Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Haralambos Mouratidis
@article{DBLP:journals/fcsc/ParraSRSBMF24, author = {Antonio Santos{-}Olmo Parra and Luis Enrique S{\'{a}}nchez and David Garcia Rosado and Manuel A. Serrano and Carlos Blanco and Haralambos Mouratidis and Eduardo Fern{\'{a}}ndez{-}Medina}, title = {Towards an integrated risk analysis security framework according to a systematic analysis of existing proposals}, journal = {Frontiers Comput. Sci.}, volume = {18}, number = {3}, pages = {183808}, year = {2024}, url = {https://doi.org/10.1007/s11704-023-1582-6}, doi = {10.1007/S11704-023-1582-6}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fcsc/ParraSRSBMF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MouratidisIPSI23, author = {Haralambos Mouratidis and Shareeful Islam and Antonio Santos{-}Olmo Parra and Luis Enrique S{\'{a}}nchez and Umar Mukhtar Ismail}, title = {Modelling language for cyber security incident handling for critical infrastructures}, journal = {Comput. Secur.}, volume = {128}, pages = {103139}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103139}, doi = {10.1016/J.COSE.2023.103139}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MouratidisIPSI23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/SanchezPMF23, author = {Luis Enrique S{\'{a}}nchez and Antonio Santos{-}Olmo Parra and Haralambos Mouratidis and Eduardo Fern{\'{a}}ndez{-}Medina}, title = {New Frontiers in Security Risk Management}, journal = {{IT} Prof.}, volume = {25}, number = {3}, pages = {61--67}, year = {2023}, url = {https://doi.org/10.1109/MITP.2023.3251720}, doi = {10.1109/MITP.2023.3251720}, timestamp = {Fri, 23 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itpro/SanchezPMF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsoft/Al-ObeidallahPI23, author = {Mohammed Ghazi Al{-}Obeidallah and Luca Piras and Onyinye Iloanugo and Haralambos Mouratidis and Duaa Alkubaisy and Daniele Dellagiacoma}, editor = {Hans{-}Georg Fill and Francisco Jos{\'{e}} Dom{\'{\i}}nguez Mayo and Marten van Sinderen and Leszek A. Maciaszek}, title = {Goal-Modeling Privacy-by-Design Patterns for Supporting {GDPR} Compliance}, booktitle = {Proceedings of the 18th International Conference on Software Technologies, {ICSOFT} 2023, Rome, Italy, July 10-12, 2023}, pages = {361--368}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012080700003538}, doi = {10.5220/0012080700003538}, timestamp = {Mon, 04 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icsoft/Al-ObeidallahPI23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/rcis/2023, editor = {Selmin Nurcan and Andreas L. Opdahl and Haralambos Mouratidis and Aggeliki Tsohou}, title = {Research Challenges in Information Science: Information Science and the Connected World - 17th International Conference, {RCIS} 2023, Corfu, Greece, May 23-26, 2023, Proceedings}, series = {Lecture Notes in Business Information Processing}, volume = {476}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-33080-3}, doi = {10.1007/978-3-031-33080-3}, isbn = {978-3-031-33079-7}, timestamp = {Thu, 25 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/rcis/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/AlamZNAM22, author = {Sana Alam and Shehnila Zardari and Shaheena Noor and Shakil Ahmed and Haralambos Mouratidis}, title = {Trust Management in Social Internet of Things (SIoT): {A} Survey}, journal = {{IEEE} Access}, volume = {10}, pages = {108924--108954}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3213699}, doi = {10.1109/ACCESS.2022.3213699}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/AlamZNAM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cii/RosadoPSSBMF22, author = {David Garcia Rosado and Antonio Santos{-}Olmo Parra and Luis Enrique S{\'{a}}nchez and Manuel A. Serrano and Carlos Blanco and Haralambos Mouratidis and Eduardo Fern{\'{a}}ndez{-}Medina}, title = {Managing cybersecurity risks of cyber-physical systems: The {MARISMA-CPS} pattern}, journal = {Comput. Ind.}, volume = {142}, pages = {103715}, year = {2022}, url = {https://doi.org/10.1016/j.compind.2022.103715}, doi = {10.1016/J.COMPIND.2022.103715}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cii/RosadoPSSBMF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/icae/IslamAIMP22, author = {Shareeful Islam and Abdulrazaq Abba and Umar Mukhtar Ismail and Haralambos Mouratidis and Spyridon Papastergiou}, title = {Vulnerability prediction for secure healthcare supply chain service delivery}, journal = {Integr. Comput. Aided Eng.}, volume = {29}, number = {4}, pages = {389--409}, year = {2022}, url = {https://doi.org/10.3233/ICA-220689}, doi = {10.3233/ICA-220689}, timestamp = {Wed, 05 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/icae/IslamAIMP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/KioskliDFM22, author = {Kitty Kioskli and Daniele Dellagiacoma and Theofanis Fotis and Haralambos Mouratidis}, title = {The supply chain of a Living Lab: Modelling security, privacy, and vulnerability issues alongside with their impact and potential mitigation strategies}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {13}, number = {2}, pages = {147--182}, year = {2022}, url = {https://doi.org/10.22667/JOWUA.2022.06.30.147}, doi = {10.22667/JOWUA.2022.06.30.147}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/KioskliDFM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nca/KureIM22, author = {Halima Ibrahim Kure and Shareeful Islam and Haralambos Mouratidis}, title = {An integrated cyber security risk management framework and risk predication for the critical infrastructure protection}, journal = {Neural Comput. Appl.}, volume = {34}, number = {18}, pages = {15241--15271}, year = {2022}, url = {https://doi.org/10.1007/s00521-022-06959-2}, doi = {10.1007/S00521-022-06959-2}, timestamp = {Tue, 06 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nca/KureIM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/AdeeM22, author = {Rose Adee and Haralambos Mouratidis}, title = {A Dynamic Four-Step Data Security Model for Data in Cloud Computing Based on Cryptography and Steganography}, journal = {Sensors}, volume = {22}, number = {3}, pages = {1109}, year = {2022}, url = {https://doi.org/10.3390/s22031109}, doi = {10.3390/S22031109}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/AdeeM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/HeydariMT22, author = {Mohammad Heydari and Haralambos Mouratidis and Vahid Heydari Fami Tafreshi}, editor = {Sokratis K. Katsikas and Fr{\'{e}}d{\'{e}}ric Cuppens and Christos Kalloniatis and John Mylopoulos and Frank Pallas and J{\"{o}}rg Pohle and M. Angela Sasse and Habtamu Abie and Silvio Ranise and Luca Verderame and Enrico Cambiaso and Jorge Maestre Vidal and Marco Antonio Sotelo Monge and Massimiliano Albanese and Basel Katt and Sandeep Pirbhulal and Ankur Shukla}, title = {OntoCyrene: Towards Ontology-Enhanced Asset Modelling for Supply Chains in the Context of Cyber Security}, booktitle = {Computer Security. {ESORICS} 2022 International Workshops - CyberICPS 2022, {SECPRE} 2022, {SPOSE} 2022, {CPS4CIP} 2022, CDT{\&}SECOMANE 2022, {EIS} 2022, and SecAssure 2022, Copenhagen, Denmark, September 26-30, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13785}, pages = {157--176}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-25460-4\_9}, doi = {10.1007/978-3-031-25460-4\_9}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/HeydariMT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/evs/PapastergiouMK21, author = {Spyridon Papastergiou and Haralambos Mouratidis and Eleni{-}Maria Kalogeraki}, title = {Handling of advanced persistent threats and complex incidents in healthcare, transportation and energy {ICT} infrastructures}, journal = {Evol. Syst.}, volume = {12}, number = {1}, pages = {91--108}, year = {2021}, url = {https://doi.org/10.1007/s12530-020-09335-4}, doi = {10.1007/S12530-020-09335-4}, timestamp = {Fri, 14 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/evs/PapastergiouMK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rpjdi/PirasAPMTMP21, author = {Luca Piras and Mohammed Ghazi Al{-}Obeidallah and Michalis Pavlidis and Haralambos Mouratidis and Aggeliki Tsohou and Emmanouil Magkos and Andrea Praitano}, title = {A Data Scope Management Service to Support Privacy by Design and {GDPR} Compliance}, journal = {J. Data Intell.}, volume = {2}, number = {2}, pages = {136--165}, year = {2021}, url = {https://doi.org/10.26421/JDI2.2-3}, doi = {10.26421/JDI2.2-3}, timestamp = {Wed, 06 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rpjdi/PirasAPMTMP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/KioskliFM21, author = {Kitty Kioskli and Theo Fotis and Haralambos Mouratidis}, editor = {Delphine Reinhardt and Tilo M{\"{u}}ller}, title = {The landscape of cybersecurity vulnerabilities and challenges in healthcare: Security standards and paradigm shift recommendations}, booktitle = {{ARES} 2021: The 16th International Conference on Availability, Reliability and Security, Vienna, Austria, August 17-20, 2021}, pages = {136:1--136:9}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3465481.3470033}, doi = {10.1145/3465481.3470033}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/KioskliFM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/enase/AlkubaisyPACM21a, author = {Duaa Alkubaisy and Luca Piras and Mohammed Ghazi Al{-}Obeidallah and Karl Cox and Haralambos Mouratidis}, editor = {Raian Ali and Hermann Kaindl and Leszek A. Maciaszek}, title = {A Framework for Privacy and Security Requirements Analysis and Conflict Resolution for Supporting {GDPR} Compliance Through Privacy-by-Design}, booktitle = {Evaluation of Novel Approaches to Software Engineering - 16th International Conference, {ENASE} 2021, Virtual Event, April 26-27, 2021, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1556}, pages = {67--87}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-96648-5\_4}, doi = {10.1007/978-3-030-96648-5\_4}, timestamp = {Wed, 06 