pages        = {1109},
  year         = {2022},
  url          = {https://doi.org/10.3390/s22031109},
  doi          = {10.3390/S22031109},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/AdeeM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/HeydariMT22,
  author       = {Mohammad Heydari and
                  Haralambos Mouratidis and
                  Vahid Heydari Fami Tafreshi},
  editor       = {Sokratis K. Katsikas and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Christos Kalloniatis and
                  John Mylopoulos and
                  Frank Pallas and
                  J{\"{o}}rg Pohle and
                  M. Angela Sasse and
                  Habtamu Abie and
                  Silvio Ranise and
                  Luca Verderame and
                  Enrico Cambiaso and
                  Jorge Maestre Vidal and
                  Marco Antonio Sotelo Monge and
                  Massimiliano Albanese and
                  Basel Katt and
                  Sandeep Pirbhulal and
                  Ankur Shukla},
  title        = {OntoCyrene: Towards Ontology-Enhanced Asset Modelling for Supply Chains
                  in the Context of Cyber Security},
  booktitle    = {Computer Security. {ESORICS} 2022 International Workshops - CyberICPS
                  2022, {SECPRE} 2022, {SPOSE} 2022, {CPS4CIP} 2022, CDT{\&}SECOMANE
                  2022, {EIS} 2022, and SecAssure 2022, Copenhagen, Denmark, September
                  26-30, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13785},
  pages        = {157--176},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-25460-4\_9},
  doi          = {10.1007/978-3-031-25460-4\_9},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/HeydariMT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/evs/PapastergiouMK21,
  author       = {Spyridon Papastergiou and
                  Haralambos Mouratidis and
                  Eleni{-}Maria Kalogeraki},
  title        = {Handling of advanced persistent threats and complex incidents in healthcare,
                  transportation and energy {ICT} infrastructures},
  journal      = {Evol. Syst.},
  volume       = {12},
  number       = {1},
  pages        = {91--108},
  year         = {2021},
  url          = {https://doi.org/10.1007/s12530-020-09335-4},
  doi          = {10.1007/S12530-020-09335-4},
  timestamp    = {Fri, 14 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/evs/PapastergiouMK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rpjdi/PirasAPMTMP21,
  author       = {Luca Piras and
                  Mohammed Ghazi Al{-}Obeidallah and
                  Michalis Pavlidis and
                  Haralambos Mouratidis and
                  Aggeliki Tsohou and
                  Emmanouil Magkos and
                  Andrea Praitano},
  title        = {A Data Scope Management Service to Support Privacy by Design and {GDPR}
                  Compliance},
  journal      = {J. Data Intell.},
  volume       = {2},
  number       = {2},
  pages        = {136--165},
  year         = {2021},
  url          = {https://doi.org/10.26421/JDI2.2-3},
  doi          = {10.26421/JDI2.2-3},
  timestamp    = {Wed, 06 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rpjdi/PirasAPMTMP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/KioskliFM21,
  author       = {Kitty Kioskli and
                  Theo Fotis and
                  Haralambos Mouratidis},
  editor       = {Delphine Reinhardt and
                  Tilo M{\"{u}}ller},
  title        = {The landscape of cybersecurity vulnerabilities and challenges in healthcare:
                  Security standards and paradigm shift recommendations},
  booktitle    = {{ARES} 2021: The 16th International Conference on Availability, Reliability
                  and Security, Vienna, Austria, August 17-20, 2021},
  pages        = {136:1--136:9},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3465481.3470033},
  doi          = {10.1145/3465481.3470033},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/KioskliFM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/enase/AlkubaisyPACM21a,
  author       = {Duaa Alkubaisy and
                  Luca Piras and
                  Mohammed Ghazi Al{-}Obeidallah and
                  Karl Cox and
                  Haralambos Mouratidis},
  editor       = {Raian Ali and
                  Hermann Kaindl and
                  Leszek A. Maciaszek},
  title        = {A Framework for Privacy and Security Requirements Analysis and Conflict
                  Resolution for Supporting {GDPR} Compliance Through Privacy-by-Design},
  booktitle    = {Evaluation of Novel Approaches to Software Engineering - 16th International
                  Conference, {ENASE} 2021, Virtual Event, April 26-27, 2021, Revised
                  Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1556},
  pages        = {67--87},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-96648-5\_4},
  doi          = {10.1007/978-3-030-96648-5\_4},
  timestamp    = {Wed, 06 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/enase/AlkubaisyPACM21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/enase/AlkubaisyPACM21,
  author       = {Duaa Alkubaisy and
                  Luca Piras and
                  Mohammed Ghazi Al{-}Obeidallah and
                  Karl Cox and
                  Haralambos Mouratidis},
  editor       = {Raian Ali and
                  Hermann Kaindl and
                  Leszek A. Maciaszek},
  title        = {ConfIs: {A} Tool for Privacy and Security Analysis and Conflict Resolution
                  for Supporting {GDPR} Compliance through Privacy-by-Design},
  booktitle    = {Proceedings of the 16th International Conference on Evaluation of
                  Novel Approaches to Software Engineering, {ENASE} 2021, Online Streaming,
                  April 26-27, 2021},
  pages        = {80--91},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010406100800091},
  doi          = {10.5220/0010406100800091},
  timestamp    = {Wed, 06 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/enase/AlkubaisyPACM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip12/IslamMM21,
  author       = {Shareeful Islam and
                  Haralambos Mouratidis and
                  Hasan Mahmud},
  editor       = {Ilias Maglogiannis and
                  John MacIntyre and
                  Lazaros Iliadis},
  title        = {An Automated Tool to Support an Intelligence Learner Management System
                  Using Learning Analytics and Machine Learning},
  booktitle    = {Artificial Intelligence Applications and Innovations - 17th {IFIP}
                  {WG} 12.5 International Conference, {AIAI} 2021, Hersonissos, Crete,
                  Greece, June 25-27, 2021, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {627},
  pages        = {494--504},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-79150-6\_39},
  doi          = {10.1007/978-3-030-79150-6\_39},
  timestamp    = {Wed, 05 Oct 2022 21:11:03 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip12/IslamMM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip12/Yeboah-OforiMII21,
  author       = {Abel Yeboah{-}Ofori and
                  Haralambos Mouratidis and
                  Umar Mukhtar Ismail and
                  Shareeful Islam and
                  Spyridon Papastergiou},
  editor       = {Ilias Maglogiannis and
                  John MacIntyre and
                  Lazaros Iliadis},
  title        = {Cyber Supply Chain Threat Analysis and Prediction Using Machine Learning
                  and Ontology},
  booktitle    = {Artificial Intelligence Applications and Innovations - 17th {IFIP}
                  {WG} 12.5 International Conference, {AIAI} 2021, Hersonissos, Crete,
                  Greece, June 25-27, 2021, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {627},
  pages        = {518--530},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-79150-6\_41},
  doi          = {10.1007/978-3-030-79150-6\_41},
  timestamp    = {Wed, 05 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip12/Yeboah-OforiMII21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pci/IslamPM21,
  author       = {Shareeful Islam and
                  Spyridon Papastergiou and
                  Haralambos Mouratidis},
  editor       = {Michael Vassilakopoulos and
                  Nikitas N. Karanikolas and
                  George Stamoulis and
                  Vassilios S. Verykios and
                  Cleo Sgouropoulou},
  title        = {A Dynamic Cyber Security Situational Awareness Framework for Healthcare
                  {ICT} Infrastructures},
  booktitle    = {{PCI} 2021: 25th Pan-Hellenic Conference on Informatics, Volos, Greece,
                  November 26 - 28, 2021},
  pages        = {334--339},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3503823.3503885},
  doi          = {10.1145/3503823.3503885},
  timestamp    = {Thu, 03 Mar 2022 15:02:32 +0100},
  biburl       = {https://dblp.org/rec/conf/pci/IslamPM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/evs/PolatidisPPPM20,
  author       = {Nikolaos Polatidis and
                  Elias Pimenidis and
                  Michalis Pavlidis and
                  Spyridon Papastergiou and
                  Haralambos Mouratidis},
  title        = {From product recommendation to cyber-attack prediction: generating
                  attack graphs and predicting future attacks},
  journal      = {Evol. Syst.},
  volume       = {11},
  number       = {3},
  pages        = {479--490},
  year         = {2020},
  url          = {https://doi.org/10.1007/s12530-018-9234-z},
  doi          = {10.1007/S12530-018-9234-Z},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/evs/PolatidisPPPM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/TsohouMMCPPDRC20,
  author       = {Aggeliki Tsohou and
                  Emmanouil Magkos and
                  Haralambos Mouratidis and
                  George Chrysoloras and
                  Luca Piras and
                  Michalis Pavlidis and
                  Julien Debussche and
                  Marco Rotoloni and
                  Beatriz Gallego{-}Nicasio Crespo},
  title        = {Privacy, security, legal and technology acceptance elicited and consolidated
                  requirements for a {GDPR} compliance platform},
  journal      = {Inf. Comput. Secur.},
  volume       = {28},
  number       = {4},
  pages        = {531--553},
  year         = {2020},
  url          = {https://doi.org/10.1108/ICS-01-2020-0002},
  doi          = {10.1108/ICS-01-2020-0002},
  timestamp    = {Wed, 06 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/TsohouMMCPPDRC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sncs/CarvalhoPMROSRM20,
  author       = {Renata Medeiros de Carvalho and
                  Camillo Del Prete and
                  Yod Samuel Mart{\'{\i}}n and
                  Rosa M. Araujo Rivero and
                  Melek {\"{O}}nen and
                  Francesco Paolo Schiavo and
                  {\'{A}}ngel Cuevas Rum{\'{\i}}n and
                  Haralambos Mouratidis and
                  Juan C. Yelmo and
                  Maria N. Koukovini},
  title        = {Protecting Citizens' Personal Data and Privacy: Joint Effort from
                  {GDPR} {EU} Cluster Research Projects},
  journal      = {{SN} Comput. Sci.},
  volume       = {1},
  number       = {4},
  pages        = {217},
  year         = {2020},
  url          = {https://doi.org/10.1007/s42979-020-00218-8},
  doi          = {10.1007/S42979-020-00218-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sncs/CarvalhoPMROSRM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sosym/MouratidisSD20,
  author       = {Haralambos Mouratidis and
                  Shaun Shei and
                  Aidan J. Delaney},
  title        = {A security requirements modelling language for cloud computing environments},
  journal      = {Softw. Syst. Model.},
  volume       = {19},
  number       = {2},
  pages        = {271--295},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10270-019-00747-8},
  doi          = {10.1007/S10270-019-00747-8},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sosym/MouratidisSD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sosym/SalnitriAPDMG20,
  author       = {Mattia Salnitri and
                  Konstantinos Angelopoulos and
                  Michalis Pavlidis and
                  Vasiliki Diamantopoulou and
                  Haralambos Mouratidis and
                  Paolo Giorgini},
  title        = {Modelling the interplay of security, privacy and trust in sociotechnical
                  systems: a computer-aided design approach},
  journal      = {Softw. Syst. Model.},
  volume       = {19},
  number       = {2},
  pages        = {467--491},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10270-019-00744-x},
  doi          = {10.1007/S10270-019-00744-X},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sosym/SalnitriAPDMG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sosym/ArgyropoulosMF20,
  author       = {Nikolaos Argyropoulos and
                  Haralambos Mouratidis and
                  Andrew Fish},
  title        = {Enhancing secure business process design with security process patterns},
  journal      = {Softw. Syst. Model.},
  volume       = {19},
  number       = {3},
  pages        = {555--577},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10270-019-00743-y},
  doi          = {10.1007/S10270-019-00743-Y},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sosym/ArgyropoulosMF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bir/MouratidisZS20,
  author       = {Haralambos Mouratidis and
                  Jelena Zdravkovic and
                  Janis Stirna},
  editor       = {Robert Andrei Buchmann and
                  Andrea Polini and
                  Bj{\"{o}}rn Johansson and
                  Dimitris Karagiannis},
  title        = {Cyber Security Resilience in Business Informatics: An Exploratory
                  Paper},
  booktitle    = {Perspectives in Business Informatics Research - 19th International
                  Conference on Business Informatics Research, {BIR} 2020, Vienna, Austria,
                  September 21-23, 2020, Proceedings},
  series       = {Lecture Notes in Business Information Processing},
  volume       = {398},
  pages        = {53--66},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61140-8\_4},
  doi          = {10.1007/978-3-030-61140-8\_4},
  timestamp    = {Thu, 19 Nov 2020 15:37:08 +0100},
  biburl       = {https://dblp.org/rec/conf/bir/MouratidisZS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/PirasAPMTMPIC20,
  author       = {Luca Piras and
                  Mohammed Ghazi Al{-}Obeidallah and
                  Michalis Pavlidis and
                  Haralambos Mouratidis and
                  Aggeliki Tsohou and
                  Emmanouil Magkos and
                  Andrea Praitano and
                  Annarita Iodice and
                  Beatriz Gallego{-}Nicasio Crespo},
  editor       = {Stefanos Gritzalis and
                  Edgar R. Weippl and
                  Gabriele Kotsis and
                  A Min Tjoa and
                  Ismail Khalil},
  title        = {DEFeND {DSM:} {A} Data Scope Management Service for Model-Based Privacy
                  by Design {GDPR} Compliance},
  booktitle    = {Trust, Privacy and Security in Digital Business - 17th International
                  Conference, TrustBus 2020, Bratislava, Slovakia, September 14-17,
                  2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12395},
  pages        = {186--201},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-58986-8\_13},
  doi          = {10.1007/978-3-030-58986-8\_13},
  timestamp    = {Wed, 06 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustbus/PirasAPMTMPIC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/GharibGSPMPR20,
  author       = {Mohamad Gharib and
                  Paolo Giorgini and
                  Mattia Salnitri and
                  Elda Paja and
                  Haralambos Mouratidis and
                  Michalis Pavlidis and
                  Jos{\'{e}} Fran. Ruiz},
  editor       = {Mattia Salnitri and
                  Jan J{\"{u}}rjens and
                  Haralambos Mouratidis and
                  Loredana Mancini and
                  Paolo Giorgini},
  title        = {A Holistic Approach for Privacy Requirements Analysis: An Industrial
                  Case Study},
  booktitle    = {Visual Privacy Management - Design and Applications of a Privacy-Enabling
                  Platform},
  series       = {Lecture Notes in Computer Science},
  volume       = {12030},
  pages        = {22--53},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-59944-7\_2},
  doi          = {10.1007/978-3-030-59944-7\_2},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lncs/GharibGSPMPR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/AhmadianPJSGMR20,
  author       = {Amir Shayan Ahmadian and
                  Sven Peldszus and
                  Jan J{\"{u}}rjens and
                  Mattia Salnitri and
                  Paolo Giorgini and
                  Haralambos Mouratidis and
                  Jos{\'{e}} Fran. Ruiz},
  editor       = {Mattia Salnitri and
                  Jan J{\"{u}}rjens and
                  Haralambos Mouratidis and
                  Loredana Mancini and
                  Paolo Giorgini},
  title        = {The Architecture of VisiOn Privacy Platform},
  booktitle    = {Visual Privacy Management - Design and Applications of a Privacy-Enabling
                  Platform},