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/enase/AlkubaisyPACM21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/enase/AlkubaisyPACM21, author = {Duaa Alkubaisy and Luca Piras and Mohammed Ghazi Al{-}Obeidallah and Karl Cox and Haralambos Mouratidis}, editor = {Raian Ali and Hermann Kaindl and Leszek A. Maciaszek}, title = {ConfIs: {A} Tool for Privacy and Security Analysis and Conflict Resolution for Supporting {GDPR} Compliance through Privacy-by-Design}, booktitle = {Proceedings of the 16th International Conference on Evaluation of Novel Approaches to Software Engineering, {ENASE} 2021, Online Streaming, April 26-27, 2021}, pages = {80--91}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010406100800091}, doi = {10.5220/0010406100800091}, timestamp = {Wed, 06 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/enase/AlkubaisyPACM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip12/IslamMM21, author = {Shareeful Islam and Haralambos Mouratidis and Hasan Mahmud}, editor = {Ilias Maglogiannis and John MacIntyre and Lazaros Iliadis}, title = {An Automated Tool to Support an Intelligence Learner Management System Using Learning Analytics and Machine Learning}, booktitle = {Artificial Intelligence Applications and Innovations - 17th {IFIP} {WG} 12.5 International Conference, {AIAI} 2021, Hersonissos, Crete, Greece, June 25-27, 2021, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {627}, pages = {494--504}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-79150-6\_39}, doi = {10.1007/978-3-030-79150-6\_39}, timestamp = {Wed, 05 Oct 2022 21:11:03 +0200}, biburl = {https://dblp.org/rec/conf/ifip12/IslamMM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip12/Yeboah-OforiMII21, author = {Abel Yeboah{-}Ofori and Haralambos Mouratidis and Umar Mukhtar Ismail and Shareeful Islam and Spyridon Papastergiou}, editor = {Ilias Maglogiannis and John MacIntyre and Lazaros Iliadis}, title = {Cyber Supply Chain Threat Analysis and Prediction Using Machine Learning and Ontology}, booktitle = {Artificial Intelligence Applications and Innovations - 17th {IFIP} {WG} 12.5 International Conference, {AIAI} 2021, Hersonissos, Crete, Greece, June 25-27, 2021, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {627}, pages = {518--530}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-79150-6\_41}, doi = {10.1007/978-3-030-79150-6\_41}, timestamp = {Wed, 05 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip12/Yeboah-OforiMII21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pci/IslamPM21, author = {Shareeful Islam and Spyridon Papastergiou and Haralambos Mouratidis}, editor = {Michael Vassilakopoulos and Nikitas N. Karanikolas and George Stamoulis and Vassilios S. Verykios and Cleo Sgouropoulou}, title = {A Dynamic Cyber Security Situational Awareness Framework for Healthcare {ICT} Infrastructures}, booktitle = {{PCI} 2021: 25th Pan-Hellenic Conference on Informatics, Volos, Greece, November 26 - 28, 2021}, pages = {334--339}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3503823.3503885}, doi = {10.1145/3503823.3503885}, timestamp = {Thu, 03 Mar 2022 15:02:32 +0100}, biburl = {https://dblp.org/rec/conf/pci/IslamPM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/evs/PolatidisPPPM20, author = {Nikolaos Polatidis and Elias Pimenidis and Michalis Pavlidis and Spyridon Papastergiou and Haralambos Mouratidis}, title = {From product recommendation to cyber-attack prediction: generating attack graphs and predicting future attacks}, journal = {Evol. Syst.}, volume = {11}, number = {3}, pages = {479--490}, year = {2020}, url = {https://doi.org/10.1007/s12530-018-9234-z}, doi = {10.1007/S12530-018-9234-Z}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/evs/PolatidisPPPM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/TsohouMMCPPDRC20, author = {Aggeliki Tsohou and Emmanouil Magkos and Haralambos Mouratidis and George Chrysoloras and Luca Piras and Michalis Pavlidis and Julien Debussche and Marco Rotoloni and Beatriz Gallego{-}Nicasio Crespo}, title = {Privacy, security, legal and technology acceptance elicited and consolidated requirements for a {GDPR} compliance platform}, journal = {Inf. Comput. Secur.}, volume = {28}, number = {4}, pages = {531--553}, year = {2020}, url = {https://doi.org/10.1108/ICS-01-2020-0002}, doi = {10.1108/ICS-01-2020-0002}, timestamp = {Wed, 06 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/TsohouMMCPPDRC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sncs/CarvalhoPMROSRM20, author = {Renata Medeiros de Carvalho and Camillo Del Prete and Yod Samuel Mart{\'{\i}}n and Rosa M. Araujo Rivero and Melek {\"{O}}nen and Francesco Paolo Schiavo and {\'{A}}ngel Cuevas Rum{\'{\i}}n and Haralambos Mouratidis and Juan C. Yelmo and Maria N. Koukovini}, title = {Protecting Citizens' Personal Data and Privacy: Joint Effort from {GDPR} {EU} Cluster Research Projects}, journal = {{SN} Comput. Sci.}, volume = {1}, number = {4}, pages = {217}, year = {2020}, url = {https://doi.org/10.1007/s42979-020-00218-8}, doi = {10.1007/S42979-020-00218-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sncs/CarvalhoPMROSRM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sosym/MouratidisSD20, author = {Haralambos Mouratidis and Shaun Shei and Aidan J. Delaney}, title = {A security requirements modelling language for cloud computing environments}, journal = {Softw. Syst. Model.}, volume = {19}, number = {2}, pages = {271--295}, year = {2020}, url = {https://doi.org/10.1007/s10270-019-00747-8}, doi = {10.1007/S10270-019-00747-8}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sosym/MouratidisSD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sosym/SalnitriAPDMG20, author = {Mattia Salnitri and Konstantinos Angelopoulos and Michalis Pavlidis and Vasiliki Diamantopoulou and Haralambos Mouratidis and Paolo Giorgini}, title = {Modelling the interplay of security, privacy and trust in sociotechnical systems: a computer-aided design approach}, journal = {Softw. Syst. Model.}, volume = {19}, number = {2}, pages = {467--491}, year = {2020}, url = {https://doi.org/10.1007/s10270-019-00744-x}, doi = {10.1007/S10270-019-00744-X}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sosym/SalnitriAPDMG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sosym/ArgyropoulosMF20, author = {Nikolaos Argyropoulos and Haralambos Mouratidis and Andrew Fish}, title = {Enhancing secure business process design with security process patterns}, journal = {Softw. Syst. Model.}, volume = {19}, number = {3}, pages = {555--577}, year = {2020}, url = {https://doi.org/10.1007/s10270-019-00743-y}, doi = {10.1007/S10270-019-00743-Y}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sosym/ArgyropoulosMF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bir/MouratidisZS20, author = {Haralambos Mouratidis and Jelena Zdravkovic and Janis Stirna}, editor = {Robert Andrei Buchmann and Andrea Polini and Bj{\"{o}}rn Johansson and Dimitris Karagiannis}, title = {Cyber Security Resilience in Business Informatics: An Exploratory Paper}, booktitle = {Perspectives in Business Informatics Research - 19th International Conference on Business Informatics Research, {BIR} 2020, Vienna, Austria, September 21-23, 2020, Proceedings}, series = {Lecture Notes in Business Information Processing}, volume = {398}, pages = {53--66}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-61140-8\_4}, doi = {10.1007/978-3-030-61140-8\_4}, timestamp = {Thu, 19 Nov 2020 15:37:08 +0100}, biburl = {https://dblp.org/rec/conf/bir/MouratidisZS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/PirasAPMTMPIC20, author = {Luca Piras and Mohammed Ghazi Al{-}Obeidallah and Michalis Pavlidis and Haralambos Mouratidis and Aggeliki Tsohou and Emmanouil Magkos and Andrea Praitano and Annarita Iodice and Beatriz Gallego{-}Nicasio Crespo}, editor = {Stefanos Gritzalis and Edgar R. Weippl and Gabriele Kotsis and A Min Tjoa and Ismail Khalil}, title = {DEFeND {DSM:} {A} Data Scope Management Service for Model-Based Privacy by Design {GDPR} Compliance}, booktitle = {Trust, Privacy and Security in Digital Business - 17th International Conference, TrustBus 2020, Bratislava, Slovakia, September 14-17, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12395}, pages = {186--201}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-58986-8\_13}, doi = {10.1007/978-3-030-58986-8\_13}, timestamp = {Wed, 06 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/PirasAPMTMPIC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/GharibGSPMPR20, author = {Mohamad Gharib and Paolo Giorgini and Mattia Salnitri and Elda Paja and Haralambos Mouratidis and Michalis Pavlidis and Jos{\'{e}} Fran. Ruiz}, editor = {Mattia Salnitri and Jan J{\"{u}}rjens and Haralambos Mouratidis and Loredana Mancini and Paolo Giorgini}, title = {A Holistic Approach for Privacy Requirements Analysis: An Industrial Case Study}, booktitle = {Visual Privacy Management - Design and Applications of a Privacy-Enabling Platform}, series = {Lecture Notes in Computer Science}, volume = {12030}, pages = {22--53}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-59944-7\_2}, doi = {10.1007/978-3-030-59944-7\_2}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lncs/GharibGSPMPR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/AhmadianPJSGMR20, author = {Amir Shayan Ahmadian and Sven Peldszus and Jan J{\"{u}}rjens and Mattia Salnitri and Paolo Giorgini and Haralambos Mouratidis and Jos{\'{e}} Fran. Ruiz}, editor = {Mattia Salnitri and Jan J{\"{u}}rjens and Haralambos Mouratidis and Loredana Mancini and Paolo Giorgini}, title = {The Architecture of VisiOn Privacy Platform}, booktitle = {Visual Privacy Management - Design and Applications of a Privacy-Enabling Platform}, series = {Lecture Notes in Computer Science}, volume = {12030}, pages = {54--76}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-59944-7\_3}, doi = {10.1007/978-3-030-59944-7\_3}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lncs/AhmadianPJSGMR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/PeldszusASJPM20, author = {Sven Peldszus and Amir Shayan Ahmadian and Mattia Salnitri and Jan J{\"{u}}rjens and Michalis Pavlidis and Haralambos Mouratidis}, editor = {Mattia Salnitri and Jan J{\"{u}}rjens and Haralambos Mouratidis and Loredana Mancini and Paolo Giorgini}, title = {Visual Privacy Management}, booktitle = {Visual Privacy Management - Design and Applications of a Privacy-Enabling Platform}, series = {Lecture Notes in Computer Science}, volume = {12030}, pages = {77--108}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-59944-7\_4}, doi = {10.1007/978-3-030-59944-7\_4}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lncs/PeldszusASJPM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/lncs/12030, editor = {Mattia Salnitri and Jan J{\"{u}}rjens and Haralambos Mouratidis and Loredana Mancini and Paolo Giorgini}, title = {Visual Privacy Management - Design and Applications of a Privacy-Enabling Platform}, series = {Lecture Notes in Computer Science}, volume = {12030}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-59944-7}, doi = {10.1007/978-3-030-59944-7}, isbn = {978-3-030-59943-0}, timestamp = {Mon, 25 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/lncs/12030.