  series       = {Lecture Notes in Computer Science},
  volume       = {12030},
  pages        = {54--76},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-59944-7\_3},
  doi          = {10.1007/978-3-030-59944-7\_3},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lncs/AhmadianPJSGMR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/PeldszusASJPM20,
  author       = {Sven Peldszus and
                  Amir Shayan Ahmadian and
                  Mattia Salnitri and
                  Jan J{\"{u}}rjens and
                  Michalis Pavlidis and
                  Haralambos Mouratidis},
  editor       = {Mattia Salnitri and
                  Jan J{\"{u}}rjens and
                  Haralambos Mouratidis and
                  Loredana Mancini and
                  Paolo Giorgini},
  title        = {Visual Privacy Management},
  booktitle    = {Visual Privacy Management - Design and Applications of a Privacy-Enabling
                  Platform},
  series       = {Lecture Notes in Computer Science},
  volume       = {12030},
  pages        = {77--108},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-59944-7\_4},
  doi          = {10.1007/978-3-030-59944-7\_4},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lncs/PeldszusASJPM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/lncs/12030,
  editor       = {Mattia Salnitri and
                  Jan J{\"{u}}rjens and
                  Haralambos Mouratidis and
                  Loredana Mancini and
                  Paolo Giorgini},
  title        = {Visual Privacy Management - Design and Applications of a Privacy-Enabling
                  Platform},
  series       = {Lecture Notes in Computer Science},
  volume       = {12030},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-59944-7},
  doi          = {10.1007/978-3-030-59944-7},
  isbn         = {978-3-030-59943-0},
  timestamp    = {Mon, 25 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/lncs/12030.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2003-05720,
  author       = {Spyridon Papastergiou and
                  Haralambos Mouratidis and
                  Eleni{-}Maria Kalogeraki},
  title        = {Cyber Security Incident Handling, Warning and Response System for
                  the European Critical Information Infrastructures (CyberSANE)},
  journal      = {CoRR},
  volume       = {abs/2003.05720},
  year         = {2020},
  url          = {https://arxiv.org/abs/2003.05720},
  eprinttype    = {arXiv},
  eprint       = {2003.05720},
  timestamp    = {Tue, 17 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2003-05720.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/MavropoulosMFP19,
  author       = {Orestis Mavropoulos and
                  Haralambos Mouratidis and
                  Andrew Fish and
                  Emmanouil Panaousis},
  title        = {Apparatus: {A} framework for security analysis in internet of things
                  systems},
  journal      = {Ad Hoc Networks},
  volume       = {92},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.adhoc.2018.08.013},
  doi          = {10.1016/J.ADHOC.2018.08.013},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/MavropoulosMFP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/DiamantopoulouM19,
  author       = {Vasiliki Diamantopoulou and
                  Haralambos Mouratidis},
  title        = {Practical evaluation of a reference architecture for the management
                  of privacy level agreements},
  journal      = {Inf. Comput. Secur.},
  volume       = {27},
  number       = {5},
  year         = {2019},
  url          = {https://doi.org/10.1108/ICS-04-2019-0052},
  doi          = {10.1108/ICS-04-2019-0052},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/DiamantopoulouM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jis/PimenidisPM19,
  author       = {Elias Pimenidis and
                  Nikolaos Polatidis and
                  Haralambos Mouratidis},
  title        = {Mobile recommender systems: Identifying the major concepts},
  journal      = {J. Inf. Sci.},
  volume       = {45},
  number       = {3},
  year         = {2019},
  url          = {https://doi.org/10.1177/0165551518792213},
  doi          = {10.1177/0165551518792213},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jis/PimenidisPM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eann/PapastergiouMK19,
  author       = {Spyridon Papastergiou and
                  Haralambos Mouratidis and
                  Eleni{-}Maria Kalogeraki},
  editor       = {John MacIntyre and
                  Lazaros S. Iliadis and
                  Ilias Maglogiannis and
                  Chrisina Jayne},
  title        = {Cyber Security Incident Handling, Warning and Response System for
                  the European Critical Information Infrastructures (CyberSANE)},
  booktitle    = {Engineering Applications of Neural Networks - 20th International Conference,
                  {EANN} 2019, Hersonissos, Crete, Greece, May 24-26, 2019, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1000},
  pages        = {476--487},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-20257-6\_41},
  doi          = {10.1007/978-3-030-20257-6\_41},
  timestamp    = {Sun, 02 Jun 2019 21:12:35 +0200},
  biburl       = {https://dblp.org/rec/conf/eann/PapastergiouMK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/AthinaiouMFP19,
  author       = {Myrsini Athinaiou and
                  Haralambos Mouratidis and
                  Theo Fotis and
                  Michalis Pavlidis},
  editor       = {Sokratis K. Katsikas and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens and
                  Costas Lambrinoudakis and
                  Christos Kalloniatis and
                  John Mylopoulos and
                  Annie I. Ant{\'{o}}n and
                  Stefanos Gritzalis and
                  Frank Pallas and
                  J{\"{o}}rg Pohle and
                  M. Angela Sasse and
                  Weizhi Meng and
                  Steven Furnell and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {A Conceptual Redesign of a Modelling Language for Cyber Resiliency
                  of Healthcare Systems},
  booktitle    = {Computer Security - {ESORICS} 2019 International Workshops, CyberICPS,
                  SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26-27,
                  2019 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11980},
  pages        = {140--158},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-42048-2\_10},
  doi          = {10.1007/978-3-030-42048-2\_10},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/AthinaiouMFP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/TsohouMMCPPDRC19,
  author       = {Aggeliki Tsohou and
                  Manos Magkos and
                  Haralambos Mouratidis and
                  George Chrysoloras and
                  Luca Piras and
                  Michalis Pavlidis and
                  Julien Debussche and
                  Marco Rotoloni and
                  Beatriz Gallego{-}Nicasio Crespo},
  editor       = {Sokratis K. Katsikas and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens and
                  Costas Lambrinoudakis and
                  Christos Kalloniatis and
                  John Mylopoulos and
                  Annie I. Ant{\'{o}}n and
                  Stefanos Gritzalis and
                  Frank Pallas and
                  J{\"{o}}rg Pohle and
                  M. Angela Sasse and
                  Weizhi Meng and
                  Steven Furnell and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Privacy, Security, Legal and Technology Acceptance Requirements for
                  a {GDPR} Compliance Platform},
  booktitle    = {Computer Security - {ESORICS} 2019 International Workshops, CyberICPS,
                  SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26-27,
                  2019 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11980},
  pages        = {204--223},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-42048-2\_14},
  doi          = {10.1007/978-3-030-42048-2\_14},
  timestamp    = {Wed, 06 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/TsohouMMCPPDRC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rcis/AlkubaisyCM19,
  author       = {Duaa Alkubaisy and
                  Karl Cox and
                  Haralambos Mouratidis},
  editor       = {Manuel Kolp and
                  Jean Vanderdonckt and
                  Monique Snoeck and
                  Yves Wautelet},
  title        = {Towards Detecting and Mitigating Conflicts for Privacy and Security
                  Requirements},
  booktitle    = {13th International Conference on Research Challenges in Information
                  Science, {RCIS} 2019, Brussels, Belgium, May 29-31, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/RCIS.2019.8876999},
  doi          = {10.1109/RCIS.2019.8876999},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/rcis/AlkubaisyCM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssci/NaikJGMNS19,
  author       = {Nitin Naik and
                  Paul Jenkins and
                  Jonathan Gillett and
                  Haralambos Mouratidis and
                  Kshirasagar Naik and
                  Jingping Song},
  title        = {Lockout-Tagout Ransomware: {A} Detection Method for Ransomware using
                  Fuzzy Hashing and Clustering},
  booktitle    = {{IEEE} Symposium Series on Computational Intelligence, {SSCI} 2019,
                  Xiamen, China, December 6-9, 2019},
  pages        = {641--648},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SSCI44817.2019.9003148},
  doi          = {10.1109/SSCI44817.2019.9003148},
  timestamp    = {Wed, 26 Feb 2020 16:57:41 +0100},
  biburl       = {https://dblp.org/rec/conf/ssci/NaikJGMNS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/PirasAPTMCBFMSP19,
  author       = {Luca Piras and
                  Mohammed Ghazi Al{-}Obeidallah and
                  Andrea Praitano and
                  Aggeliki Tsohou and
                  Haralambos Mouratidis and
                  Beatriz Gallego{-}Nicasio Crespo and
                  Jean Baptiste Bernard and
                  Marco Fiorani and
                  Emmanouil Magkos and
                  Andr{\`{e}}s Castillo Sanz and
                  Michalis Pavlidis and
                  Roberto D'Addario and
                  Giuseppe Giovanni Zorzino},
  editor       = {Stefanos Gritzalis and
                  Edgar R. Weippl and
                  Sokratis K. Katsikas and
                  Gabriele Anderst{-}Kotsis and
                  A Min Tjoa and
                  Ismail Khalil},
  title        = {DEFeND Architecture: {A} Privacy by Design Platform for {GDPR} Compliance},
  booktitle    = {Trust, Privacy and Security in Digital Business - 16th International
                  Conference, TrustBus 2019, Linz, Austria, August 26-29, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11711},
  pages        = {78--93},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-27813-7\_6},
  doi          = {10.1007/978-3-030-27813-7\_6},
  timestamp    = {Wed, 06 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustbus/PirasAPTMCBFMSP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/PolatidisPM18,
  author       = {Nikolaos Polatidis and
                  Michalis Pavlidis and
                  Haralambos Mouratidis},
  title        = {Cyber-attack path discovery in a dynamic supply chain maritime risk
                  management system},
  journal      = {Comput. Stand. Interfaces},
  volume       = {56},
  pages        = {74--82},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.csi.2017.09.006},
  doi          = {10.1016/J.CSI.2017.09.006},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csi/PolatidisPM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/DiamantopoulouM18,
  author       = {Vasiliki Diamantopoulou and
                  Haralambos Mouratidis},
  title        = {Applying the physics of notation to the evaluation of a security and
                  privacy requirements engineering methodology},
  journal      = {Inf. Comput. Secur.},
  volume       = {26},
  number       = {4},
  pages        = {382--400},
  year         = {2018},
  url          = {https://doi.org/10.1108/ICS-12-2017-0087},
  doi          = {10.1108/ICS-12-2017-0087},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/DiamantopoulouM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ArgyropoulosAMF18,
  author       = {Nikolaos Argyropoulos and
                  Konstantinos Angelopoulos and
                  Haralambos Mouratidis and
                  Andrew Fish},
  title        = {Risk-aware decision support with constrained goal models},
  journal      = {Inf. Comput. Secur.},
  volume       = {26},
  number       = {4},
  pages        = {472--490},
  year         = {2018},
  url          = {https://doi.org/10.1108/ICS-01-2018-0010},
  doi          = {10.1108/ICS-01-2018-0010},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/ArgyropoulosAMF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/IslamOKMG18,
  author       = {Shareeful Islam and
                  Moussa Ouedraogo and
                  Christos Kalloniatis and
                  Haralambos Mouratidis and
                  Stefanos Gritzalis},
  title        = {Assurance of Security and Privacy Requirements for Cloud Deployment
                  Models},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {6},
  number       = {2},
  pages        = {387--400},
  year         = {2018},
  url          = {https://doi.org/10.1109/TCC.2015.2511719},
  doi          = {10.1109/TCC.2015.2511719},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcc/IslamOKMG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/MouratidisD18,
  author       = {Haralambos Mouratidis and
                  Vasiliki Diamantopoulou},
  title        = {A Security Analysis Method for Industrial Internet of Things},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {14},
  number       = {9},
  pages        = {4093--4100},
  year         = {2018},
  url          = {https://doi.org/10.1109/TII.2018.2832853},
  doi          = {10.1109/TII.2018.2832853},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tii/MouratidisD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mcis/DiamantopoulouM18,
  author       = {Vasiliki Diamantopoulou and
                  Haralambos Mouratidis},
  title        = {Evaluating a Reference Architecture for Privacy Level Agreement's
                  Management},
  booktitle    = {12th Mediterranean Conference on Information Systems, {MCIS} 2018,
                  Corfu, Greece, 28-30 September 2018},
  pages        = {28},
  publisher    = {AISeL},
  year         = {2018},
  url          = {https://aisel.aisnet.org/mcis2018/28},
  timestamp    = {Fri, 13 Dec 2019 13:24:11 +0100},
  biburl       = {https://dblp.org/rec/conf/mcis/DiamantopoulouM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/AthinaiouMFPP18,
  author       = {Myrsini Athinaiou and
                  Haralambos Mouratidis and
                  Theo Fotis and
                  Michalis Pavlidis and
                  Emmanouil Panaousis},
  editor       = {Steven Furnell and
                  Haralambos Mouratidis and
                  G{\"{u}}nther Pernul},
  title        = {Towards the Definition of a Security Incident Response Modelling Language},
  booktitle    = {Trust, Privacy and Security in Digital Business - 15th International
                  Conference, TrustBus 2018, Regensburg, Germany, September 5-6, 2018,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11033},
  pages        = {198--212},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-98385-1\_14},
  doi          = {10.1007/978-3-319-98385-1\_14},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustbus/AthinaiouMFPP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/caise/2018fo,
  editor       = {Jan Mendling and
                  Haralambos Mouratidis},
  title        = {Information Systems in the Big Data Era - CAiSE Forum 2018, Tallinn,
                  Estonia, June 11-15, 2018, Proceedings},
  series       = {Lecture Notes in Business Information Processing},
  volume       = {317},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-92901-9},
  doi          = {10.1007/978-3-319-92901-9},
  isbn         = {978-3-319-92900-2},
  timestamp    = {Mon, 11 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/caise/2018fo.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trustbus/2018,
  editor       = {Steven Furnell and
                  Haralambos Mouratidis and
                  G{\"{u}}nther Pernul},
  title        = {Trust, Privacy and Security in Digital Business - 15th International
                  Conference, TrustBus 2018, Regensburg, Germany, September 5-6, 2018,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11033},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-98385-1},
  doi          = {10.1007/978-3-319-98385-1},
  isbn         = {978-3-319-98384-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustbus/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1804-10276,
  author       = {Nikolaos Polatidis and
                  Elias Pimenidis and
                  Michalis Pavlidis and
                  Spyridon Papastergiou and
                  Haralambos Mouratidis},
  title        = {From product recommendation to cyber-attack prediction: Generating
                  attack graphs and predicting future attacks},
  journal      = {CoRR},
  volume       = {abs/1804.10276},
  year         = {2018},