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2003-05720, author = {Spyridon Papastergiou and Haralambos Mouratidis and Eleni{-}Maria Kalogeraki}, title = {Cyber Security Incident Handling, Warning and Response System for the European Critical Information Infrastructures (CyberSANE)}, journal = {CoRR}, volume = {abs/2003.05720}, year = {2020}, url = {https://arxiv.org/abs/2003.05720}, eprinttype = {arXiv}, eprint = {2003.05720}, timestamp = {Tue, 17 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2003-05720.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/MavropoulosMFP19, author = {Orestis Mavropoulos and Haralambos Mouratidis and Andrew Fish and Emmanouil Panaousis}, title = {Apparatus: {A} framework for security analysis in internet of things systems}, journal = {Ad Hoc Networks}, volume = {92}, year = {2019}, url = {https://doi.org/10.1016/j.adhoc.2018.08.013}, doi = {10.1016/J.ADHOC.2018.08.013}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adhoc/MavropoulosMFP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/DiamantopoulouM19, author = {Vasiliki Diamantopoulou and Haralambos Mouratidis}, title = {Practical evaluation of a reference architecture for the management of privacy level agreements}, journal = {Inf. Comput. Secur.}, volume = {27}, number = {5}, year = {2019}, url = {https://doi.org/10.1108/ICS-04-2019-0052}, doi = {10.1108/ICS-04-2019-0052}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/DiamantopoulouM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jis/PimenidisPM19, author = {Elias Pimenidis and Nikolaos Polatidis and Haralambos Mouratidis}, title = {Mobile recommender systems: Identifying the major concepts}, journal = {J. Inf. Sci.}, volume = {45}, number = {3}, year = {2019}, url = {https://doi.org/10.1177/0165551518792213}, doi = {10.1177/0165551518792213}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jis/PimenidisPM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eann/PapastergiouMK19, author = {Spyridon Papastergiou and Haralambos Mouratidis and Eleni{-}Maria Kalogeraki}, editor = {John MacIntyre and Lazaros S. Iliadis and Ilias Maglogiannis and Chrisina Jayne}, title = {Cyber Security Incident Handling, Warning and Response System for the European Critical Information Infrastructures (CyberSANE)}, booktitle = {Engineering Applications of Neural Networks - 20th International Conference, {EANN} 2019, Hersonissos, Crete, Greece, May 24-26, 2019, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1000}, pages = {476--487}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-20257-6\_41}, doi = {10.1007/978-3-030-20257-6\_41}, timestamp = {Sun, 02 Jun 2019 21:12:35 +0200}, biburl = {https://dblp.org/rec/conf/eann/PapastergiouMK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/AthinaiouMFP19, author = {Myrsini Athinaiou and Haralambos Mouratidis and Theo Fotis and Michalis Pavlidis}, editor = {Sokratis K. Katsikas and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens and Costas Lambrinoudakis and Christos Kalloniatis and John Mylopoulos and Annie I. Ant{\'{o}}n and Stefanos Gritzalis and Frank Pallas and J{\"{o}}rg Pohle and M. Angela Sasse and Weizhi Meng and Steven Furnell and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {A Conceptual Redesign of a Modelling Language for Cyber Resiliency of Healthcare Systems}, booktitle = {Computer Security - {ESORICS} 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26-27, 2019 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11980}, pages = {140--158}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-42048-2\_10}, doi = {10.1007/978-3-030-42048-2\_10}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/AthinaiouMFP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/TsohouMMCPPDRC19, author = {Aggeliki Tsohou and Manos Magkos and Haralambos Mouratidis and George Chrysoloras and Luca Piras and Michalis Pavlidis and Julien Debussche and Marco Rotoloni and Beatriz Gallego{-}Nicasio Crespo}, editor = {Sokratis K. Katsikas and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens and Costas Lambrinoudakis and Christos Kalloniatis and John Mylopoulos and Annie I. Ant{\'{o}}n and Stefanos Gritzalis and Frank Pallas and J{\"{o}}rg Pohle and M. Angela Sasse and Weizhi Meng and Steven Furnell and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Privacy, Security, Legal and Technology Acceptance Requirements for a {GDPR} Compliance Platform}, booktitle = {Computer Security - {ESORICS} 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26-27, 2019 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11980}, pages = {204--223}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-42048-2\_14}, doi = {10.1007/978-3-030-42048-2\_14}, timestamp = {Wed, 06 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/TsohouMMCPPDRC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rcis/AlkubaisyCM19, author = {Duaa Alkubaisy and Karl Cox and Haralambos Mouratidis}, editor = {Manuel Kolp and Jean Vanderdonckt and Monique Snoeck and Yves Wautelet}, title = {Towards Detecting and Mitigating Conflicts for Privacy and Security Requirements}, booktitle = {13th International Conference on Research Challenges in Information Science, {RCIS} 2019, Brussels, Belgium, May 29-31, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/RCIS.2019.8876999}, doi = {10.1109/RCIS.2019.8876999}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/rcis/AlkubaisyCM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssci/NaikJGMNS19, author = {Nitin Naik and Paul Jenkins and Jonathan Gillett and Haralambos Mouratidis and Kshirasagar Naik and Jingping Song}, title = {Lockout-Tagout Ransomware: {A} Detection Method for Ransomware using Fuzzy Hashing and Clustering}, booktitle = {{IEEE} Symposium Series on Computational Intelligence, {SSCI} 2019, Xiamen, China, December 6-9, 2019}, pages = {641--648}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SSCI44817.2019.9003148}, doi = {10.1109/SSCI44817.2019.9003148}, timestamp = {Wed, 26 Feb 2020 16:57:41 +0100}, biburl = {https://dblp.org/rec/conf/ssci/NaikJGMNS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/PirasAPTMCBFMSP19, author = {Luca Piras and Mohammed Ghazi Al{-}Obeidallah and Andrea Praitano and Aggeliki Tsohou and Haralambos Mouratidis and Beatriz Gallego{-}Nicasio Crespo and Jean Baptiste Bernard and Marco Fiorani and Emmanouil Magkos and Andr{\`{e}}s Castillo Sanz and Michalis Pavlidis and Roberto D'Addario and Giuseppe Giovanni Zorzino}, editor = {Stefanos Gritzalis and Edgar R. Weippl and Sokratis K. Katsikas and Gabriele Anderst{-}Kotsis and A Min Tjoa and Ismail Khalil}, title = {DEFeND Architecture: {A} Privacy by Design Platform for {GDPR} Compliance}, booktitle = {Trust, Privacy and Security in Digital Business - 16th International Conference, TrustBus 2019, Linz, Austria, August 26-29, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11711}, pages = {78--93}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-27813-7\_6}, doi = {10.1007/978-3-030-27813-7\_6}, timestamp = {Wed, 06 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/PirasAPTMCBFMSP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/PolatidisPM18, author = {Nikolaos Polatidis and Michalis Pavlidis and Haralambos Mouratidis}, title = {Cyber-attack path discovery in a dynamic supply chain maritime risk management system}, journal = {Comput. Stand. Interfaces}, volume = {56}, pages = {74--82}, year = {2018}, url = {https://doi.org/10.1016/j.csi.2017.09.006}, doi = {10.1016/J.CSI.2017.09.006}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/PolatidisPM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/DiamantopoulouM18, author = {Vasiliki Diamantopoulou and Haralambos Mouratidis}, title = {Applying the physics of notation to the evaluation of a security and privacy requirements engineering methodology}, journal = {Inf. Comput. Secur.}, volume = {26}, number = {4}, pages = {382--400}, year = {2018}, url = {https://doi.org/10.1108/ICS-12-2017-0087}, doi = {10.1108/ICS-12-2017-0087}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/DiamantopoulouM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ArgyropoulosAMF18, author = {Nikolaos Argyropoulos and Konstantinos Angelopoulos and Haralambos Mouratidis and Andrew Fish}, title = {Risk-aware decision support with constrained goal models}, journal = {Inf. Comput. Secur.