  url          = {http://arxiv.org/abs/1804.10276},
  eprinttype    = {arXiv},
  eprint       = {1804.10276},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1804-10276.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1805-02276,
  author       = {Elias Pimenidis and
                  Nikolaos Polatidis and
                  Haralambos Mouratidis},
  title        = {Mobile recommender systems: Identifying the major concepts},
  journal      = {CoRR},
  volume       = {abs/1805.02276},
  year         = {2018},
  url          = {http://arxiv.org/abs/1805.02276},
  eprinttype    = {arXiv},
  eprint       = {1805.02276},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1805-02276.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsis/MavropoulosMFPK17,
  author       = {Orestis Mavropoulos and
                  Haralambos Mouratidis and
                  Andrew Fish and
                  Emmanouil Panaousis and
                  Christos Kalloniatis},
  title        = {A conceptual model to support security analysis in the internet of
                  things},
  journal      = {Comput. Sci. Inf. Syst.},
  volume       = {14},
  number       = {2},
  pages        = {557--578},
  year         = {2017},
  url          = {https://doi.org/10.2298/CSIS160110016M},
  doi          = {10.2298/CSIS160110016M},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comsis/MavropoulosMFPK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/PolatidisGPM17,
  author       = {Nikolaos Polatidis and
                  Christos K. Georgiadis and
                  Elias Pimenidis and
                  Haralambos Mouratidis},
  title        = {Privacy-preserving collaborative recommendations based on random perturbations},
  journal      = {Expert Syst. Appl.},
  volume       = {71},
  pages        = {18--25},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.eswa.2016.11.018},
  doi          = {10.1016/J.ESWA.2016.11.018},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eswa/PolatidisGPM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijiids/NaskosGMK17,
  author       = {Athanasios Naskos and
                  Anastasios Gounaris and
                  Haralambos Mouratidis and
                  Panagiotis Katsaros},
  title        = {Security-aware elasticity for NoSQL databases in multi-cloud environments},
  journal      = {Int. J. Intell. Inf. Database Syst.},
  volume       = {10},
  number       = {3/4},
  pages        = {168--190},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJIIDS.2017.10007783},
  doi          = {10.1504/IJIIDS.2017.10007783},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijiids/NaskosGMK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jucs/GeorgiadisPMP17,
  author       = {Christos K. Georgiadis and
                  Nikolaos Polatidis and
                  Haralambos Mouratidis and
                  Elias Pimenidis},
  title        = {A Method for Privacy-preserving Collaborative Filtering Recommendations},
  journal      = {J. Univers. Comput. Sci.},
  volume       = {23},
  number       = {2},
  pages        = {146--166},
  year         = {2017},
  url          = {http://www.jucs.org/jucs\_23\_2/a\_method\_for\_privacy},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jucs/GeorgiadisPMP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/AngelopoulosDMP17,
  author       = {Konstantinos Angelopoulos and
                  Vasiliki Diamantopoulou and
                  Haralambos Mouratidis and
                  Michalis Pavlidis and
                  Mattia Salnitri and
                  Paolo Giorgini and
                  Jos{\'{e}} Fran. Ruiz},
  title        = {A Holistic Approach for Privacy Protection in E-Government},
  booktitle    = {Proceedings of the 12th International Conference on Availability,
                  Reliability and Security, Reggio Calabria, Italy, August 29 - September
                  01, 2017},
  pages        = {17:1--17:10},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3098954.3098960},
  doi          = {10.1145/3098954.3098960},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/AngelopoulosDMP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apf/DiamantopoulouA17,
  author       = {Vasiliki Diamantopoulou and
                  Konstantinos Angelopoulos and
                  Julian Flake and
                  Andrea Praitano and
                  Jos{\'{e}} Fran. Ruiz and
                  Jan J{\"{u}}rjens and
                  Michalis Pavlidis and
                  Dimitri Bonutto and
                  Andr{\`{e}}s Castillo Sanz and
                  Haralambos Mouratidis and
                  Javier Garcia{-}Robles and
                  Alberto Eugenio Tozzi},
  editor       = {Erich Schweighofer and
                  Herbert Leitold and
                  Andreas Mitrakas and
                  Kai Rannenberg},
  title        = {Privacy Data Management and Awareness for Public Administrations:
                  {A} Case Study from the Healthcare Domain},
  booktitle    = {Privacy Technologies and Policy - 5th Annual Privacy Forum, {APF}
                  2017, Vienna, Austria, June 7-8, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10518},
  pages        = {192--209},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-67280-9\_11},
  doi          = {10.1007/978-3-319-67280-9\_11},
  timestamp    = {Thu, 05 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/apf/DiamantopoulouA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/caise/ArgyropoulosMF17,
  author       = {Nikolaos Argyropoulos and
                  Haralambos Mouratidis and
                  Andrew Fish},
  editor       = {Iris Reinhartz{-}Berger and
                  Jens Gulden and
                  Selmin Nurcan and
                  Wided Gu{\'{e}}dria and
                  Palash Bera},
  title        = {Supporting Secure Business Process Design via Security Process Patterns},
  booktitle    = {Enterprise, Business-Process and Information Systems Modeling - 18th
                  International Conference, {BPMDS} 2017, 22nd International Conference,
                  {EMMSAD} 2017, Held at CAiSE 2017, Essen, Germany, June 12-13, 2017,
                  Proceedings},
  series       = {Lecture Notes in Business Information Processing},
  volume       = {287},
  pages        = {19--33},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59466-8\_2},
  doi          = {10.1007/978-3-319-59466-8\_2},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/caise/ArgyropoulosMF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/caise/DiamantopoulouP17,
  author       = {Vasiliki Diamantopoulou and
                  Michalis Pavlidis and
                  Haralambos Mouratidis},
  editor       = {Xavier Franch and
                  Jolita Ralyt{\'{e}} and
                  Raimundas Matulevicius and
                  Camille Salinesi and
                  Roel J. Wieringa},
  title        = {Privacy Level Agreements for Public Administration Information Systems},
  booktitle    = {Proceedings of the Forum and Doctoral Consortium Papers Presented
                  at the 29th International Conference on Advanced Information Systems
                  Engineering, CAiSE 2017, Essen, Germany, June 12-16, 2017},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {1848},
  pages        = {97--104},
  publisher    = {CEUR-WS.org},
  year         = {2017},
  url          = {https://ceur-ws.org/Vol-1848/CAiSE2017\_Forum\_Paper13.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:33 +0100},
  biburl       = {https://dblp.org/rec/conf/caise/DiamantopoulouP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/caise/SheiMD17,
  author       = {Shaun Shei and
                  Haralambos Mouratidis and
                  Aidan J. Delaney},
  editor       = {Iris Reinhartz{-}Berger and
                  Jens Gulden and
                  Selmin Nurcan and
                  Wided Gu{\'{e}}dria and
                  Palash Bera},
  title        = {A Security Requirements Modelling Language to Secure Cloud Computing
                  Environments},
  booktitle    = {Enterprise, Business-Process and Information Systems Modeling - 18th
                  International Conference, {BPMDS} 2017, 22nd International Conference,
                  {EMMSAD} 2017, Held at CAiSE 2017, Essen, Germany, June 12-13, 2017,
                  Proceedings},
  series       = {Lecture Notes in Business Information Processing},
  volume       = {287},
  pages        = {337--345},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59466-8\_21},
  doi          = {10.1007/978-3-319-59466-8\_21},
  timestamp    = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/caise/SheiMD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eann/PolatidisPPM17,
  author       = {Nikolaos Polatidis and
                  Elias Pimenidis and
                  Michalis Pavlidis and
                  Haralambos Mouratidis},
  editor       = {Giacomo Boracchi and
                  Lazaros S. Iliadis and
                  Chrisina Jayne and
                  Aristidis Likas},
  title        = {Recommender Systems Meeting Security: From Product Recommendation
                  to Cyber-Attack Prediction},
  booktitle    = {Engineering Applications of Neural Networks - 18th International Conference,
                  {EANN} 2017, Athens, Greece, August 25-27, 2017, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {744},
  pages        = {508--519},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-65172-9\_43},
  doi          = {10.1007/978-3-319-65172-9\_43},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eann/PolatidisPPM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eann/NeokosmidisRCGM17,
  author       = {Ioannis Neokosmidis and
                  Theodoros Rokkas and
                  Ioannis P. Chochliouros and
                  Leonardo Goratti and
                  Haralambos Mouratidis and
                  Karim M. Nasr and
                  Seiamak Vahid and
                  Klaus Moessner and
                  Antonino Albanese and
                  Paolo Secondo Crosta and
                  Pietro Paglierani},
  editor       = {Giacomo Boracchi and
                  Lazaros S. Iliadis and
                  Chrisina Jayne and
                  Aristidis Likas},
  title        = {Are Small Cells and Network Intelligence at the Edge the Drivers for
                  5G Market Adoption? The {SESAME} Case},
  booktitle    = {Engineering Applications of Neural Networks - 18th International Conference,
                  {EANN} 2017, Athens, Greece, August 25-27, 2017, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {744},
  pages        = {693--703},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-65172-9\_58},
  doi          = {10.1007/978-3-319-65172-9\_58},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eann/NeokosmidisRCGM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/er/DiamantopoulouA17,
  author       = {Vasiliki Diamantopoulou and
                  Konstantinos Angelopoulos and
                  Michalis Pavlidis and
                  Haralambos Mouratidis},
  editor       = {Cristina Cabanillas and
                  Sergio Espa{\~{n}}a and
                  Siamak Farshidi},
  title        = {A Metamodel for GDPR-based Privacy Level Agreements},
  booktitle    = {Proceedings of the {ER} Forum 2017 and the {ER} 2017 Demo Track co-located
                  with the 36th International Conference on Conceptual Modelling {(ER}
                  2017), Valencia, Spain, - November 6-9, 2017},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {1979},
  pages        = {285--291},
  publisher    = {CEUR-WS.org},
  year         = {2017},
  url          = {https://ceur-ws.org/Vol-1979/paper-08.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:42 +0100},
  biburl       = {https://dblp.org/rec/conf/er/DiamantopoulouA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/DiamantopoulouP17,
  author       = {Vasiliki Diamantopoulou and
                  Michalis Pavlidis and
                  Haralambos Mouratidis},
  editor       = {Sokratis K. Katsikas and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens and
                  Costas Lambrinoudakis and
                  Christos Kalloniatis and
                  John Mylopoulos and
                  Annie I. Ant{\'{o}}n and
                  Stefanos Gritzalis},
  title        = {Evaluation of a Security and Privacy Requirements Methodology Using
                  the Physics of Notation},
  booktitle    = {Computer Security - {ESORICS} 2017 International Workshops, CyberICPS
                  2017 and {SECPRE} 2017, Oslo, Norway, September 14-15, 2017, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10683},
  pages        = {210--225},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72817-9\_14},
  doi          = {10.1007/978-3-319-72817-9\_14},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/DiamantopoulouP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ArgyropoulosAMF17,
  author       = {Nikolaos Argyropoulos and
                  Konstantinos Angelopoulos and
                  Haralambos Mouratidis and
                  Andrew Fish},
  editor       = {Sokratis K. Katsikas and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens and
                  Costas Lambrinoudakis and
                  Christos Kalloniatis and
                  John Mylopoulos and
                  Annie I. Ant{\'{o}}n and
                  Stefanos Gritzalis},
  title        = {Decision-Making in Security Requirements Engineering with Constrained
                  Goal Models},
  booktitle    = {Computer Security - {ESORICS} 2017 International Workshops, CyberICPS
                  2017 and {SECPRE} 2017, Oslo, Norway, September 14-15, 2017, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10683},
  pages        = {262--280},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72817-9\_17},
  doi          = {10.1007/978-3-319-72817-9\_17},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/ArgyropoulosAMF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/ArgyropoulosSKM17,
  author       = {Nikolaos Argyropoulos and
                  Shaun Shei and
                  Christos Kalloniatis and
                  Haralambos Mouratidis and
                  Aidan J. Delaney and
                  Andrew Fish and
                  Stefanos Gritzalis},
  editor       = {Tung Bui},
  title        = {A Semi-Automatic Approach for Eliciting Cloud Security and Privacy
                  Requirements},
  booktitle    = {50th Hawaii International Conference on System Sciences, {HICSS} 2017,
                  Hilton Waikoloa Village, Hawaii, USA, January 4-7, 2017},
  pages        = {1--10},
  publisher    = {ScholarSpace / {AIS} Electronic Library (AISeL)},
  year         = {2017},
  url          = {https://hdl.handle.net/10125/41749},
  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hicss/ArgyropoulosSKM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ict/VassilakisMPML17,
  author       = {Vassilios G. Vassilakis and
                  Haralambos Mouratidis and
                  Emmanouil Panaousis and
                  Ioannis D. Moscholios and
                  Michael D. Logothetis},
  title        = {Security requirements modelling for virtualized 5G small cell networks},
  booktitle    = {24th International Conference on Telecommunications, {ICT} 2017, Limassol,
                  Cyprus, May 3-5, 2017},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICT.2017.7998269},
  doi          = {10.1109/ICT.2017.7998269},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ict/VassilakisMPML17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/DiamantopoulouK17,
  author       = {Vasiliki Diamantopoulou and
                  Christos Kalloniatis and
                  Stefanos Gritzalis and
                  Haralambos Mouratidis},
  editor       = {Sabrina De Capitani di Vimercati and
                  Fabio Martinelli},
  title        = {Supporting Privacy by Design Using Privacy Process Patterns},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 32nd {IFIP} {TC} 11
                  International Conference, {SEC} 2017, Rome, Italy, May 29-31, 2017,
                  Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {502},
  pages        = {491--505},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-58469-0\_33},
  doi          = {10.1007/978-3-319-58469-0\_33},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/DiamantopoulouK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sera/MavropoulosMFP17,
  author       = {Orestis Mavropoulos and
                  Haralambos Mouratidis and
                  Andrew Fish and
                  Emmanouil A. Panaousis},
  editor       = {Liz Bacon and
                  Jixin Ma and
                  Lachlan M. MacKinnon},
  title        = {ASTo: {A} tool for security analysis of IoT systems},
  booktitle    = {15th {IEEE} International Conference on Software Engineering Research,
                  Management and Applications, {SERA} 2017, London, United Kingdom,
                  June 7-9, 2017},
  pages        = {395--400},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/SERA.2017.7965757},
  doi          = {10.1109/SERA.2017.7965757},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sera/MavropoulosMFP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/PavlidisMPA17,
  author       = {Michalis Pavlidis and
                  Haralambos Mouratidis and
                  Emmanouil Panaousis and
                  Nikolaos Argyropoulos},
  editor       = {Javier L{\'{o}}pez and
                  Simone Fischer{-}H{\"{u}}bner and
                  Costas Lambrinoudakis},
  title        = {Selecting Security Mechanisms in Secure Tropos},
  booktitle    = {Trust, Privacy and Security in Digital Business - 14th International
                  Conference, TrustBus 2017, Lyon, France, August 30-31, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10442},
  pages        = {99--114},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64483-7\_7},
  doi          = {10.1007/978-3-319-64483-7\_7},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustbus/PavlidisMPA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wecwis/ArgyropoulosMF17,
  author       = {Nikolaos Argyropoulos and
                  Haralambos Mouratidis and
                  Andrew Fish},
  editor       = {Peri Loucopoulos and
                  Yannis Manolopoulos and
                  Oscar Pastor and
                  Babis Theodoulidis and
                  Jelena Zdravkovic},
  title        = {Attribute-Based Security Verification of Business Process Models},
  booktitle    = {19th {IEEE} Conference on Business Informatics, {CBI} 2017, Thessaloniki,
                  Greece, July 24-27, 2017, Volume 1: Conference Papers},
  pages        = {43--52},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CBI.2017.37},
  doi          = {10.1109/CBI.2017.37},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wecwis/ArgyropoulosMF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/rcis/2017,
  editor       = {Sa{\"{\i}}d Assar and
                  Oscar Pastor and
                  Haralambos Mouratidis},
  title        = {11th International Conference on Research Challenges in Information
                  Science, {RCIS} 2017, Brighton, United Kingdom, May 10-12, 2017},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7951529/proceeding},
  isbn         = {978-1-5090-5476-3},
  timestamp    = {Mon, 18 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/rcis/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cloudcomp/NaskosGMK16,
  author       = {Athanasios Naskos and
                  Anastasios Gounaris and
                  Haralambos Mouratidis and
                  Panagiotis Katsaros},
  title        = {Online Analysis of Security Risks in Elastic Cloud Applications},
  journal      = {{IEEE} Cloud Comput.},
  volume       = {3},
  number       = {5},
  pages        = {26--33},
  year         = {2016},
  url          = {https://doi.org/10.1109/MCC.2016.108},
  doi          = {10.1109/MCC.2016.108},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cloudcomp/NaskosGMK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/AlaviIM16,
  author       = {Reza Alavi and
                  Shareeful Islam and
                  Haralambos Mouratidis},
  title        = {An information security risk-driven investment model for analysing
                  human factors},
  journal      = {Inf. Comput. Secur.},
  volume       = {24},
  number       = {2},
  pages        = {205--227},
  year         = {2016},
  url          = {https://doi.org/10.1108/ICS-01-2016-0006},
  doi          = {10.1108/ICS-01-2016-0006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/AlaviIM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/SimouKGM16,
  author       = {Stavros Simou and
                  Christos Kalloniatis and
                  Stefanos Gritzalis and
                  Haralambos Mouratidis},
  title        = {A survey on cloud forensics challenges and solutions},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {18},
  pages        = {6285--6314},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.1688},
  doi          = {10.1002/SEC.1688},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/SimouKGM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/caise/MavropoulosMFPK16,
  author       = {Orestis Mavropoulos and
                  Haralambos Mouratidis and
                  Andrew Fish and
                  Emmanouil Panaousis and
                  Christos Kalloniatis},
  editor       = {John Krogstie and
                  Haralambos Mouratidis and
                  Jianwen Su},
  title        = {Apparatus: Reasoning About Security Requirements in the Internet of
                  Things},
  booktitle    = {Advanced Information Systems Engineering Workshops - CAiSE 2016 International
                  Workshops, Ljubljana, Slovenia, June 13-17, 2016, Proceedings},
  series       = {Lecture Notes in Business Information Processing},
  volume       = {249},
  pages        = {219--230},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-39564-7\_21},
  doi          = {10.1007/978-3-319-39564-7\_21},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/caise/MavropoulosMFPK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/es/SprovieriASMMF16,
  author       = {Danillo Sprovieri and
                  Nikolaos Argyropoulos and
                  Carine Souveyet and
                  Ra{\'{u}}l Mazo and
                  Haralambos Mouratidis and
                  Andrew Fish},
  editor       = {Gang Li and
                  Yale Yu},
  title        = {Security Alignment Analysis of Software Product Lines},
  booktitle    = {4th International Conference on Enterprise Systems, {ES} 2016, Melbourne,
                  Australia, November 2-3, 2016},
  pages        = {97--103},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/ES.2016.19},
  doi          = {10.1109/ES.2016.19},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/es/SprovieriASMMF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/netsoft/GiannoulakisXKK16,
  author       = {Ioannis Giannoulakis and
                  George Xylouris and
                  Emmanouil Kafetzakis and
                  Anastasios Kourtis and
                  Jose Oscar Fajardo and
                  Pouria Sayyad Khodashenas and
                  Antonino Albanese and
                  Haralambos Mouratidis and
                  Vassilios G. Vassilakis},
  title        = {System architecture and deployment scenarios for {SESAME:} Small cEllS
                  coodinAtion for Multi-tenancy and Edge services},
  booktitle    = {{IEEE} NetSoft Conference and Workshops, NetSoft 2016, Seoul, South
                  Korea, June 6-10, 2016},
  pages        = {447--452},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/NETSOFT.2016.7502483},
  doi          = {10.1109/NETSOFT.2016.7502483},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/netsoft/GiannoulakisXKK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rcis/ArgyropoulosKMF16,
  author       = {Nikolaos Argyropoulos and
                  Christos Kalloniatis and
                  Haralambos Mouratidis and
                  Andrew Fish},
  title        = {Incorporating privacy patterns into semi-automatic business process
                  derivation},
  booktitle    = {Tenth {IEEE} International Conference on Research Challenges in Information
                  Science, {RCIS} 2016, Grenoble, France, June 1-3, 2016},
  pages        = {1--12},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/RCIS.2016.7549305},
  doi          = {10.1109/RCIS.2016.7549305},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/rcis/ArgyropoulosKMF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/GharibSPGMPRFS16,
  author       = {Mohamad Gharib and
                  Mattia Salnitri and
                  Elda Paja and
                  Paolo Giorgini and
                  Haralambos Mouratidis and
                  Michalis Pavlidis and
                  Jos{\'{e}} Fran. Ruiz and
                  Sandra Fernandez and
                  Andrea Della Siria},
  title        = {Privacy Requirements: Findings and Lessons Learned in Developing a
                  Privacy Platform},
  booktitle    = {24th {IEEE} International Requirements Engineering Conference, {RE}
                  2016, Beijing, China, September 12-16, 2016},
  pages        = {256--265},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/RE.2016.13},
  doi          = {10.1109/RE.2016.13},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/re/GharibSPGMPRFS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/SimouKMG16,
  author       = {Stavros Simou and
                  Christos Kalloniatis and
                  Haralambos Mouratidis and
                  Stefanos Gritzalis},
  editor       = {Sokratis K. Katsikas and
                  Costas Lambrinoudakis and
                  Steven Furnell},
  title        = {Towards a Model-Based Framework for Forensic-Enabled Cloud Information
                  Systems},
  booktitle    = {Trust, Privacy and Security in Digital Business - 13th International
                  Conference, TrustBus 2016, Porto, Portugal, September 7-8, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9830},
  pages        = {35--47},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44341-6\_3},
  doi          = {10.1007/978-3-319-44341-6\_3},
  timestamp    = {Mon, 03 Jan 2022 22:15:14 +0100},
  biburl       = {https://dblp.org/rec/conf/trustbus/SimouKMG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/SheiKMD16,
  author       = {Shaun Shei and
                  Christos Kalloniatis and
                  Haralambos Mouratidis and
                  Aidan J. Delaney},
  editor       = {Sokratis K. Katsikas and
                  Costas Lambrinoudakis and
                  Steven Furnell},
  title        = {Modelling Secure Cloud Computing Systems from a Security Requirements
                  Perspective},
  booktitle    = {Trust, Privacy and Security in Digital Business - 13th International
                  Conference, TrustBus 2016, Porto, Portugal, September 7-8, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9830},
  pages        = {48--62},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44341-6\_4},
  doi          = {10.1007/978-3-319-44341-6\_4},
  timestamp    = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustbus/SheiKMD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/VassilakisPM16,
  author       = {Vassilios G. Vassilakis and
                  Emmanouil Panaousis and
                  Haralambos Mouratidis},
  editor       = {Sara Foresti and
                  Javier L{\'{o}}pez},
  title        = {Security Challenges of Small Cell as a Service in Virtualized Mobile
                  Edge Computing Environments},
  booktitle    = {Information Security Theory and Practice - 10th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2016, Heraklion, Crete, Greece, September 26-27,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9895},
  pages        = {70--84},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45931-8\_5},
  doi          = {10.1007/978-3-319-45931-8\_5},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/VassilakisPM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/16/MouratidisAS16,
  author       = {Haralambos Mouratidis and
                  Nikolaos Argyropoulos and
                  Shaun Shei},
  editor       = {Dimitris Karagiannis and
                  Heinrich C. Mayr and
                  John Mylopoulos},
  title        = {Security Requirements Engineering for Cloud Computing: The Secure
                  Tropos Approach},
  booktitle    = {Domain-Specific Conceptual Modeling, Concepts, Methods and Tools},
  pages        = {357--380},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-39417-6\_16},
  doi          = {10.1007/978-3-319-39417-6\_16},
  timestamp    = {Tue, 16 May 2017 14:01:44 +0200},
  biburl       = {https://dblp.org/rec/books/sp/16/MouratidisAS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/caise/2016w,
  editor       = {John Krogstie and
                  Haralambos Mouratidis and
                  Jianwen Su},
  title        = {Advanced Information Systems Engineering Workshops - CAiSE 2016 International
                  Workshops, Ljubljana, Slovenia, June 13-17, 2016, Proceedings},
  series       = {Lecture Notes in Business Information Processing},
  volume       = {249},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-39564-7},
  doi          = {10.1007/978-3-319-39564-7},
  isbn         = {978-3-319-39563-0},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/caise/2016w.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/KavakliKMG15,
  author       = {Evangelia Kavakli and
                  Christos Kalloniatis and
                  Haralambos Mouratidis and
                  Stefanos Gritzalis},
  title        = {Privacy as an Integral Part of the Implementation of Cloud Solutions},
  journal      = {Comput. J.},
  volume       = {58},
  number       = {10},
  pages        = {2213--2224},
  year         = {2015},
  url          = {https://doi.org/10.1093/comjnl/bxu118},
  doi          = {10.1093/COMJNL/BXU118},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/KavakliKMG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/infsof/RebolloMFM15,
  author       = {Oscar Rebollo and
                  Daniel Mellado and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Haralambos Mouratidis},
  title        = {Empirical evaluation of a cloud computing information security governance
                  framework},
  journal      = {Inf. Softw. Technol.},
  volume       = {58},
  pages        = {44--57},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.infsof.2014.10.003},
  doi          = {10.1016/J.INFSOF.2014.10.003},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/infsof/RebolloMFM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/caise/SimouKMG15,
  author       = {Stavros Simou and
                  Christos Kalloniatis and
                  Haralambos Mouratidis and
                  Stefanos Gritzalis},
  editor       = {Anne Persson and
                  Janis Stirna},
  title        = {Towards the Development of a Cloud Forensics Methodology: {A} Conceptual
                  Model},
  booktitle    = {Advanced Information Systems Engineering Workshops - CAiSE 2015 International
                  Workshops, Stockholm, Sweden, June 8-9, 2015, Proceedings},
  series       = {Lecture Notes in Business Information Processing},
  volume       = {215},
  pages        = {470--481},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19243-7\_43},
  doi          = {10.1007/978-3-319-19243-7\_43},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/caise/SimouKMG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/caise/AlcanizRMMF15,
  author       = {Luis M{\'{a}}rquez Alca{\~{n}}iz and
                  David Garcia Rosado and
                  Haralambos Mouratidis and
                  Daniel Mellado and
                  Eduardo Fern{\'{a}}ndez{-}Medina},
  editor       = {Anne Persson and
                  Janis Stirna},
  title        = {A Framework for Secure Migration Processes of Legacy Systems to the
                  Cloud},
  booktitle    = {Advanced Information Systems Engineering Workshops - CAiSE 2015 International
                  Workshops, Stockholm, Sweden, June 8-9, 2015, Proceedings},
  series       = {Lecture Notes in Business Information Processing},
  volume       = {215},
  pages        = {507--517},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19243-7\_46},
  doi          = {10.1007/978-3-319-19243-7\_46},
  timestamp    = {Tue, 19 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/caise/AlcanizRMMF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/PavlidisMGK15,
  author       = {Michalis Pavlidis and
                  Haralambos Mouratidis and
                  Cesar Gonzalez{-}Perez and
                  Christos Kalloniatis},
  editor       = {Costas Lambrinoudakis and
                  Alban Gabillon},
  title        = {Addressing Privacy and Trust Issues in Cultural Heritage Modelling},
  booktitle    = {Risks and Security of Internet and Systems - 10th International Conference,
                  CRiSIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9572},
  pages        = {3--16},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31811-0\_1},
  doi          = {10.1007/978-3-319-31811-0\_1},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crisis/PavlidisMGK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/SimouKMG15,
  author       = {Stavros Simou and
                  Christos Kalloniatis and
                  Haralambos Mouratidis and
                  Stefanos Gritzalis},
  editor       = {Costas Lambrinoudakis and
                  Alban Gabillon},
  title        = {A Meta-model for Assisting a Cloud Forensics Process},
  booktitle    = {Risks and Security of Internet and Systems - 10th International Conference,
                  CRiSIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9572},
  pages        = {177--187},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31811-0\_11},
  doi          = {10.1007/978-3-319-31811-0\_11},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crisis/SimouKMG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dms/SheiDKM15,
  author       = {Shaun Shei and
                  Aidan J. Delaney and
                  Stelios Kapetanakis and
                  Haralambos Mouratidis},
  editor       = {Angela Guercio},
  title        = {Visually Mapping Requirements Models to Cloud Services},
  booktitle    = {The 21st International Conference on Distributed Multimedia Systems,
                  Vancouver, Canada, August 31 - September 2, 2015},
  pages        = {108--114},
  publisher    = {Knowledge Systems Institute},
  year         = {2015},
  url          = {https://doi.org/10.18293/DMS2015-015},
  doi          = {10.18293/DMS2015-015},
  timestamp    = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dms/SheiDKM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/er/ArgyropoulosMF15,