}, volume = {26}, number = {4}, pages = {472--490}, year = {2018}, url = {https://doi.org/10.1108/ICS-01-2018-0010}, doi = {10.1108/ICS-01-2018-0010}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/ArgyropoulosAMF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/IslamOKMG18, author = {Shareeful Islam and Moussa Ouedraogo and Christos Kalloniatis and Haralambos Mouratidis and Stefanos Gritzalis}, title = {Assurance of Security and Privacy Requirements for Cloud Deployment Models}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {6}, number = {2}, pages = {387--400}, year = {2018}, url = {https://doi.org/10.1109/TCC.2015.2511719}, doi = {10.1109/TCC.2015.2511719}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcc/IslamOKMG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/MouratidisD18, author = {Haralambos Mouratidis and Vasiliki Diamantopoulou}, title = {A Security Analysis Method for Industrial Internet of Things}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {14}, number = {9}, pages = {4093--4100}, year = {2018}, url = {https://doi.org/10.1109/TII.2018.2832853}, doi = {10.1109/TII.2018.2832853}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tii/MouratidisD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mcis/DiamantopoulouM18, author = {Vasiliki Diamantopoulou and Haralambos Mouratidis}, title = {Evaluating a Reference Architecture for Privacy Level Agreement's Management}, booktitle = {12th Mediterranean Conference on Information Systems, {MCIS} 2018, Corfu, Greece, 28-30 September 2018}, pages = {28}, publisher = {AISeL}, year = {2018}, url = {https://aisel.aisnet.org/mcis2018/28}, timestamp = {Fri, 13 Dec 2019 13:24:11 +0100}, biburl = {https://dblp.org/rec/conf/mcis/DiamantopoulouM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/AthinaiouMFPP18, author = {Myrsini Athinaiou and Haralambos Mouratidis and Theo Fotis and Michalis Pavlidis and Emmanouil Panaousis}, editor = {Steven Furnell and Haralambos Mouratidis and G{\"{u}}nther Pernul}, title = {Towards the Definition of a Security Incident Response Modelling Language}, booktitle = {Trust, Privacy and Security in Digital Business - 15th International Conference, TrustBus 2018, Regensburg, Germany, September 5-6, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11033}, pages = {198--212}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98385-1\_14}, doi = {10.1007/978-3-319-98385-1\_14}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/AthinaiouMFPP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/caise/2018fo, editor = {Jan Mendling and Haralambos Mouratidis}, title = {Information Systems in the Big Data Era - CAiSE Forum 2018, Tallinn, Estonia, June 11-15, 2018, Proceedings}, series = {Lecture Notes in Business Information Processing}, volume = {317}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-92901-9}, doi = {10.1007/978-3-319-92901-9}, isbn = {978-3-319-92900-2}, timestamp = {Mon, 11 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/caise/2018fo.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/trustbus/2018, editor = {Steven Furnell and Haralambos Mouratidis and G{\"{u}}nther Pernul}, title = {Trust, Privacy and Security in Digital Business - 15th International Conference, TrustBus 2018, Regensburg, Germany, September 5-6, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11033}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98385-1}, doi = {10.1007/978-3-319-98385-1}, isbn = {978-3-319-98384-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1804-10276, author = {Nikolaos Polatidis and Elias Pimenidis and Michalis Pavlidis and Spyridon Papastergiou and Haralambos Mouratidis}, title = {From product recommendation to cyber-attack prediction: Generating attack graphs and predicting future attacks}, journal = {CoRR}, volume = {abs/1804.10276}, year = {2018}, url = {http://arxiv.org/abs/1804.10276}, eprinttype = {arXiv}, eprint = {1804.10276}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1804-10276.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1805-02276, author = {Elias Pimenidis and Nikolaos Polatidis and Haralambos Mouratidis}, title = {Mobile recommender systems: Identifying the major concepts}, journal = {CoRR}, volume = {abs/1805.02276}, year = {2018}, url = {http://arxiv.org/abs/1805.02276}, eprinttype = {arXiv}, eprint = {1805.02276}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1805-02276.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsis/MavropoulosMFPK17, author = {Orestis Mavropoulos and Haralambos Mouratidis and Andrew Fish and Emmanouil Panaousis and Christos Kalloniatis}, title = {A conceptual model to support security analysis in the internet of things}, journal = {Comput. Sci. Inf. Syst.}, volume = {14}, number = {2}, pages = {557--578}, year = {2017}, url = {https://doi.org/10.2298/CSIS160110016M}, doi = {10.2298/CSIS160110016M}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comsis/MavropoulosMFPK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/PolatidisGPM17, author = {Nikolaos Polatidis and Christos K. Georgiadis and Elias Pimenidis and Haralambos Mouratidis}, title = {Privacy-preserving collaborative recommendations based on random perturbations}, journal = {Expert Syst. Appl.}, volume = {71}, pages = {18--25}, year = {2017}, url = {https://doi.org/10.1016/j.eswa.2016.11.018}, doi = {10.1016/J.ESWA.2016.11.018}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eswa/PolatidisGPM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijiids/NaskosGMK17, author = {Athanasios Naskos and Anastasios Gounaris and Haralambos Mouratidis and Panagiotis Katsaros}, title = {Security-aware elasticity for NoSQL databases in multi-cloud environments}, journal = {Int. J. Intell. Inf. Database Syst.}, volume = {10}, number = {3/4}, pages = {168--190}, year = {2017}, url = {https://doi.org/10.1504/IJIIDS.2017.10007783}, doi = {10.1504/IJIIDS.2017.10007783}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijiids/NaskosGMK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jucs/GeorgiadisPMP17, author = {Christos K. Georgiadis and Nikolaos Polatidis and Haralambos Mouratidis and Elias Pimenidis}, title = {A Method for Privacy-preserving Collaborative Filtering Recommendations}, journal = {J. Univers. Comput. Sci.}, volume = {23}, number = {2}, pages = {146--166}, year = {2017}, url = {http://www.jucs.org/jucs\_23\_2/a\_method\_for\_privacy}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jucs/GeorgiadisPMP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/AngelopoulosDMP17, author = {Konstantinos Angelopoulos and Vasiliki Diamantopoulou and Haralambos Mouratidis and Michalis Pavlidis and Mattia Salnitri and Paolo Giorgini and Jos{\'{e}} Fran. Ruiz}, title = {A Holistic Approach for Privacy Protection in E-Government}, booktitle = {Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017}, pages = {17:1--17:10}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3098954.3098960}, doi = {10.1145/3098954.3098960}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/AngelopoulosDMP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apf/DiamantopoulouA17, author = {Vasiliki Diamantopoulou and Konstantinos Angelopoulos and Julian Flake and Andrea Praitano and Jos{\'{e}} Fran. Ruiz and Jan J{\"{u}}rjens and Michalis Pavlidis and Dimitri Bonutto and Andr{\`{e}}s Castillo Sanz and Haralambos Mouratidis and Javier Garcia{-}Robles and Alberto Eugenio Tozzi}, editor = {Erich Schweighofer and Herbert Leitold and Andreas Mitrakas and Kai Rannenberg}, title = {Privacy Data Management and Awareness for Public Administrations: {A} Case Study from the Healthcare Domain}, booktitle = {Privacy Technologies and Policy - 5th Annual Privacy Forum, {APF} 2017, Vienna, Austria, June 7-8, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10518}, pages = {192--209}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-67280-9\_11}, doi = {10.1007/978-3-319-67280-9\_11}, timestamp = {Thu, 05 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/apf/DiamantopoulouA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/caise/ArgyropoulosMF17, author = {Nikolaos Argyropoulos and Haralambos Mouratidis and Andrew Fish}, editor = {Iris Reinhartz{-}Berger and Jens Gulden and Selmin Nurcan and Wided Gu{\'{e}}dria and Palash Bera}, title = {Supporting Secure Business Process Design via Security Process Patterns}, booktitle = {Enterprise, Business-Process and Information Systems Modeling - 18th International Conference, {BPMDS} 2017, 22nd International Conference, {EMMSAD} 2017, Held at CAiSE 2017, Essen, Germany, June 12-13, 2017, Proceedings}, series = {Lecture Notes in Business Information Processing}, volume = {287}, pages = {19--33}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59466-8\_2}, doi = {10.1007/978-3-319-59466-8\_2}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/caise/ArgyropoulosMF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/caise/DiamantopoulouP17, author = {Vasiliki Diamantopoulou and Michalis Pavlidis and Haralambos Mouratidis}, editor = {Xavier Franch and Jolita Ralyt{\'{e}} and Raimundas Matulevicius and Camille Salinesi and Roel J. Wieringa}, title = {Privacy Level Agreements for Public Administration Information Systems}, booktitle = {Proceedings of the Forum and Doctoral Consortium Papers Presented at the 29th International Conference on Advanced Information Systems Engineering, CAiSE 2017, Essen, Germany, June 12-16, 2017}, series = {{CEUR} Workshop Proceedings}, volume = {1848}, pages = {97--104}, publisher = {CEUR-WS.org}, year = {2017}, url = {https://ceur-ws.org/Vol-1848/CAiSE2017\_Forum\_Paper13.