  author       = {Nikolaos Argyropoulos and
                  Haralambos Mouratidis and
                  Andrew Fish},
  editor       = {Manfred A. Jeusfeld and
                  Kamalakar Karlapalem},
  title        = {Towards the Derivation of Secure Business Process Designs},
  booktitle    = {Advances in Conceptual Modeling - {ER} 2015 Workshops, AHA, CMS, EMoV,
                  MoBiD, MORE-BI, MReBA, QMMQ, and {SCME} Stockholm, Sweden, October
                  19-22, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9382},
  pages        = {248--258},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-25747-1\_25},
  doi          = {10.1007/978-3-319-25747-1\_25},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/er/ArgyropoulosMF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/haisa/AlaviIML15,
  author       = {Reza Alavi and
                  Shareeful Islam and
                  Haris Mouratidis and
                  Sin Lee},
  editor       = {Steven Furnell and
                  Nathan L. Clarke},
  title        = {Managing Social Engineering Attacks- Considering Human Factors and
                  Security Investment},
  booktitle    = {Ninth International Symposium on Human Aspects of Information Security
                  {\&} Assurance, {HAISA} 2015 ,Lesvos, Greece, July 1-3, 2015,
                  Proceedings},
  pages        = {161--171},
  publisher    = {University of Plymouth},
  year         = {2015},
  url          = {http://www.cscan.org/openaccess/?paperid=267},
  timestamp    = {Tue, 06 Jul 2021 12:22:17 +0200},
  biburl       = {https://dblp.org/rec/conf/haisa/AlaviIML15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/AlaviIM15,
  author       = {Reza Alavi and
                  Shareeful Islam and
                  Haris Mouratidis},
  editor       = {Hamid Jahankhani and
                  Alex Carlile and
                  Babak Akhgar and
                  Amie Taal and
                  Ali G. Hessami and
                  Amin Hosseinian Far},
  title        = {Human Factors of Social Engineering Attacks (SEAs) in Hybrid Cloud
                  Environment: Threats and Risks},
  booktitle    = {Global Security, Safety and Sustainability: Tomorrow's Challenges
                  of Cyber Security - 10th International Conference, {ICGS3} 2015, London,
                  UK, September 15-17, 2015. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {534},
  pages        = {50--56},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23276-8\_5},
  doi          = {10.1007/978-3-319-23276-8\_5},
  timestamp    = {Sun, 04 Jun 2017 10:06:27 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/AlaviIM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/IsmailIM15,
  author       = {Umar Mukhtar Ismail and
                  Shareeful Islam and
                  Haralambos Mouratidis},
  editor       = {Hamid Jahankhani and
                  Alex Carlile and
                  Babak Akhgar and
                  Amie Taal and
                  Ali G. Hessami and
                  Amin Hosseinian Far},
  title        = {A Framework for Cloud Security Audit},
  booktitle    = {Global Security, Safety and Sustainability: Tomorrow's Challenges
                  of Cyber Security - 10th International Conference, {ICGS3} 2015, London,
                  UK, September 15-17, 2015. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {534},
  pages        = {296--309},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23276-8\_27},
  doi          = {10.1007/978-3-319-23276-8\_27},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/IsmailIM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/GanjiMGP15,
  author       = {Daniel Ganji and
                  Haralambos Mouratidis and
                  Saeed Malekshahi Gheytassi and
                  Miltos Petridis},
  editor       = {Hamid Jahankhani and
                  Alex Carlile and
                  Babak Akhgar and
                  Amie Taal and
                  Ali G. Hessami and
                  Amin Hosseinian Far},
  title        = {Conflicts Between Security and Privacy Measures in Software Requirements
                  Engineering},
  booktitle    = {Global Security, Safety and Sustainability: Tomorrow's Challenges
                  of Cyber Security - 10th International Conference, {ICGS3} 2015, London,
                  UK, September 15-17, 2015. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {534},
  pages        = {323--334},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23276-8\_29},
  doi          = {10.1007/978-3-319-23276-8\_29},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/GanjiMGP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip8-1/ArgyropoulosAMF15,
  author       = {Nikolaos Argyropoulos and
                  Luis M{\'{a}}rquez Alca{\~{n}}iz and
                  Haralambos Mouratidis and
                  Andrew Fish and
                  David Garcia Rosado and
                  Ignacio Garc{\'{\i}}a Rodr{\'{\i}}guez de Guzm{\'{a}}n and
                  Eduardo Fern{\'{a}}ndez{-}Medina},
  editor       = {Jolita Ralyt{\'{e}} and
                  Sergio Espa{\~{n}}a and
                  Oscar Pastor},
  title        = {Eliciting Security Requirements for Business Processes of Legacy Systems},
  booktitle    = {The Practice of Enterprise Modeling - 8th {IFIP} {WG} 8.1. Working
                  Conference, PoEM 2015, Valencia, Spain, November 10-12, 2015, Proceedings},
  series       = {Lecture Notes in Business Information Processing},
  volume       = {235},
  pages        = {91--107},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-25897-3\_7},
  doi          = {10.1007/978-3-319-25897-3\_7},
  timestamp    = {Tue, 19 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip8-1/ArgyropoulosAMF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/medi/NaskosGMK15,
  author       = {Athanasios Naskos and
                  Anastasios Gounaris and
                  Haralambos Mouratidis and
                  Panagiotis Katsaros},
  editor       = {Ladjel Bellatreche and
                  Yannis Manolopoulos},
  title        = {Security-Aware Elasticity for NoSQL Databases},
  booktitle    = {Model and Data Engineering - 5th International Conference, {MEDI}
                  2015, Rhodes, Greece, September 26-28, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9344},
  pages        = {181--197},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23781-7\_15},
  doi          = {10.1007/978-3-319-23781-7\_15},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/medi/NaskosGMK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/SheiAMDRF15,
  author       = {Shaun Shei and
                  Luis M{\'{a}}rquez Alca{\~{n}}iz and
                  Haralambos Mouratidis and
                  Aidan J. Delaney and
                  David Garcia Rosado and
                  Eduardo Fern{\'{a}}ndez{-}Medina},
  title        = {Modelling secure cloud systems based on system requirements},
  booktitle    = {2nd {IEEE} Workshop on Evolving Security and Privacy Requirements
                  Engineering, {ESPRE} 2015, Ottawa, ON, Canada, August 25, 2015},
  pages        = {19--24},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ESPRE.2015.7330163},
  doi          = {10.1109/ESPRE.2015.7330163},
  timestamp    = {Tue, 19 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/re/SheiAMDRF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/IsmailIM15,
  author       = {Umar Mukhtar Ismail and
                  Shareeful Islam and
                  Haralambos Mouratidis},
  title        = {Cloud Security Audit for Migration and Continuous Monitoring},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {1081--1087},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.486},
  doi          = {10.1109/TRUSTCOM.2015.486},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/IsmailIM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/MelladoMF14,
  author       = {Daniel Mellado and
                  Haralambos Mouratidis and
                  Eduardo Fern{\'{a}}ndez{-}Medina},
  title        = {Secure Tropos framework for software product lines requirements engineering},
  journal      = {Comput. Stand. Interfaces},
  volume       = {36},
  number       = {4},
  pages        = {711--722},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.csi.2013.12.006},
  doi          = {10.1016/J.CSI.2013.12.006},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csi/MelladoMF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/KalloniatisMMIGK14,
  author       = {Christos Kalloniatis and
                  Haralambos Mouratidis and
                  Vassilis Manousakis and
                  Shareeful Islam and
                  Stefanos Gritzalis and
                  Evangelia Kavakli},
  title        = {Towards the design of secure and privacy-oriented information systems
                  in the cloud: Identifying the major concepts},
  journal      = {Comput. Stand. Interfaces},
  volume       = {36},
  number       = {4},
  pages        = {759--775},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.csi.2013.12.010},
  doi          = {10.1016/J.CSI.2013.12.010},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csi/KalloniatisMMIGK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijismd/PavlidisIMK14,
  author       = {Michalis Pavlidis and
                  Shareeful Islam and
                  Haralambos Mouratidis and
                  Paul Kearney},
  title        = {Modeling Trust Relationships for Developing Trustworthy Information
                  Systems},
  journal      = {Int. J. Inf. Syst. Model. Des.},
  volume       = {5},
  number       = {1},
  pages        = {25--48},
  year         = {2014},
  url          = {https://doi.org/10.4018/ijismd.2014010102},
  doi          = {10.4018/IJISMD.2014010102},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijismd/PavlidisIMK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/infsof/IslamMW14,
  author       = {Shareeful Islam and
                  Haralambos Mouratidis and
                  Edgar R. Weippl},
  title        = {An empirical study on the implementation and evaluation of a goal-driven
                  software development risk management model},
  journal      = {Inf. Softw. Technol.},
  volume       = {56},
  number       = {2},
  pages        = {117--133},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.infsof.2013.06.003},
  doi          = {10.1016/J.INFSOF.2013.06.003},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/infsof/IslamMW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hci/AlaviIM14,
  author       = {Reza Alavi and
                  Shareeful Islam and
                  Haralambos Mouratidis},
  editor       = {Theo Tryfonas and
                  Ioannis G. Askoxylakis},
  title        = {A Conceptual Framework to Analyze Human Factors of Information Security
                  Management System {(ISMS)} in Organizations},
  booktitle    = {Human Aspects of Information Security, Privacy, and Trust - Second
                  International Conference, {HAS} 2014, Held as Part of {HCI} International
                  2014, Heraklion, Crete, Greece, June 22-27, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8533},
  pages        = {297--305},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-07620-1\_26},
  doi          = {10.1007/978-3-319-07620-1\_26},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hci/AlaviIM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/caise/2014,
  editor       = {Matthias Jarke and
                  John Mylopoulos and
                  Christoph Quix and
                  Colette Rolland and
                  Yannis Manolopoulos and
                  Haralambos Mouratidis and
                  Jennifer Horkoff},
  title        = {Advanced Information Systems Engineering - 26th International Conference,
                  CAiSE 2014, Thessaloniki, Greece, June 16-20, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8484},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-07881-6},
  doi          = {10.1007/978-3-319-07881-6},
  isbn         = {978-3-319-07880-9},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/caise/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/OuedraogoM13,
  author       = {Moussa Ouedraogo and
                  Haralambos Mouratidis},
  title        = {Selecting a Cloud Service Provider in the age of cybercrime},
  journal      = {Comput. Secur.},
  volume       = {38},
  pages        = {3--13},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.cose.2013.01.007},
  doi          = {10.1016/J.COSE.2013.01.007},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/OuedraogoM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/MouratidisIKG13,
  author       = {Haralambos Mouratidis and
                  Shareeful Islam and
                  Christos Kalloniatis and
                  Stefanos Gritzalis},
  title        = {A framework to support selection of cloud providers based on security
                  and privacy requirements},
  journal      = {J. Syst. Softw.},
  volume       = {86},
  number       = {9},
  pages        = {2276--2293},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jss.2013.03.011},
  doi          = {10.1016/J.JSS.2013.03.011},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jss/MouratidisIKG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/re/KalloniatisMI13,
  author       = {Christos Kalloniatis and
                  Haralambos Mouratidis and
                  Shareeful Islam},
  title        = {Evaluating cloud deployment scenarios based on security and privacy
                  requirements},
  journal      = {Requir. Eng.},
  volume       = {18},
  number       = {4},
  pages        = {299--319},
  year         = {2013},
  url          = {https://doi.org/10.1007/s00766-013-0166-7},
  doi          = {10.1007/S00766-013-0166-7},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/re/KalloniatisMI13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sqj/OuedraogoSMPK013,
  author       = {Moussa Ouedraogo and
                  Reijo M. Savola and
                  Haralambos Mouratidis and
                  David Preston and
                  Djamel Khadraoui and
                  Eric Dubois},
  title        = {Taxonomy of quality metrics for assessing assurance of security correctness},
  journal      = {Softw. Qual. J.},
  volume       = {21},
  number       = {1},
  pages        = {67--97},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11219-011-9169-0},
  doi          = {10.1007/S11219-011-9169-0},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sqj/OuedraogoSMPK013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/SouagSWM13,
  author       = {Amina Souag and
                  Camille Salinesi and
                  Isabelle Wattiau and
                  Haris Mouratidis},
  title        = {Using Security and Domain Ontologies for Security Requirements Analysis},
  booktitle    = {{IEEE} 37th Annual Computer Software and Applications Conference,
                  {COMPSAC} Workshops 2013, Kyoto, Japan, July 22-26, 2013},
  pages        = {101--107},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/COMPSACW.2013.124},
  doi          = {10.1109/COMPSACW.2013.124},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/compsac/SouagSWM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/i3e/KalloniatisMMG13,
  author       = {Christos Kalloniatis and
                  Vassilis Manousakis and
                  Haralambos Mouratidis and
                  Stefanos Gritzalis},
  editor       = {Christos Douligeris and
                  Nineta Polemi and
                  Athanasios Karantjias and
                  Winfried Lamersdorf},
  title        = {Migrating into the Cloud: Identifying the Major Security and Privacy
                  Concerns},
  booktitle    = {Collaborative, Trusted and Privacy-Aware e/m-Services - 12th {IFIP}
                  {WG} 6.11 Conference on e-Business, e-Services, and e-Society, {I3E}
                  2013, Athens, Greece, April 25-26, 2013. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {399},
  pages        = {73--87},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-37437-1\_7},
  doi          = {10.1007/978-3-642-37437-1\_7},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/i3e/KalloniatisMMG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/PavlidisMKIG13,
  author       = {Michalis Pavlidis and
                  Haralambos Mouratidis and
                  Christos Kalloniatis and
                  Shareeful Islam and
                  Stefanos Gritzalis},
  editor       = {Steven Furnell and
                  Costas Lambrinoudakis and
                  Javier L{\'{o}}pez},
  title        = {Trustworthy Selection of Cloud Providers Based on Security and Privacy
                  Requirements: Justifying Trust Assumptions},
  booktitle    = {Trust, Privacy, and Security in Digital Business - 10th International
                  Conference, TrustBus 2013, Prague, Czech Republic, August 28-29, 2013.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8058},
  pages        = {185--198},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40343-9\_16},
  doi          = {10.1007/978-3-642-40343-9\_16},
  timestamp    = {Mon, 03 Jan 2022 22:15:14 +0100},
  biburl       = {https://dblp.org/rec/conf/trustbus/PavlidisMKIG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/PavlidisMI12,
  author       = {Michalis Pavlidis and
                  Haralambos Mouratidis and
                  Shareeful Islam},
  title        = {Modelling Security Using Trust Based Concepts},
  journal      = {Int. J. Secur. Softw. Eng.},
  volume       = {3},
  number       = {2},
  pages        = {36--53},
  year         = {2012},
  url          = {https://doi.org/10.4018/jsse.2012040102},
  doi          = {10.4018/JSSE.2012040102},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsse/PavlidisMI12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/IslamMKHZ12,
  author       = {Shareeful Islam and
                  Haralambos Mouratidis and
                  Christos Kalloniatis and
                  Aleksandar Hudic and
                  Lorenz Zechner},
  title        = {Model Based Process to Support Security and Privacy Requirements Engineering},
  journal      = {Int. J. Secur. Softw. Eng.},
  volume       = {3},
  number       = {3},
  pages        = {1--22},
  year         = {2012},
  url          = {https://doi.org/10.4018/jsse.2012070101},
  doi          = {10.4018/JSSE.2012070101},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsse/IslamMKHZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/is/Mouratidis12,
  author       = {Haris Mouratidis},
  title        = {Preface},
  journal      = {Inf. Syst.},
  volume       = {37},
  number       = {8},
  pages        = {713},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.is.2012.05.013},
  doi          = {10.1016/J.IS.2012.05.013},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/is/Mouratidis12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/OuedraogoKMD12,
  author       = {Moussa Ouedraogo and
                  Djamel Khadraoui and
                  Haralambos Mouratidis and
                  Eric Dubois},
  title        = {Appraisal and reporting of security assurance at operational systems
                  level},
  journal      = {J. Syst. Softw.},
  volume       = {85},
  number       = {1},
  pages        = {193--208},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.jss.2011.08.013},
  doi          = {10.1016/J.JSS.2011.08.013},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jss/OuedraogoKMD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jucs/MatuleviciusMMDH12,
  author       = {Raimundas Matulevicius and
                  Haralambos Mouratidis and
                  Nicolas Mayer and
                  Eric Dubois and
                  Patrick Heymans},
  title        = {Syntactic and Semantic Extensions to Secure Tropos to Support Security
                  Risk Management},
  journal      = {J. Univers. Comput. Sci.},
  volume       = {18},
  number       = {6},
  pages        = {816--844},
  year         = {2012},
  url          = {https://doi.org/10.3217/jucs-018-06-0816},
  doi          = {10.3217/JUCS-018-06-0816},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jucs/MatuleviciusMMDH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jucs/MouratidisKIHG12,
  author       = {Haralambos Mouratidis and
                  Christos Kalloniatis and
                  Shareeful Islam and
                  Marc{-}Philippe Huget and
                  Stefanos Gritzalis},
  title        = {Aligning Security and Privacy to Support the Development of Secure
                  Information Systems},
  journal      = {J. Univers. Comput. Sci.},
  volume       = {18},
  number       = {12},
  pages        = {1608--1627},
  year         = {2012},
  url          = {https://doi.org/10.3217/jucs-018-12-1608},
  doi          = {10.3217/JUCS-018-12-1608},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jucs/MouratidisKIHG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/caise/AhmedMM12,
  author       = {Naved Ahmed and
                  Raimundas Matulevicius and
                  Haralambos Mouratidis},
  editor       = {Marite Kirikova and
                  Janis Stirna},
  title        = {A Model Transformation from Misuse Cases to Secure Tropos},
  booktitle    = {Proceedings of the CAiSE'12 Forum at the 24\({}^{\mbox{th}}\) International
                  Conference on Advanced Information Systems Engineering (CAiSE), Gdansk,
                  Poland, June 28, 2012},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {855},
  pages        = {7--14},
  publisher    = {CEUR-WS.org},
  year         = {2012},
  url          = {https://ceur-ws.org/Vol-855/paper1.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:33 +0100},
  biburl       = {https://dblp.org/rec/conf/caise/AhmedMM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/caise/ZarrabiPMIP12,
  author       = {Fatemeh Zarrabi and
                  Michalis Pavlidis and
                  Haralambos Mouratidis and
                  Shareeful Islam and
                  David Preston},
  editor       = {Marko Bajec and
                  Johann Eder},
  title        = {A Meta-model for Legal Compliance and Trustworthiness of Information
                  Systems},
  booktitle    = {Advanced Information Systems Engineering Workshops - CAiSE 2012 International
                  Workshops, Gda{\'{n}}sk, Poland, June 25-26, 2012. Proceedings},
  series       = {Lecture Notes in Business Information Processing},
  volume       = {112},
  pages        = {46--60},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31069-0\_4},
  doi          = {10.1007/978-3-642-31069-0\_4},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/caise/ZarrabiPMIP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rcis/JorshariMI12,
  author       = {Fatemeh Zarrabi Jorshari and
                  Haralambos Mouratidis and
                  Shareeful Islam},
  editor       = {Colette Rolland and
                  Jaelson Castro and
                  Oscar Pastor},
  title        = {Extracting security requirements from relevant laws and regulations},
  booktitle    = {Sixth International Conference on Research Challenges in Information
                  Science, {RCIS} 2012, Valencia, Spain, May 16-18 2012},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/RCIS.2012.6240443},
  doi          = {10.1109/RCIS.2012.6240443},
  timestamp    = {Mon, 18 Jan 2021 08:56:35 +0100},
  biburl       = {https://dblp.org/rec/conf/rcis/JorshariMI12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rcis/PavlidisMIK12,
  author       = {Michalis Pavlidis and
                  Haralambos Mouratidis and
                  Shareeful Islam and
                  Paul Kearney},
  editor       = {Colette Rolland and
                  Jaelson Castro and
                  Oscar Pastor},
  title        = {Dealing with trust and control: {A} meta-model for trustworthy information
                  systems development},
  booktitle    = {Sixth International Conference on Research Challenges in Information
                  Science, {RCIS} 2012, Valencia, Spain, May 16-18 2012},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/RCIS.2012.6240441},
  doi          = {10.1109/RCIS.2012.6240441},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/rcis/PavlidisMIK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijhcr/OuedraogoMDK11,
  author       = {Moussa Ouedraogo and
                  Haralambos Mouratidis and
                  Eric Dubois and
                  Djamel Khadraoui},
  title        = {Security Assurance Evaluation and {IT} Systems' Context of Use Security
                  Criticality},
  journal      = {Int. J. Handheld Comput. Res.},
  volume       = {2},
  number       = {4},
  pages        = {59--81},
  year         = {2011},
  url          = {https://doi.org/10.4018/jhcr.2011100104},
  doi          = {10.4018/JHCR.2011100104},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijhcr/OuedraogoMDK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/MouratidisK11,
  author       = {Haralambos Mouratidis and
                  Miao Kang},
  title        = {Secure by Design: Developing Secure Software Systems from the Ground
                  Up},
  journal      = {Int. J. Secur. Softw. Eng.},
  volume       = {2},
  number       = {3},
  pages        = {23--41},
  year         = {2011},
  url          = {https://doi.org/10.4018/jsse.2011070102},
  doi          = {10.4018/JSSE.2011070102},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsse/MouratidisK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsw/Mouratidis11,
  author       = {Haralambos Mouratidis},
  title        = {Secure Software Systems Engineering: The Secure Tropos Approach (Invited
                  Paper)},
  journal      = {J. Softw.},
  volume       = {6},
  number       = {3},
  pages        = {331--339},
  year         = {2011},
  url          = {https://doi.org/10.4304/jsw.6.3.331-339},
  doi          = {10.4304/JSW.6.3.331-339},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsw/Mouratidis11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sosym/IslamMJ11,
  author       = {Shareeful Islam and
                  Haralambos Mouratidis and
                  Jan J{\"{u}}rjens},
  title        = {A framework to support alignment of secure software engineering with
                  legal regulations},
  journal      = {Softw. Syst. Model.},
  volume       = {10},
  number       = {3},
  pages        = {369--394},
  year         = {2011},
  url          = {https://doi.org/10.1007/s10270-010-0154-z},
  doi          = {10.1007/S10270-010-0154-Z},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sosym/IslamMJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/OuedraogoMHBKDP11,
  author       = {Moussa Ouedraogo and
                  Haralambos Mouratidis and
                  Artur Hecker and
                  C{\'{e}}dric Bonhomme and
                  Djamel Khadraoui and
                  Eric Dubois and
                  David Preston},
  title        = {A new approach to evaluating security assurance},
  booktitle    = {7th International Conference on Information Assurance and Security,
                  {IAS} 2011, Melacca, Malaysia, December 5-8, 2011},
  pages        = {215--221},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIAS.2011.6122822},
  doi          = {10.1109/ISIAS.2011.6122822},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/OuedraogoMHBKDP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/caise/PavlidisIM11,
  author       = {Michalis Pavlidis and
                  Shareeful Islam and
                  Haralambos Mouratidis},
  editor       = {Selmin Nurcan},
  title        = {A {CASE} Tool to Support Automated Modelling and Analysis of Security
                  Requirements, Based on Secure Tropos},
  booktitle    = {{IS} Olympics: Information Systems in a Diverse World - CAiSE Forum
                  2011, London, UK, June 20-24, 2011, Selected Extended Papers},
  series       = {Lecture Notes in Business Information Processing},
  volume       = {107},
  pages        = {95--109},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29749-6\_7},
  doi          = {10.1007/978-3-642-29749-6\_7},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/caise/PavlidisIM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/KomotoTMYF11,
  author       = {Takafumi Komoto and
                  Kenji Taguchi and
                  Haralambos Mouratidis and
                  Nobukazu Yoshioka and
                  Kokichi Futatsugi},
  title        = {A Modelling Framework to Support Internal Control},
  booktitle    = {Fifth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2011, 27-29 June, 2011, Jeju Island,
                  Korea - Companion Volume},
  pages        = {187--193},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SSIRI-C.2011.33},
  doi          = {10.1109/SSIRI-C.2011.33},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/KomotoTMYF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/mit/11/MouratidisC11,
  author       = {Haralambos Mouratidis and
                  Paolo Ciorgini},
  editor       = {Eric S. K. Yu and
                  Paolo Giorgini and
                  Neil A. M. Maiden and
                  John Mylopoulos},
  title        = {Secure Tropos: Extending /* and Tropos to Model Security Throughout
                  the Development Process},
  booktitle    = {Social Modeling for Requirements Engineering},
  series       = {Cooperative information systems},
  pages        = {363--402},
  publisher    = {{MIT} Press},
  year         = {2011},
  timestamp    = {Fri, 22 May 2020 12:08:24 +0200},
  biburl       = {https://dblp.org/rec/books/mit/11/MouratidisC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/caise/2011,
  editor       = {Haralambos Mouratidis and
                  Colette Rolland},
  title        = {Advanced Information Systems Engineering - 23rd International Conference,
                  CAiSE 2011, London, UK, June 20-24, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6741},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21640-4},
  doi          = {10.1007/978-3-642-21640-4},
  isbn         = {978-3-642-21639-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/caise/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijis/MouratidisJ10,
  author       = {Haralambos Mouratidis and
                  Jan J{\"{u}}rjens},
  title        = {From goal-driven security requirements engineering to secure design},
  journal      = {Int. J. Intell. Syst.},
  volume       = {25},
  number       = {8},
  pages        = {813--840},
  year         = {2010},
  url          = {https://doi.org/10.1002/int.20432},
  doi          = {10.1002/INT.20432},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijis/MouratidisJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jot/LowMH10,
  author       = {Graham Low and
                  Haralambos Mouratidis and
                  Brian Henderson{-}Sellers},
  title        = {Using a Situational Method Engineering Approach to Identify Reusable
                  Method Fragments from the Secure {TROPOS} Methodology},
  journal      = {J. Object Technol.},
  volume       = {9},
  number       = {4},
  pages        = {93--125},
  year         = {2010},
  url          = {https://doi.org/10.5381/jot.2010.9.4.a5},
  doi          = {10.5381/JOT.2010.9.4.A5},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jot/LowMH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jtaer/MouratidisC10,
  author       = {Haralambos Mouratidis and
                  Piotr Cofta},
  title        = {Practitioner's challenges in designing trust into online systems},
  journal      = {J. Theor. Appl. Electron. Commer. Res.},
  volume       = {5},
  number       = {3},
  pages        = {65--77},
  year         = {2010},
  url          = {https://doi.org/10.4067/s0718-18762010000300007},
  doi          = {10.4067/S0718-18762010000300007},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jtaer/MouratidisC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/re/DuboisM10,
  author       = {Eric Dubois and
                  Haralambos Mouratidis},
  title        = {Guest editorial: security requirements engineering: past, present
                  and future},
  journal      = {Requir. Eng.},
  volume       = {15},
  number       = {1},
  pages        = {1--5},
  year         = {2010},
  url          = {https://doi.org/10.1007/s00766-009-0094-8},
  doi          = {10.1007/S00766-009-0094-8},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/re/DuboisM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wias/MouratidisKGF10,
  author       = {Haralambos Mouratidis and
                  Manuel Kolp and
                  Paolo Giorgini and
                  St{\'{e}}phane Faulkner},
  title        = {An architectural description language for secure Multi-Agent Systems},
  journal      = {Web Intell. Agent Syst.},
  volume       = {8},
  number       = {1},
  pages        = {99--122},
  year         = {2010},
  url          = {https://doi.org/10.3233/WIA-2010-0182},
  doi          = {10.3233/WIA-2010-0182},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wias/MouratidisKGF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/refsq/IslamMW10,
  author       = {Shareeful Islam and
                  Haralambos Mouratidis and
                  Stefan Wagner},
  editor       = {Roel J. Wieringa and
                  Anne Persson},
  title        = {Towards a Framework to Elicit and Manage Security and Privacy Requirements
                  from Laws and Regulations},
  booktitle    = {Requirements Engineering: Foundation for Software Quality, 16th International
                  Working Conference, {REFSQ} 2010, Essen, Germany, June 30 - July 2,
                  2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6182},
  pages        = {255--261},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14192-8\_23},
  doi          = {10.1007/978-3-642-14192-8\_23},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/refsq/IslamMW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sersc-isa/OuedraogoMDK10,
  author       = {Moussa Ouedraogo and
                  Haralambos Mouratidis and
                  Eric Dubois and
                  Djamel Khadraoui},
  editor       = {Tai{-}Hoon Kim and
                  Hojjat Adeli},
  title        = {Information Systems Security Criticality and Assurance Evaluation},
  booktitle    = {Advances in Computer Science and Information Technology, {AST/UCMA/ISA/ACN}
                  2010 Conferences, Miyazaki, Japan, June 23-25, 2010. Joint Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6059},
  pages        = {38--54},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13577-4\_4},
  doi          = {10.1007/978-3-642-13577-4\_4},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sersc-isa/OuedraogoMDK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/OuedraogoMKD10,