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:33 +0100}, biburl = {https://dblp.org/rec/conf/caise/DiamantopoulouP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/caise/SheiMD17, author = {Shaun Shei and Haralambos Mouratidis and Aidan J. Delaney}, editor = {Iris Reinhartz{-}Berger and Jens Gulden and Selmin Nurcan and Wided Gu{\'{e}}dria and Palash Bera}, title = {A Security Requirements Modelling Language to Secure Cloud Computing Environments}, booktitle = {Enterprise, Business-Process and Information Systems Modeling - 18th International Conference, {BPMDS} 2017, 22nd International Conference, {EMMSAD} 2017, Held at CAiSE 2017, Essen, Germany, June 12-13, 2017, Proceedings}, series = {Lecture Notes in Business Information Processing}, volume = {287}, pages = {337--345}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59466-8\_21}, doi = {10.1007/978-3-319-59466-8\_21}, timestamp = {Thu, 19 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/caise/SheiMD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eann/PolatidisPPM17, author = {Nikolaos Polatidis and Elias Pimenidis and Michalis Pavlidis and Haralambos Mouratidis}, editor = {Giacomo Boracchi and Lazaros S. Iliadis and Chrisina Jayne and Aristidis Likas}, title = {Recommender Systems Meeting Security: From Product Recommendation to Cyber-Attack Prediction}, booktitle = {Engineering Applications of Neural Networks - 18th International Conference, {EANN} 2017, Athens, Greece, August 25-27, 2017, Proceedings}, series = {Communications in Computer and Information Science}, volume = {744}, pages = {508--519}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-65172-9\_43}, doi = {10.1007/978-3-319-65172-9\_43}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eann/PolatidisPPM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eann/NeokosmidisRCGM17, author = {Ioannis Neokosmidis and Theodoros Rokkas and Ioannis P. Chochliouros and Leonardo Goratti and Haralambos Mouratidis and Karim M. Nasr and Seiamak Vahid and Klaus Moessner and Antonino Albanese and Paolo Secondo Crosta and Pietro Paglierani}, editor = {Giacomo Boracchi and Lazaros S. Iliadis and Chrisina Jayne and Aristidis Likas}, title = {Are Small Cells and Network Intelligence at the Edge the Drivers for 5G Market Adoption? The {SESAME} Case}, booktitle = {Engineering Applications of Neural Networks - 18th International Conference, {EANN} 2017, Athens, Greece, August 25-27, 2017, Proceedings}, series = {Communications in Computer and Information Science}, volume = {744}, pages = {693--703}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-65172-9\_58}, doi = {10.1007/978-3-319-65172-9\_58}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eann/NeokosmidisRCGM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/er/DiamantopoulouA17, author = {Vasiliki Diamantopoulou and Konstantinos Angelopoulos and Michalis Pavlidis and Haralambos Mouratidis}, editor = {Cristina Cabanillas and Sergio Espa{\~{n}}a and Siamak Farshidi}, title = {A Metamodel for GDPR-based Privacy Level Agreements}, booktitle = {Proceedings of the {ER} Forum 2017 and the {ER} 2017 Demo Track co-located with the 36th International Conference on Conceptual Modelling {(ER} 2017), Valencia, Spain, - November 6-9, 2017}, series = {{CEUR} Workshop Proceedings}, volume = {1979}, pages = {285--291}, publisher = {CEUR-WS.org}, year = {2017}, url = {https://ceur-ws.org/Vol-1979/paper-08.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:42 +0100}, biburl = {https://dblp.org/rec/conf/er/DiamantopoulouA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/DiamantopoulouP17, author = {Vasiliki Diamantopoulou and Michalis Pavlidis and Haralambos Mouratidis}, editor = {Sokratis K. Katsikas and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens and Costas Lambrinoudakis and Christos Kalloniatis and John Mylopoulos and Annie I. Ant{\'{o}}n and Stefanos Gritzalis}, title = {Evaluation of a Security and Privacy Requirements Methodology Using the Physics of Notation}, booktitle = {Computer Security - {ESORICS} 2017 International Workshops, CyberICPS 2017 and {SECPRE} 2017, Oslo, Norway, September 14-15, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10683}, pages = {210--225}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72817-9\_14}, doi = {10.1007/978-3-319-72817-9\_14}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/DiamantopoulouP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ArgyropoulosAMF17, author = {Nikolaos Argyropoulos and Konstantinos Angelopoulos and Haralambos Mouratidis and Andrew Fish}, editor = {Sokratis K. Katsikas and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens and Costas Lambrinoudakis and Christos Kalloniatis and John Mylopoulos and Annie I. Ant{\'{o}}n and Stefanos Gritzalis}, title = {Decision-Making in Security Requirements Engineering with Constrained Goal Models}, booktitle = {Computer Security - {ESORICS} 2017 International Workshops, CyberICPS 2017 and {SECPRE} 2017, Oslo, Norway, September 14-15, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10683}, pages = {262--280}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72817-9\_17}, doi = {10.1007/978-3-319-72817-9\_17}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/ArgyropoulosAMF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/ArgyropoulosSKM17, author = {Nikolaos Argyropoulos and Shaun Shei and Christos Kalloniatis and Haralambos Mouratidis and Aidan J. Delaney and Andrew Fish and Stefanos Gritzalis}, editor = {Tung Bui}, title = {A Semi-Automatic Approach for Eliciting Cloud Security and Privacy Requirements}, booktitle = {50th Hawaii International Conference on System Sciences, {HICSS} 2017, Hilton Waikoloa Village, Hawaii, USA, January 4-7, 2017}, pages = {1--10}, publisher = {ScholarSpace / {AIS} Electronic Library (AISeL)}, year = {2017}, url = {https://hdl.handle.net/10125/41749}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hicss/ArgyropoulosSKM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ict/VassilakisMPML17, author = {Vassilios G. Vassilakis and Haralambos Mouratidis and Emmanouil Panaousis and Ioannis D. Moscholios and Michael D. Logothetis}, title = {Security requirements modelling for virtualized 5G small cell networks}, booktitle = {24th International Conference on Telecommunications, {ICT} 2017, Limassol, Cyprus, May 3-5, 2017}, pages = {1--5}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ICT.2017.7998269}, doi = {10.1109/ICT.2017.7998269}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ict/VassilakisMPML17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/DiamantopoulouK17, author = {Vasiliki Diamantopoulou and Christos Kalloniatis and Stefanos Gritzalis and Haralambos Mouratidis}, editor = {Sabrina De Capitani di Vimercati and Fabio Martinelli}, title = {Supporting Privacy by Design Using Privacy Process Patterns}, booktitle = {{ICT} Systems Security and Privacy Protection - 32nd {IFIP} {TC} 11 International Conference, {SEC} 2017, Rome, Italy, May 29-31, 2017, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {502}, pages = {491--505}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-58469-0\_33}, doi = {10.1007/978-3-319-58469-0\_33}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/DiamantopoulouK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sera/MavropoulosMFP17, author = {Orestis Mavropoulos and Haralambos Mouratidis and Andrew Fish and Emmanouil A. Panaousis}, editor = {Liz Bacon and Jixin Ma and Lachlan M. MacKinnon}, title = {ASTo: {A} tool for security analysis of IoT systems}, booktitle = {15th {IEEE} International Conference on Software Engineering Research, Management and Applications, {SERA} 2017, London, United Kingdom, June 7-9, 2017}, pages = {395--400}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/SERA.2017.7965757}, doi = {10.1109/SERA.2017.7965757}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sera/MavropoulosMFP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/PavlidisMPA17, author = {Michalis Pavlidis and Haralambos Mouratidis and Emmanouil Panaousis and Nikolaos Argyropoulos}, editor = {Javier L{\'{o}}pez and Simone Fischer{-}H{\"{u}}bner and Costas Lambrinoudakis}, title = {Selecting Security Mechanisms in Secure Tropos}, booktitle = {Trust, Privacy and Security in Digital Business - 14th International Conference, TrustBus 2017, Lyon, France, August 30-31, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10442}, pages = {99--114}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64483-7\_7}, doi = {10.1007/978-3-319-64483-7\_7}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustbus/PavlidisMPA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wecwis/ArgyropoulosMF17, author = {Nikolaos Argyropoulos and Haralambos Mouratidis and Andrew Fish}, editor = {Peri Loucopoulos and Yannis Manolopoulos and Oscar Pastor and Babis Theodoulidis and Jelena Zdravkovic}, title = {Attribute-Based Security Verification of Business Process Models}, booktitle = {19th {IEEE} Conference on Business Informatics, {CBI} 2017, Thessaloniki, Greece, July 24-27, 2017, Volume 1: Conference Papers}, pages = {43--52}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CBI.2017.37}, doi = {10.1109/CBI.2017.37}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wecwis/ArgyropoulosMF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/rcis/2017, editor = {Sa{\"{\i}}d Assar and Oscar Pastor and Haralambos Mouratidis}, title = {11th International Conference on Research Challenges in Information Science, {RCIS} 2017, Brighton, United Kingdom, May 10-12, 2017}, publisher = {{IEEE}}, year = {2017}, url = {https://ieeexplore.ieee.org/xpl/conhome/7951529/proceeding}, isbn = {978-1-5090-5476-3}, timestamp = {Mon, 18 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/rcis/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cloudcomp/NaskosGMK16, author = {Athanasios Naskos and Anastasios Gounaris and Haralambos Mouratidis and Panagiotis Katsaros}, title = {Online Analysis of Security Risks in Elastic Cloud Applications}, journal = {{IEEE} Cloud Comput.}, volume = {3}, number = {5}, pages = {26--33}, year = {2016}, url = {https://doi.org/10.1109/MCC.2016.108}, doi = {10.1109/MCC.2016.108}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cloudcomp/NaskosGMK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/AlaviIM16, author = {Reza Alavi and Shareeful Islam and Haralambos Mouratidis}, title = {An information security risk-driven investment model for analysing human factors}, journal = {Inf. Comput. Secur.}, volume = {24}, number = {2}, pages = {205--227}, year = {2016}, url = {https://doi.org/10.1108/ICS-01-2016-0006}, doi = {10.1108/ICS-01-2016-0006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/AlaviIM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/SimouKGM16, author = {Stavros Simou and Christos Kalloniatis and Stefanos Gritzalis and Haralambos Mouratidis}, title = {A survey on cloud forensics challenges and solutions}, journal = {Secur. Commun. Networks}, volume = {9}, number = {18}, pages = {6285--6314}, year = {2016}, url = {https://doi.org/10.1002/sec.1688}, doi = {10.1002/SEC.1688}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/SimouKGM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/caise/MavropoulosMFPK16, author = {Orestis Mavropoulos and Haralambos Mouratidis and Andrew Fish and Emmanouil Panaousis and Christos Kalloniatis}, editor = {John Krogstie and Haralambos Mouratidis and Jianwen Su}, title = {Apparatus: Reasoning About Security Requirements in the Internet of Things}, booktitle = {Advanced Information Systems Engineering Workshops - CAiSE 2016 International Workshops, Ljubljana, Slovenia, June 13-17, 2016, Proceedings}, series = {Lecture Notes in Business Information Processing}, volume = {249}, pages = {219--230}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39564-7\_21}, doi = {10.1007/978-3-319-39564-7\_21}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/caise/MavropoulosMFPK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/es/SprovieriASMMF16, author = {Danillo Sprovieri and Nikolaos Argyropoulos and Carine Souveyet and Ra{\'{u}}l Mazo and Haralambos Mouratidis and Andrew Fish}, editor = {Gang Li and Yale Yu}, title = {Security Alignment Analysis of Software Product Lines}, booktitle = {4th International Conference on Enterprise Systems, {ES} 2016, Melbourne, Australia, November 2-3, 2016}, pages = {97--103}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/ES.2016.19}, doi = {10.1109/ES.2016.19}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/es/SprovieriASMMF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/netsoft/GiannoulakisXKK16, author = {Ioannis Giannoulakis and George Xylouris and Emmanouil Kafetzakis and Anastasios Kourtis and Jose Oscar Fajardo and Pouria Sayyad Khodashenas and Antonino Albanese and Haralambos Mouratidis and Vassilios G. Vassilakis}, title = {System architecture and deployment scenarios for {SESAME:} Small cEllS coodinAtion for Multi-tenancy and Edge services}, booktitle = {{IEEE} NetSoft Conference and Workshops, NetSoft 2016, Seoul, South Korea, June 6-10, 2016}, pages = {447--452}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/NETSOFT.2016.7502483}, doi = {10.1109/NETSOFT.2016.7502483}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/netsoft/GiannoulakisXKK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rcis/ArgyropoulosKMF16, author = {Nikolaos Argyropoulos and Christos Kalloniatis and Haralambos Mouratidis and Andrew Fish}, title = {Incorporating privacy patterns into semi-automatic business process derivation}, booktitle = {Tenth {IEEE} International Conference on Research Challenges in Information Science, {RCIS} 2016, Grenoble, France, June 1-3, 2016}, pages = {1--12}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/RCIS.2016.7549305}, doi = {10.1109/RCIS.2016.7549305}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/rcis/ArgyropoulosKMF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/GharibSPGMPRFS16, author = {Mohamad Gharib and Mattia Salnitri and Elda Paja and Paolo Giorgini and Haralambos Mouratidis and Michalis Pavlidis and Jos{\'{e}} Fran. Ruiz and Sandra Fernandez and Andrea Della Siria}, title = {Privacy Requirements: Findings and Lessons Learned in Developing a Privacy Platform}, booktitle = {24th {IEEE} International Requirements Engineering Conference, {RE} 2016, Beijing, China, September 12-16, 2016}, pages = {256--265}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/RE.2016.13}, doi = {10.1109/RE.2016.13}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/re/GharibSPGMPRFS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/SimouKMG16, author = {Stavros Simou and Christos Kalloniatis and Haralambos Mouratidis and Stefanos Gritzalis}, editor = {Sokratis K. Katsikas and Costas Lambrinoudakis and Steven Furnell}, title = {Towards a Model-Based Framework for Forensic-Enabled Cloud Information Systems}, booktitle = {Trust, Privacy and Security in Digital Business - 13th International Conference, TrustBus 2016, Porto, Portugal, September 7-8, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9830}, pages = {35--47}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44341-6\_3}, doi = {10.1007/978-3-319-44341-6\_3}, timestamp = {Mon, 03 Jan 2022 22:15:14 +0100}, biburl = {https://dblp.org/rec/conf/trustbus/SimouKMG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/SheiKMD16, author = {Shaun Shei and Christos Kalloniatis and Haralambos Mouratidis and Aidan J. Delaney}, editor = {Sokratis K. Katsikas and Costas Lambrinoudakis and Steven Furnell}, title = {Modelling Secure Cloud Computing Systems from a Security Requirements Perspective}, booktitle = {Trust, Privacy and Security in Digital Business - 13th International Conference, TrustBus 2016, Porto, Portugal, September 7-8, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9830}, pages = {48--62}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44341-6\_4}, doi = {10.1007/978-3-319-44341-6\_4}, timestamp = {Thu, 19 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustbus/SheiKMD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/VassilakisPM16, author = {Vassilios G. Vassilakis and Emmanouil Panaousis and Haralambos Mouratidis}, editor = {Sara Foresti and Javier L{\'{o}}pez}, title = {Security Challenges of Small Cell as a Service in Virtualized Mobile Edge Computing Environments}, booktitle = {Information Security Theory and Practice - 10th {IFIP} {WG} 11.2 International Conference, {WISTP} 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9895}, pages = {70--84}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45931-8\_5}, doi = {10.1007/978-3-319-45931-8\_5}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/VassilakisPM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/16/MouratidisAS16, author = {Haralambos Mouratidis and Nikolaos Argyropoulos and Shaun Shei}, editor = {Dimitris Karagiannis and Heinrich C. Mayr and John Mylopoulos}, title = {Security Requirements Engineering for Cloud Computing: The Secure Tropos Approach}, booktitle = {Domain-Specific Conceptual Modeling, Concepts, Methods and Tools}, pages = {357--380}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39417-6\_16}, doi = {10.1007/978-3-319-39417-6\_16}, timestamp = {Tue, 16 May 2017 14:01:44 +0200}, biburl = {https://dblp.org/rec/books/sp/16/MouratidisAS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/caise/2016w, editor = {John Krogstie and Haralambos Mouratidis and Jianwen Su}, title = {Advanced Information Systems Engineering Workshops - CAiSE 2016 International Workshops, Ljubljana, Slovenia, June 13-17, 2016, Proceedings}, series = {Lecture Notes in Business Information Processing}, volume = {249}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39564-7}, doi = {10.1007/978-3-319-39564-7}, isbn = {978-3-319-39563-0}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/caise/2016w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/KavakliKMG15, author = {Evangelia Kavakli and Christos Kalloniatis and Haralambos Mouratidis and Stefanos Gritzalis}, title = {Privacy as an Integral Part of the Implementation of Cloud Solutions}, journal = {Comput. J.}, volume = {58}, number = {10}, pages = {2213--2224}, year = {2015}, url = {https://doi.org/10.1093/comjnl/bxu118}, doi = {10.1093/COMJNL/BXU118}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/KavakliKMG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/infsof/RebolloMFM15, author = {Oscar Rebollo and Daniel Mellado and Eduardo Fern{\'{a}}ndez{-}Medina and Haralambos Mouratidis}, title = {Empirical evaluation of a cloud computing information security governance framework}, journal = {Inf. Softw. Technol.}, volume = {58}, pages = {44--57}, year = {2015}, url = {https://doi.org/10.1016/j.infsof.2014.10.003}, doi = {10.1016/J.INFSOF.2014.10.003}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/infsof/RebolloMFM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/caise/SimouKMG15, author = {Stavros Simou and Christos Kalloniatis and Haralambos Mouratidis and Stefanos Gritzalis}, editor = {Anne Persson and Janis Stirna}, title = {Towards the Development of a Cloud Forensics Methodology: {A} Conceptual Model}, booktitle = {Advanced Information Systems Engineering Workshops - CAiSE 2015 International Workshops, Stockholm, Sweden, June 8-9, 2015, Proceedings}, series = {Lecture Notes in Business Information Processing}, volume = {215}, pages = {470--481}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19243-7\_43}, doi = {10.1007/978-3-319-19243-7\_43}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/caise/SimouKMG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/caise/AlcanizRMMF15, author = {Luis M{\'{a}}rquez Alca{\~{n}}iz and David Garcia Rosado and Haralambos Mouratidis and Daniel Mellado and Eduardo Fern{\'{a}}ndez{-}Medina}, editor = {Anne Persson and Janis Stirna}, title = {A Framework for Secure Migration Processes of Legacy Systems to the Cloud}, booktitle = {Advanced Information Systems Engineering Workshops - CAiSE 2015 International Workshops, Stockholm, Sweden, June 8-9, 2015, Proceedings}, series = {Lecture Notes in Business Information Processing}, volume = {215}, pages = {507--517}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19243-7\_46}, doi = {10.1007/978-3-319-19243-7\_46}, timestamp = {Tue, 19 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/caise/AlcanizRMMF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/PavlidisMGK15, author = {Michalis Pavlidis and Haralambos Mouratidis and Cesar Gonzalez{-}Perez and Christos Kalloniatis}, editor = {Costas Lambrinoudakis and Alban Gabillon}, title = {Addressing Privacy and Trust Issues in Cultural Heritage Modelling}, booktitle = {Risks and Security of Internet and Systems - 10th International Conference, CRiSIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9572}, pages = {3--16}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31811-0\_1}, doi = {10.1007/978-3-319-31811-0\_1}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crisis/PavlidisMGK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/SimouKMG15, author = {Stavros Simou and Christos Kalloniatis and Haralambos Mouratidis and Stefanos Gritzalis}, editor = {Costas Lambrinoudakis and Alban Gabillon}, title = {A Meta-model for Assisting a Cloud Forensics Process}, booktitle = {Risks and Security of Internet and Systems - 10th International Conference, CRiSIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9572}, pages = {177--187}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31811-0\_11}, doi = {10.1007/978-3-319-31811-0\_11}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crisis/SimouKMG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dms/SheiDKM15, author = {Shaun Shei and Aidan J. Delaney and Stelios Kapetanakis and Haralambos Mouratidis}, editor = {Angela Guercio}, title = {Visually Mapping Requirements Models to Cloud Services}, booktitle = {The 21st International Conference on Distributed Multimedia Systems, Vancouver, Canada, August 31 - September 2, 2015}, pages = {108--114}, publisher = {Knowledge Systems Institute}, year = {2015}, url = {https://doi.org/10.18293/DMS2015-015}, doi = {10.18293/DMS2015-015}, timestamp = {Thu, 19 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dms/SheiDKM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/er/ArgyropoulosMF15, author = {Nikolaos Argyropoulos and Haralambos Mouratidis and Andrew Fish}, editor = {Manfred A. Jeusfeld and Kamalakar Karlapalem}, title = {Towards the Derivation of Secure Business Process Designs}, booktitle = {Advances in Conceptual Modeling - {ER} 2015 Workshops, AHA, CMS, EMoV, MoBiD, MORE-BI, MReBA, QMMQ, and {SCME} Stockholm, Sweden, October 19-22, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9382}, pages = {248--258}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25747-1\_25}, doi = {10.1007/978-3-319-25747-1\_25}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/er/ArgyropoulosMF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/haisa/AlaviIML15, author = {Reza Alavi and Shareeful Islam and Haris Mouratidis and Sin Lee}, editor = {Steven Furnell and Nathan L. Clarke}, title = {Managing Social Engineering Attacks- Considering Human Factors and Security Investment}, booktitle = {Ninth International Symposium on Human Aspects of Information Security {\&} Assurance, {HAISA} 2015 ,Lesvos, Greece, July 1-3, 2015, Proceedings}, pages = {161--171}, publisher = {University of Plymouth}, year = {2015}, url = {http://www.cscan.org/openaccess/?paperid=267}, timestamp = {Tue, 06 Jul 2021 12:22:17 +0200}, biburl = {https://dblp.org/rec/conf/haisa/AlaviIML15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/AlaviIM15, author = {Reza Alavi and Shareeful Islam and Haris Mouratidis}, editor = {Hamid Jahankhani and Alex Carlile and Babak Akhgar and Amie Taal and Ali G. Hessami and Amin Hosseinian Far}, title = {Human Factors of Social Engineering Attacks (SEAs) in Hybrid Cloud Environment: Threats and Risks}, booktitle = {Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security - 10th International Conference, {ICGS3} 2015, London, UK, September 15-17, 2015. Proceedings}, series = {Communications in Computer and Information Science}, volume = {534}, pages = {50--56}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23276-8\_5}, doi = {10.1007/978-3-319-23276-8\_5}, timestamp = {Sun, 04 Jun 2017 10:06:27 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/AlaviIM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/IsmailIM15, author = {Umar Mukhtar Ismail and Shareeful Islam and Haralambos Mouratidis}, editor = {Hamid Jahankhani and Alex Carlile and Babak Akhgar and Amie Taal and Ali G. Hessami and Amin Hosseinian Far}, title = {A Framework for Cloud Security Audit}, booktitle = {Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security - 10th International Conference, {ICGS3} 2015, London, UK, September 15-17, 2015. Proceedings}, series = {Communications in Computer and Information Science}, volume = {534}, pages = {296--309}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23276-8\_27}, doi = {10.1007/978-3-319-23276-8\_27}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/IsmailIM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/GanjiMGP15, author = {Daniel Ganji and Haralambos Mouratidis and Saeed Malekshahi Gheytassi and Miltos Petridis}, editor = {Hamid Jahankhani and Alex Carlile and Babak Akhgar and Amie Taal and Ali G. Hessami and Amin Hosseinian Far}, title = {Conflicts Between Security and Privacy Measures in Software Requirements Engineering}, booktitle = {Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security - 10th International Conference, {ICGS3} 2015, London, UK, September 15-17, 2015. Proceedings}, series = {Communications in Computer and Information Science}, volume = {534}, pages = {323--334}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23276-8\_29}, doi = {10.1007/978-3-319-23276-8\_29}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/GanjiMGP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip8-1/ArgyropoulosAMF15, author = {Nikolaos Argyropoulos and Luis M{\'{a}}rquez Alca{\~{n}}iz and Haralambos Mouratidis and Andrew Fish and David Garcia Rosado and Ignacio Garc{\'{\i}}a Rodr{\'{\i}}guez de Guzm{\'{a}}n and Eduardo Fern{\'{a}}ndez{-}Medina}, editor = {Jolita Ralyt{\'{e}} and Sergio Espa{\~{n}}a and Oscar Pastor}, title = {Eliciting Security Requirements for Business Processes of Legacy Systems}, booktitle = {The Practice of Enterprise Modeling - 8th {IFIP} {WG} 8.1. Working Conference, PoEM 2015, Valencia, Spain, November 10-12, 2015, Proceedings}, series = {Lecture Notes in Business Information Processing}, volume = {235}, pages = {91--107}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25897-3\_7}, doi = {10.1007/978-3-319-25897-3\_7}, timestamp = {Tue, 19 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifip8-1/ArgyropoulosAMF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/medi/NaskosGMK15, author = {Athanasios Naskos and Anastasios Gounaris and Haralambos Mouratidis and Panagiotis Katsaros}, editor = {Ladjel Bellatreche and Yannis Manolopoulos}, title = {Security-Aware Elasticity for NoSQL Databases}, booktitle = {Model and Data Engineering - 5th International Conference, {MEDI} 2015, Rhodes, Greece, September 26-28, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9344}, pages = {181--197}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23781-7\_15}, doi = {10.1007/978-3-319-23781-7\_15}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/medi/NaskosGMK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/SheiAMDRF15, author = {Shaun Shei and Luis M{\'{a}}rquez Alca{\~{n}}iz and Haralambos Mouratidis and Aidan J. Delaney and David Garcia Rosado and Eduardo Fern{\'{a}}ndez{-}Medina}, title = {Modelling secure cloud systems based on system requirements}, booktitle = {2nd {IEEE} Workshop on Evolving Security and Privacy Requirements Engineering, {ESPRE} 2015, Ottawa, ON, Canada, August 25, 2015}, pages = {19--24}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ESPRE.2015.7330163}, doi = {10.1109/ESPRE.2015.7330163}, timestamp = {Tue, 19 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/re/SheiAMDRF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/IsmailIM15, author = {Umar Mukhtar Ismail and Shareeful Islam and Haralambos Mouratidis}, title = {Cloud Security Audit for Migration and Continuous Monitoring}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {1081--1087}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.486}, doi = {10.1109/TRUSTCOM.2015.486}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/IsmailIM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/MelladoMF14, author = {Daniel Mellado and Haralambos Mouratidis and Eduardo Fern{\'{a}}ndez{-}Medina}, title = {Secure Tropos framework for software product lines requirements engineering}, journal = {Comput. Stand. Interfaces}, volume = {36}, number = {4}, pages = {711--722}, year = {2014}, url = {https://doi.org/10.1016/j.csi.2013.12.006}, doi = {10.1016/J.CSI.2013.12.006}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/MelladoMF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/KalloniatisMMIGK14, author = {Christos Kalloniatis and Haralambos Mouratidis and Vassilis Manousakis and Shareeful Islam and Stefanos Gritzalis and Evangelia Kavakli}, title = {Towards the design of secure and privacy-oriented information systems in the cloud: Identifying the major concepts}, journal = {Comput. Stand. Interfaces}, volume = {36}, number = {4}, pages = {759--775}, year = {2014}, url = {https://doi.org/10.1016/j.csi.2013.12.010}, doi = {10.1016/J.CSI.2013.12.010}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csi/KalloniatisMMIGK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijismd/PavlidisIMK14, author = {Michalis Pavlidis and Shareeful Islam and Haralambos Mouratidis and Paul Kearney}, title = {Modeling Trust Relationships for Developing Trustworthy Information Systems}, journal = {Int. J. Inf. Syst. Model. Des.}, volume = {5}, number = {1}, pages = {25--48}, year = {2014}, url = {https://doi.org/10.4018/ijismd.2014010102}, doi = {10.4018/IJISMD.2014010102}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijismd/PavlidisIMK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/infsof/IslamMW14, author = {Shareeful Islam and Haralambos Mouratidis and Edgar R. Weippl}, title = {An empirical study on the implementation and evaluation of a goal-driven software development risk management model}, journal = {Inf. Softw. Technol.}, volume = {56}, number = {2}, pages = {117--133}, year = {2014}, url = {https://doi.org/10.1016/j.infsof.2013.06.003}, doi = {10.1016/J.INFSOF.2013.06.003}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/infsof/IslamMW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hci/AlaviIM14, author = {Reza Alavi and Shareeful Islam and Haralambos Mouratidis}, editor = {Theo Tryfonas and Ioannis G. Askoxylakis}, title = {A Conceptual Framework to Analyze Human Factors of Information Security Management System {(ISMS)} in Organizations}, booktitle = {Human Aspects of Information Security, Privacy, and Trust - Second International Conference, {HAS} 2014, Held as Part of {HCI} International 2014, Heraklion, Crete, Greece, June 22-27, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8533}, pages = {297--305}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-07620-1\_26}, doi = {10.1007/978-3-319-07620-1\_26}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hci/AlaviIM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/caise/2014, editor = {Matthias Jarke and John Mylopoulos and Christoph Quix and Colette Rolland and Yannis Manolopoulos and Haralambos Mouratidis and Jennifer Horkoff}, title = {Advanced Information Systems Engineering - 26th International Conference, CAiSE 2014, Thessaloniki, Greece, June 16-20, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8484}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-07881-6}, doi = {10.1007/978-3-319-07881-6}, isbn = {978-3-319-07880-9}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/caise/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/OuedraogoM13, author = {Moussa Ouedraogo and Haralambos Mouratidis}, title = {Selecting a Cloud Service Provider in the age of cybercrime}, journal = {Comput. Secur.}, volume = {38}, pages = {3--13}, year = {2013}, url = {https://doi.org/10.1016/j.cose.2013.01.007}, doi = {10.1016/J.COSE.2013.01.007}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/OuedraogoM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/MouratidisIKG13, author = {Haralambos Mouratidis and Shareeful Islam and Christos Kalloniatis and Stefanos Gritzalis}, title = {A framework to support selection of cloud providers based on security and privacy requirements}, journal = {J. Syst. Softw.}, volume = {86}, number = {9}, pages = {2276--2293}, year = {2013}, url = {https://doi.org/10.1016/j.jss.2013.03.011}, doi = {10.1016/J.JSS.2013.03.011}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jss/MouratidisIKG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/re/KalloniatisMI13, author = {Christos Kalloniatis and Haralambos Mouratidis and Shareeful Islam}, title = {Evaluating cloud deployment scenarios based on security and privacy requirements}, journal = {Requir. Eng.}, volume = {18}, number = {4}, pages = {299--319}, year = {2013}, url = {https://doi.org/10.1007/s00766-013-0166-7}, doi = {10.1007/S00766-013-0166-7}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/re/KalloniatisMI13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sqj/OuedraogoSMPK013, author = {Moussa Ouedraogo and Reijo M. Savola and Haralambos Mouratidis and David Preston and Djamel Khadraoui and Eric Dubois}, title = {Taxonomy of quality metrics for assessing assurance of security correctness}, journal = {Softw. Qual. J.}, volume = {21}, number = {1}, pages = {67--97}, year = {2013}, url = {https://doi.org/10.1007/s11219-011-9169-0}, doi = {10.1007/S11219-011-9169-0}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sqj/OuedraogoSMPK013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/SouagSWM13, author = {Amina Souag and Camille Salinesi and Isabelle Wattiau and Haris Mouratidis}, title = {Using Security and Domain Ontologies for Security Requirements Analysis}, booktitle = {{IEEE} 37th Annual Computer Software and Applications Conference, {COMPSAC} Workshops 2013, Kyoto, Japan, July 22-26, 2013}, pages = {101--107}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/COMPSACW.2013.124}, doi = {10.1109/COMPSACW.2013.124}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/compsac/SouagSWM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/i3e/KalloniatisMMG13, author = {Christos Kalloniatis and Vassilis Manousakis and Haralambos Mouratidis and Stefanos Gritzalis}, editor = {Christos Douligeris and Nineta Polemi and Athanasios Karantjias and Winfried Lamersdorf}, title = {Migrating into the Cloud: Identifying the Major Security and Privacy Concerns}, booktitle = {Collaborative, Trusted and Privacy-Aware e/m-Services - 12th {IFIP} {WG} 6.11 Conference on e-Business, e-Services, and e-Society, {I3E} 2013, Athens, Greece, April 25-26, 2013. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {399}, pages = {73--87}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-37437-1\_7}, doi = {10.1007/978-3-642-37437-1\_7}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/i3e/KalloniatisMMG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/PavlidisMKIG13, author = {Michalis Pavlidis and Haralambos Mouratidis and Christos Kalloniatis and Shareeful Islam and Stefanos Gritzalis}, editor = {Steven Furnell and Costas Lambrinoudakis and Javier L{\'{o}}pez}, title = {Trustworthy Selection of Cloud Providers Based on Security and Privacy Requirements: Justifying Trust Assumptions}, booktitle = {Trust, Privacy, and Security in Digital Business - 10th International Conference, TrustBus 2013, Prague, Czech Republic, August 28-29, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8058}, pages = {185--198}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40343-9\_16}, doi = {10.1007/978-3-642-40343-9\_16}, timestamp = {Mon, 03 Jan 2022 22:15:14 +0100}, biburl = {https://dblp.org/rec/conf/trustbus/PavlidisMKIG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/PavlidisMI12, author = {Michalis Pavlidis and Haralambos Mouratidis and Shareeful Islam}, title = {Modelling Security Using Trust Based Concepts}, journal = {Int. J. Secur. Softw. Eng.}, volume = {3}, number = {2}, pages = {36--53}, year = {2012}, url = {https://doi.org/10.4018/jsse.2012040102}, doi = {10.4018/JSSE.2012040102}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/PavlidisMI12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/IslamMKHZ12, author = {Shareeful Islam and Haralambos Mouratidis and Christos Kalloniatis and Aleksandar Hudic and Lorenz Zechner}, title = {Model Based Process to Support Security and Privacy Requirements Engineering}, journal = {Int. J. Secur. Softw. Eng.}, volume = {3}, number = {3}, pages = {1--22}, year = {2012}, url = {https://doi.org/10.4018/jsse.2012070101}, doi = {10.4018/JSSE.2012070101}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/IslamMKHZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/is/Mouratidis12, author = {Haris Mouratidis}, title = {Preface}, journal = {Inf. Syst.}, volume = {37}, number = {8}, pages = {713}, year = {2012}, url = {https://doi.org/10.1016/j.is.2012.05.013}, doi = {10.1016/J.IS.2012.05.013}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/is/Mouratidis12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/OuedraogoKMD12, author = {Moussa Ouedraogo and Djamel Khadraoui and Haralambos Mouratidis and Eric Dubois}, title = {Appraisal and reporting of security assurance at operational systems level}, journal = {J. Syst. Softw.}, volume = {85}, number = {1}, pages = {193--208}, year = {2012}, url = {https://doi.org/10.1016/j.jss.2011.08.013}, doi = {10.1016/J.JSS.2011.08.013}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jss/OuedraogoKMD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jucs/MatuleviciusMMDH12, author = {Raimundas Matulevicius and Haralambos Mouratidis and Nicolas Mayer and Eric Dubois and Patrick Heymans}, title = {Syntactic and Semantic Extensions to Secure Tropos to Support Security Risk Management}, journal = {J. Univers. Comput. Sci.}, volume = {18}, number = {6}, pages = {816--844}, year = {2012}, url = {https://doi.org/10.3217/jucs-018-06-0816}, doi = {10.3217/JUCS-018-06-0816}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jucs/MatuleviciusMMDH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jucs/MouratidisKIHG12, author = {Haralambos Mouratidis and Christos Kalloniatis and Shareeful Islam and Marc{-}Philippe Huget and Stefanos Gritzalis}, title = {Aligning Security and Privacy to Support the Development of Secure Information Systems}, journal = {J. Univers. Comput. Sci.}, volume = {18}, number = {12}, pages = {1608--1627}, year = {2012}, url = {https://doi.org/10.3217/jucs-018-12-1608}, doi = {10.3217/JUCS-018-12-1608}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jucs/MouratidisKIHG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/caise/AhmedMM12, author = {Naved Ahmed and Raimundas Matulevicius and Haralambos Mouratidis}, editor = {Marite Kirikova and Janis Stirna}, title = {A Model Transformation from Misuse Cases to Secure Tropos}, booktitle = {Proceedings of the CAiSE'12 Forum at the 24\({}^{\mbox{th}}\) International Conference on Advanced Information Systems Engineering (CAiSE), Gdansk, Poland, June 28, 2012}, series = {{CEUR} Workshop Proceedings}, volume = {855}, pages = {7--14}, publisher = {CEUR-WS.org}, year = {2012}, url = {https://ceur-ws.org/Vol-855/paper1.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:33 +0100}, biburl = {https://dblp.org/rec/conf/caise/AhmedMM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/caise/ZarrabiPMIP12, author = {Fatemeh Zarrabi and Michalis Pavlidis and Haralambos Mouratidis and Shareeful Islam and David Preston}, editor = {Marko Bajec and Johann Eder}, title = {A Meta-model for Legal Compliance and Trustworthiness of Information Systems}, booktitle = {Advanced Information Systems Engineering Workshops - CAiSE 2012 International Workshops, Gda{\'{n}}sk, Poland, June 25-26, 2012. Proceedings}, series = {Lecture Notes in Business Information Processing}, volume = {112}, pages = {46--60}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31069-0\_4}, doi = {10.1007/978-3-642-31069-0\_4}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/caise/ZarrabiPMIP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rcis/JorshariMI12, author = {Fatemeh Zarrabi Jorshari and Haralambos Mouratidis and Shareeful Islam}, editor = {Colette Rolland and Jaelson Castro and Oscar Pastor}, title = {Extracting security requirements from relevant laws and regulations}, booktitle = {Sixth International Conference on Research Challenges in Information Science, {RCIS} 2012, Valencia, Spain, May 16-18 2012}, pages = {1--9}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