  author       = {Moussa Ouedraogo and
                  Haralambos Mouratidis and
                  Djamel Khadraoui and
                  Eric Dubois},
  title        = {An Agent-Based System to Support Assurance of Security Requirements},
  booktitle    = {Fourth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2010, Singapore, June 9-11, 2010},
  pages        = {78--87},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SSIRI.2010.32},
  doi          = {10.1109/SSIRI.2010.32},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/OuedraogoMKD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/infsof/BeydounLMH09,
  author       = {Ghassan Beydoun and
                  Graham Low and
                  Haralambos Mouratidis and
                  Brian Henderson{-}Sellers},
  title        = {A security-aware metamodel for multi-agent systems {(MAS)}},
  journal      = {Inf. Softw. Technol.},
  volume       = {51},
  number       = {5},
  pages        = {832--845},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.infsof.2008.05.003},
  doi          = {10.1016/J.INFSOF.2008.05.003},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/infsof/BeydounLMH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/BeydounLHMGPG09,
  author       = {Ghassan Beydoun and
                  Graham C. Low and
                  Brian Henderson{-}Sellers and
                  Haralambos Mouratidis and
                  Jorge J. G{\'{o}}mez{-}Sanz and
                  Juan Pav{\'{o}}n and
                  Cesar Gonzalez{-}Perez},
  title        = {{FAML:} {A} Generic Metamodel for {MAS} Development},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {35},
  number       = {6},
  pages        = {841--863},
  year         = {2009},
  url          = {https://doi.org/10.1109/TSE.2009.34},
  doi          = {10.1109/TSE.2009.34},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tse/BeydounLHMGPG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/caise/MouratidisSJ09,
  author       = {Haralambos Mouratidis and
                  Ali Sunyaev and
                  Jan J{\"{u}}rjens},
  editor       = {Pascal van Eck and
                  Jaap Gordijn and
                  Roel J. Wieringa},
  title        = {Secure Information Systems Engineering: Experiences and Lessons Learned
                  from Two Health Care Projects},
  booktitle    = {Advanced Information Systems Engineering, 21st International Conference,
                  CAiSE 2009, Amsterdam, The Netherlands, June 8-12, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5565},
  pages        = {231--245},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02144-2\_21},
  doi          = {10.1007/978-3-642-02144-2\_21},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/caise/MouratidisSJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsr/OuedraogoMKD09,
  author       = {Moussa Ouedraogo and
                  Haralambos Mouratidis and
                  Djamel Khadraoui and
                  Eric Dubois},
  title        = {A Risk Based Approach for Security Assurance Evaluation of {IT} Systems},
  booktitle    = {7th Annual Conference on Communication Networks and Services Research,
                  {CNSR} 2009, 11-13 May 2009, Moncton, New Brunswick, Canada},
  pages        = {428--430},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CNSR.2009.74},
  doi          = {10.1109/CNSR.2009.74},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cnsr/OuedraogoMKD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/MouratidisG09,
  author       = {Haralambos Mouratidis and
                  Paolo Giorgini},
  editor       = {Mike Barley and
                  Haralambos Mouratidis and
                  Amy Unruh and
                  Diana F. Spears and
                  Paul Scerri and
                  Fabio Massacci},
  title        = {Enhancing Secure Tropos to Effectively Deal with Security Requirements
                  in the Development of Multiagent Systems},
  booktitle    = {Safety and Security in Multiagent Systems - Research Results from
                  2004-2006},
  series       = {Lecture Notes in Computer Science},
  volume       = {4324},
  pages        = {8--26},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04879-1\_2},
  doi          = {10.1007/978-3-642-04879-1\_2},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lncs/MouratidisG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eann/2009,
  editor       = {Dominic Palmer{-}Brown and
                  Chrisina Draganova and
                  Elias Pimenidis and
                  Haris Mouratidis},
  title        = {Engineering Applications of Neural Networks - 11th International Conference,
                  {EANN} 2009, London, UK, August 27-29, 2009. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {43},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03969-0},
  doi          = {10.1007/978-3-642-03969-0},
  isbn         = {978-3-642-03968-3},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eann/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/lncs/4324,
  editor       = {Mike Barley and
                  Haralambos Mouratidis and
                  Amy Unruh and
                  Diana F. Spears and
                  Paul Scerri and
                  Fabio Massacci},
  title        = {Safety and Security in Multiagent Systems - Research Results from
                  2004-2006},
  series       = {Lecture Notes in Computer Science},
  volume       = {4324},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04879-1},
  doi          = {10.1007/978-3-642-04879-1},
  isbn         = {978-3-642-04878-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lncs/4324.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/MouratidisJN08,
  author       = {Haralambos Mouratidis and
                  Hamid Jahankhani and
                  Mathews Z. Nkhoma},
  title        = {Management versus security specialists: an empirical study on security
                  related perceptions},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {16},
  number       = {2},
  pages        = {187--205},
  year         = {2008},
  url          = {https://doi.org/10.1108/09685220810879645},
  doi          = {10.1108/09685220810879645},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/MouratidisJN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/caise/MatuleviciusMMDHG08,
  author       = {Raimundas Matulevicius and
                  Nicolas Mayer and
                  Haralambos Mouratidis and
                  Eric Dubois and
                  Patrick Heymans and
                  Nicolas Genon},
  editor       = {Zohra Bellahsene and
                  Michel L{\'{e}}onard},
  title        = {Adapting Secure Tropos for Security Risk Management in the Early Phases
                  of Information Systems Development},
  booktitle    = {Advanced Information Systems Engineering, 20th International Conference,
                  CAiSE 2008, Montpellier, France, June 16-20, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5074},
  pages        = {541--555},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-69534-9\_40},
  doi          = {10.1007/978-3-540-69534-9\_40},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/caise/MatuleviciusMMDHG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isdevel/BimrahMP08,
  author       = {Kamaljit Kaur Bimrah and
                  Haralambos Mouratidis and
                  David Preston},
  editor       = {George Angelos Papadopoulos and
                  Wita Wojtkowski and
                  W. Gregory Wojtkowski and
                  Stanislaw Wrycza and
                  Joze Zupancic},
  title        = {A Language for Modelling Trust in Information Systems},
  booktitle    = {Information Systems Development, Towards a Service Provision Society
                  [Proceedings of {ISD} 2008, University of Cyprus, Paphos, Cyprus.
                  August 25-27, 2008]},
  pages        = {599--608},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/b137171\_62},
  doi          = {10.1007/B137171\_62},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isdevel/BimrahMP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/models/Mouratidis08,
  author       = {Haralambos Mouratidis},
  editor       = {Jon Whittle and
                  Jan J{\"{u}}rjens and
                  Bashar Nuseibeh and
                  Glen Dobson},
  title        = {Curriculum for Modeling Security: Experiences and Lessons Learned},
  booktitle    = {Proceedings of the Workshop on Modeling Security {(} {MODSEC08} {)}
                  held as part of the 2008 International Conference on Model Driven
                  Engineering Languages and Systems {(} {MODELS} {)} Toulouse, France,
                  September 28, 2008},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {413},
  publisher    = {CEUR-WS.org},
  year         = {2008},
  url          = {https://ceur-ws.org/Vol-413/paper04.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:21 +0100},
  biburl       = {https://dblp.org/rec/conf/models/Mouratidis08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ntms/OuedraogoKRDM08,
  author       = {Moussa Ouedraogo and
                  Djamel Khadraoui and
                  Beno{\^{\i}}t De R{\'{e}}mont and
                  Eric Dubois and
                  Haralambos Mouratidis},
  editor       = {Akshai Aggarwal and
                  Mohamad Badra and
                  Fabio Massacci},
  title        = {Deployment of a Security Assurance Monitoring Framework for Telecommunication
                  Service Infrastructures on a VoIP Service},
  booktitle    = {{NTMS} 2008, 2nd International Conference on New Technologies, Mobility
                  and Security, November 5-7, 2008, Tangier, Morocco},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/NTMS.2008.ECP.38},
  doi          = {10.1109/NTMS.2008.ECP.38},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ntms/OuedraogoKRDM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/WeissM08,
  author       = {Michael Weiss and
                  Haralambos Mouratidis},
  title        = {Selecting Security Patterns that Fulfill Security Requirements},
  booktitle    = {16th {IEEE} International Requirements Engineering Conference, {RE}
                  2008, 8-12 September 2008, Barcelona, Catalunya, Spain},
  pages        = {169--172},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/RE.2008.32},
  doi          = {10.1109/RE.2008.32},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/re/WeissM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/aois/2006,
  editor       = {Manuel Kolp and
                  Brian Henderson{-}Sellers and
                  Haralambos Mouratidis and
                  Alessandro Garcia and
                  Aditya Ghose and
                  Paolo Bresciani},
  title        = {Agent-Oriented Information Systems IV, 8th International Bi-Conference
                  Workshop, {AOIS} 2006, Hakodate, Japan, May 9, 2006 and Luxembourg,
                  Luxembourg, June 6, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4898},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-77990-2},
  doi          = {10.1007/978-3-540-77990-2},
  isbn         = {978-3-540-77989-6},
  timestamp    = {Fri, 06 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aois/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/Mouratidis07,
  author       = {Haralambos Mouratidis},
  title        = {Secure information systems engineering: a manifesto},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {1},
  number       = {1},
  pages        = {27--41},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJESDF.2007.013590},
  doi          = {10.1504/IJESDF.2007.013590},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/Mouratidis07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisp/JahankhaniFNM07,
  author       = {Hamid Jahankhani and
                  Shantha Fernando and
                  Mathews Z. Nkhoma and
                  Haralambos Mouratidis},
  title        = {Information Systems Security: Cases of Network Administrator Threats},
  journal      = {Int. J. Inf. Secur. Priv.},
  volume       = {1},
  number       = {3},
  pages        = {13--25},
  year         = {2007},
  url          = {https://doi.org/10.4018/jisp.2007070102},
  doi          = {10.4018/JISP.2007070102},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisp/JahankhaniFNM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijseke/MouratidisG07,
  author       = {Haralambos Mouratidis and
                  Paolo Giorgini},
  title        = {Secure Tropos: a Security-Oriented Extension of the Tropos Methodology},
  journal      = {Int. J. Softw. Eng. Knowl. Eng.},
  volume       = {17},
  number       = {2},
  pages        = {285--309},
  year         = {2007},
  url          = {https://doi.org/10.1142/S0218194007003240},
  doi          = {10.1142/S0218194007003240},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijseke/MouratidisG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/is/MouratidisG07,
  author       = {Haralambos Mouratidis and
                  Paolo Giorgini},
  title        = {Security Attack Testing {(SAT)} - testing the security of information
                  systems at design time},
  journal      = {Inf. Syst.},
  volume       = {32},
  number       = {8},
  pages        = {1166--1183},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.is.2007.03.002},
  doi          = {10.1016/J.IS.2007.03.002},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/is/MouratidisG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/emmsad/BeydounLMH07,
  author       = {Ghassan Beydoun and
                  Graham Low and
                  Haris Mouratidis and
                  Brian Henderson{-}Sellers},
  editor       = {Erik Proper and
                  Terry A. Halpin and
                  John Krogstie},
  title        = {Modelling MAS-Specific Security Features},
  booktitle    = {Proceedings of the 12th International Workshop on Exploring Modeling
                  Methods for Systems Analysis and Design, {EMMSAD} 2008, held in conjunction
                  with the 19th Conference on Advanced Information Systems (CAiSE 2007),
                  Trondheim, Norway, 11-15 June, 2007},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {365},
  pages        = {173--182},
  publisher    = {CEUR-WS.org},
  year         = {2007},
  url          = {https://ceur-ws.org/Vol-365/paper18.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:23:10 +0100},
  biburl       = {https://dblp.org/rec/conf/emmsad/BeydounLMH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iat/Al-ZakwaniBM07,
  author       = {Abdullah Al{-}Zakwani and
                  Allan J. Brimicombe and
                  Haralambos Mouratidis},
  title        = {An Agent-Based System to Support Geo-Information Analysis},
  booktitle    = {Proceedings of the 2007 {IEEE/WIC/ACM} International Conference on
                  Intelligent Agent Technology, Silicon Valley, CA, USA, November 2-5,
                  2007},
  pages        = {269--272},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/IAT.2007.13},
  doi          = {10.1109/IAT.2007.13},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iat/Al-ZakwaniBM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isdevel/BimrahMP07,
  author       = {Kamaljit Kaur Bimrah and
                  Haralambos Mouratidis and
                  David Preston},
  editor       = {Chris Barry and
                  Michael Lang and
                  Wita Wojtkowski and
                  Kieran Conboy and
                  W. Gregory Wojtkowski},
  title        = {Trust Ontology for Information Systems Development},
  booktitle    = {Information Systems Development, Challenges in Practice, Theory, and
                  Education Volume 2 [Proceedings of {ISD} 2007, National University
                  of Ireland, Galway, Ireland. August 29-31, 2007]},
  pages        = {767--779},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-78578-3\_14},
  doi          = {10.1007/978-0-387-78578-3\_14},
  timestamp    = {Sat, 26 Aug 2017 16:52:21 +0200},
  biburl       = {https://dblp.org/rec/conf/isdevel/BimrahMP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/otm/BimrahMP07,
  author       = {Kamaljit Kaur Bimrah and
                  Haralambos Mouratidis and
                  David Preston},
  editor       = {Robert Meersman and
                  Zahir Tari and
                  Pilar Herrero},
  title        = {Information Systems Development: {A} Trust Ontology},
  booktitle    = {On the Move to Meaningful Internet Systems 2007: {OTM} 2007 Workshops,
                  {OTM} Confederated International Workshops and Posters, AWeSOMe, CAMS,
                  {OTM} Academy Doctoral Consortium, MONET, OnToContent, ORM, PerSys,
                  PPN, RDDS, SSWS, and {SWWS} 2007, Vilamoura, Portugal, November 25-30,
                  2007, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4805},
  pages        = {25--26},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76888-3\_13},
  doi          = {10.1007/978-3-540-76888-3\_13},
  timestamp    = {Thu, 14 Oct 2021 10:28:28 +0200},
  biburl       = {https://dblp.org/rec/conf/otm/BimrahMP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijseke/MouratidisWG06,
  author       = {Haralambos Mouratidis and
                  Michael Weiss and
                  Paolo Giorgini},
  title        = {Modeling Secure Systems Using an Agent-oriented Approach and Security
                  Patterns},
  journal      = {Int. J. Softw. Eng. Knowl. Eng.},
  volume       = {16},
  number       = {3},
  pages        = {471},
  year         = {2006},
  url          = {https://doi.org/10.1142/S0218194006002823},
  doi          = {10.1142/S0218194006002823},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijseke/MouratidisWG06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/caise/MouratidisJF06,
  author       = {Haralambos Mouratidis and
                  Jan J{\"{u}}rjens and
                  Jorge Fox},
  editor       = {Eric Dubois and
                  Klaus Pohl},
  title        = {Towards a Comprehensive Framework for Secure Systems Development},
  booktitle    = {Advanced Information Systems Engineering, 18th International Conference,
                  CAiSE 2006, Luxembourg, Luxembourg, June 5-9, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4001},
  pages        = {48--62},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11767138\_5},
  doi          = {10.1007/11767138\_5},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/caise/MouratidisJF06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iat/DehousseLFKM06,
  author       = {St{\'{e}}phane Dehousse and
                  Lin Liu and
                  St{\'{e}}phane Faulkner and
                  Manuel Kolp and
                  Haralambos Mouratidis},
  title        = {Modeling Delegation through an i*-based Approach},
  booktitle    = {Proceedings of the 2006 {IEEE/WIC/ACM} International Conference on
                  Intelligent Agent Technology, Hong Kong, China, 18-22 December 2006},
  pages        = {393--397},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/IAT.2006.89},
  doi          = {10.1109/IAT.2006.89},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iat/DehousseLFKM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/selmas/DehousseFMGK06,
  author       = {St{\'{e}}phane Dehousse and
                  St{\'{e}}phane Faulkner and
                  Haralambos Mouratidis and
                  Paolo Giorgini and
                  Manuel Kolp},
  editor       = {Ricardo Choren and
                  Alessandro F. Garcia and
                  Holger Giese and
                  Ho{-}fung Leung and
                  Carlos Jos{\'{e}} Pereira de Lucena and
                  Alexander B. Romanovsky},
  title        = {Reasoning about willingness in networks of agents},
  booktitle    = {Proceedings of the 2006 international workshop on Software engineering
                  for large-scale multi-agent systems, {SELMAS} '06, Shanghai, China,
                  May 22-23, 2006},
  pages        = {91--98},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1138063.1138080},
  doi          = {10.1145/1138063.1138080},
  timestamp    = {Thu, 18 Aug 2022 13:33:52 +0200},
  biburl       = {https://dblp.org/rec/conf/selmas/DehousseFMGK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/selmas/DehousseFMKG06,
  author       = {St{\'{e}}phane Dehousse and
                  St{\'{e}}phane Faulkner and
                  Haralambos Mouratidis and
                  Manuel Kolp and
                  Paolo Giorgini},
  editor       = {Ricardo Choren and
                  Alessandro F. Garcia and
                  Holger Giese and
                  Ho{-}fung Leung and
                  Carlos Jos{\'{e}} Pereira de Lucena and
                  Alexander B. Romanovsky},
  title        = {Reasoning About Willingness in Networks of Agents},
  booktitle    = {Software Engineering for Multi-Agent Systems V, Research Issues and
                  Practical Applications [the book is a result of {SELMAS} 2006]},
  series       = {Lecture Notes in Computer Science},
  volume       = {4408},
  pages        = {117--131},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-73131-3\_7},
  doi          = {10.1007/978-3-540-73131-3\_7},
  timestamp    = {Mon, 20 Dec 2021 09:52:14 +0100},
  biburl       = {https://dblp.org/rec/conf/selmas/DehousseFMKG06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Mouratidis05,
  author       = {Haralambos Mouratidis},
  title        = {Safety and Security in Multiagent Systems: Report on the 2nd {SASEMAS}
                  workshop (SASEMAS'05)},
  journal      = {Comput. Secur.},
  volume       = {24},
  number       = {8},
  pages        = {614--617},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.cose.2005.08.001},
  doi          = {10.1016/J.COSE.2005.08.001},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Mouratidis05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/is/MouratidisGM05,
  author       = {Haralambos Mouratidis and
                  Paolo Giorgini and
                  Gordon A. Manson},
  title        = {When security meets software engineering: a case of modelling secure
                  information systems},
  journal      = {Inf. Syst.},
  volume       = {30},
  number       = {8},
  pages        = {609--629},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.is.2004.06.002},
  doi          = {10.1016/J.IS.2004.06.002},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/is/MouratidisGM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atal/MouratidisKFG05,
  author       = {Haralambos Mouratidis and
                  Manuel Kolp and
                  St{\'{e}}phane Faulkner and
                  Paolo Giorgini},
  editor       = {Frank Dignum and
                  Virginia Dignum and
                  Sven Koenig and
                  Sarit Kraus and
                  Munindar P. Singh and
                  Michael J. Wooldridge},
  title        = {A secure architectural description language for agent systems},
  booktitle    = {4th International Joint Conference on Autonomous Agents and Multiagent
                  Systems {(AAMAS} 2005), July 25-29, 2005, Utrecht, The Netherlands},
  pages        = {578--585},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1082473.1082561},
  doi          = {10.1145/1082473.1082561},
  timestamp    = {Fri, 26 Apr 2019 14:26:42 +0200},
  biburl       = {https://dblp.org/rec/conf/atal/MouratidisKFG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/er/MouratidisWG05,
  author       = {Haralambos Mouratidis and
                  Michael Weiss and
                  Paolo Giorgini},
  editor       = {Lois M. L. Delcambre and
                  Christian Kop and
                  Heinrich C. Mayr and
                  John Mylopoulos and
                  Oscar Pastor},
  title        = {Security Patterns Meet Agent Oriented Software Engineering: {A} Complementary
                  Solution for Developing Secure Information Systems},
  booktitle    = {Conceptual Modeling - {ER} 2005, 24th International Conference on
                  Conceptual Modeling, Klagenfurt, Austria, October 24-28, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3716},
  pages        = {225--240},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11568322\_15},
  doi          = {10.1007/11568322\_15},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/er/MouratidisWG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iat/FaulknerDKMG05,
  author       = {St{\'{e}}phane Faulkner and
                  St{\'{e}}phane Dehousse and
                  Manuel Kolp and
                  Haralambos Mouratidis and
                  Paolo Giorgini},
  editor       = {Andrzej Skowron and
                  Jean{-}Paul A. Barth{\`{e}}s and
                  Lakhmi C. Jain and
                  Ron Sun and
                  Pierre Morizet{-}Mahoudeaux and
                  Jiming Liu and
                  Ning Zhong},
  title        = {Delegation Mechanisms for Agent Architectural Design},
  booktitle    = {Proceedings of the 2005 {IEEE/WIC/ACM} International Conference on
                  Intelligent Agent Technology, Compiegne, France, September 19-22,
                  2005},
  pages        = {503--507},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/IAT.2005.65},
  doi          = {10.1109/IAT.2005.65},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iat/FaulknerDKMG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/selmas/MouratidisW05,
  author       = {Haralambos Mouratidis and
                  Michael Weiss},
  editor       = {Alessandro F. Garcia and
                  Ricardo Choren and
                  Carlos Jos{\'{e}} Pereira de Lucena and
                  Paolo Giorgini and
                  Tom Holvoet and
                  Alexander B. Romanovsky},
  title        = {Patterns for Modelling Agent Systems with Tropos},
  booktitle    = {Software Engineering for Multi-Agent Systems IV, Research Issues and
                  Practical Applications [the book is a result of {SELMAS} 2005]},
  series       = {Lecture Notes in Computer Science},
  volume       = {3914},
  pages        = {207--223},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11738817\_13},
  doi          = {10.1007/11738817\_13},
  timestamp    = {Mon, 20 Dec 2021 10:29:19 +0100},
  biburl       = {https://dblp.org/rec/conf/selmas/MouratidisW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iceis/MouratidisGM04,
  author       = {Haralambos Mouratidis and
                  Paolo Giorgini and
                  Gordon A. Manson},
  title        = {Using Security Attack Scenarios to Analyse Security During Information
                  Systems Design},
  booktitle    = {{ICEIS} 2004, Proceedings of the 6th International Conference on Enterprise
                  Information Systems, Porto, Portugal, April 14-17, 2004},
  pages        = {10--17},
  year         = {2004},
  timestamp    = {Thu, 02 Feb 2017 12:56:49 +0100},
  biburl       = {https://dblp.org/rec/conf/iceis/MouratidisGM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/hij/MouratidisMP03,
  author       = {Haralambos Mouratidis and
                  Gordon A. Manson and
                  Ian R. Philp},
  title        = {Analysis and Design of the eSAP: An Integrated Health and Social Care
                  Information System},
  journal      = {Health Informatics J.},
  volume       = {9},
  number       = {2},
  pages        = {89--92},
  year         = {2003},
  url          = {https://doi.org/10.1177/1460458203009002003},
  doi          = {10.1177/1460458203009002003},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/hij/MouratidisMP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/hij/MouratidisMP03a,
  author       = {Haralambos Mouratidis and
                  Gordon A. Manson and
                  Ian R. Philp},
  title        = {A Novel Agent-Based System to Support the Single Assessment Process
                  of Older People},
  journal      = {Health Informatics J.},
  volume       = {9},
  number       = {3},
  pages        = {149--162},
  year         = {2003},
  url          = {https://doi.org/10.1177/14604582030093003},
  doi          = {10.1177/14604582030093003},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/hij/MouratidisMP03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aose/PoggiRTOMM03,
  author       = {Agostino Poggi and
                  Giovanni Rimassa and
                  Paola Turci and
                  James Odell and
                  Haralambos Mouratidis and
                  Gordon A. Manson},
  editor       = {Paolo Giorgini and
                  J{\"{o}}rg P. M{\"{u}}ller and
                  James Odell},
  title        = {Modeling Deployment and Mobility Issues in Multiagent Systems Using
                  {AUML}},
  booktitle    = {Agent-Oriented Software Engineering IV, 4th International Workshop,
                  {AOSE} 2003, Melbourne, Australia, July 15, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2935},
  pages        = {69--84},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24620-6\_5},
  doi          = {10.1007/978-3-540-24620-6\_5},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/aose/PoggiRTOMM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atal/MouratidisGM03,
  author       = {Haralambos Mouratidis and
                  Paolo Giorgini and
                  Gordon A. Manson},
  title        = {Modelling secure multiagent systems},
  booktitle    = {The Second International Joint Conference on Autonomous Agents {\&}
                  Multiagent Systems, {AAMAS} 2003, July 14-18, 2003, Melbourne, Victoria,
                  Australia, Proceedings},
  pages        = {859--866},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/860575.860713},
  doi          = {10.1145/860575.860713},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/atal/MouratidisGM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/caise/MouratidisGM03,
  author       = {Haralambos Mouratidis and
                  Paolo Giorgini and
                  Gordon A. Manson},
  editor       = {Johann Eder and
                  Michele Missikoff},
  title        = {Integrating Security and Systems Engineering: Towards the Modelling
                  of Secure Information Systems},
  booktitle    = {Advanced Information Systems Engineering, 15th International Conference,
                  CAiSE 2003, Klagenfurt, Austria, June 16-18, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2681},
  pages        = {63--78},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45017-3\_7},
  doi          = {10.1007/3-540-45017-3\_7},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/caise/MouratidisGM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/europlop/MouratidisGS03,
  author       = {Haralambos Mouratidis and
                  Paolo Giorgini and
                  Markus Schumacher},
  editor       = {Kevlin Henney and
                  Dietmar Sch{\"{u}}tz},
  title        = {A Set of Patterns for Secure Agent Systems},
  booktitle    = {Proceedings of the 8th European Conference on Pattern Languages of
                  Programms (EuroPLoP '2003), Irsee, Germany, June 25-29, 2003},
  pages        = {399--416},
  publisher    = {{UVK} - Universitaetsverlag Konstanz},
  year         = {2003},
  url          = {http://hillside.net/europlop/HillsideEurope/Papers/EuroPLoP2003/2003\_MouratidisEtAl\_ASetOfPatternsForSecureAgentSystems.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/europlop/MouratidisGS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iceis/MouratidisMGG03,
  author       = {Haralambos Mouratidis and
                  Gordon A. Manson and
                  Abdullah Gani and
                  Paolo Giorgini},
  title        = {Analysing Security Requirements of Information Systems Using Tropos},
  booktitle    = {{ICEIS} 2003, Proceedings of the 5th International Conference on Enterprise
                  Information Systems, Angers, France, April 22-26, 2003},
  pages        = {623--626},
  year         = {2003},
  timestamp    = {Thu, 02 Feb 2017 12:57:29 +0100},
  biburl       = {https://dblp.org/rec/conf/iceis/MouratidisMGG03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kes/MouratidisGM03,
  author       = {Haralambos Mouratidis and
                  Paolo Giorgini and
                  Gordon A. Manson},
  editor       = {Vasile Palade and
                  Robert J. Howlett and
                  Lakhmi C. Jain},
  title        = {An Ontology for Modelling Security: The Tropos Approach},
  booktitle    = {Knowledge-Based Intelligent Information and Engineering Systems, 7th
                  International Conference, {KES} 2003, Oxford, UK, September 3-5, 2003,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {2773},
  pages        = {1387--1394},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45224-9\_187},
  doi          = {10.1007/978-3-540-45224-9\_187},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/kes/MouratidisGM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/selmas/BrescianiGMM03,
  author       = {Paolo Bresciani and
                  Paolo Giorgini and
                  Haralambos Mouratidis and
                  Gordon A. Manson},
  editor       = {Carlos Jos{\'{e}} Pereira de Lucena and
                  Alessandro F. Garcia and
                  Alexander B. Romanovsky and
                  Jaelson Castro and
                  Paulo S. C. Alencar},
  title        = {Multi-agent Systems and Security Requirements Analysis},
  booktitle    = {Software Engineering for Multi-Agent Systems II, Research Issues and
                  Practical Applications [the book is a result of {SELMAS} 2003]},
  series       = {Lecture Notes in Computer Science},
  volume       = {2940},
  pages        = {35--48},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24625-1\_3},
  doi          = {10.1007/978-3-540-24625-1\_3},
  timestamp    = {Fri, 06 Nov 2020 10:10:09 +0100},
  biburl       = {https://dblp.org/rec/conf/selmas/BrescianiGMM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aois/MouratidisGPM02,
  author       = {Haralambos Mouratidis and
                  Paolo Giorgini and
                  Ian R. Philp and
                  Gordon A. Manson},
  editor       = {Paolo Giorgini and
                  Yves Lesp{\'{e}}rance and
                  Gerd Wagner and
                  Eric S. K. Yu},
  title        = {Using Tropos Methodology to Model an Integrated Health Assessment
                  System},
  booktitle    = {{AOIS} '02, Agent-Oriented Information Systems, Proceedings of the
                  Fourth International Bi-Conference Workshop on Agent-Oriented Information
                  Systems {(AOIS-2002} at CAiSE*02)},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {57},
  publisher    = {CEUR-WS.org},
  year         = {2002},
  url          = {https://ceur-ws.org/Vol-57/id-16.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:53 +0100},
  biburl       = {https://dblp.org/rec/conf/aois/MouratidisGPM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics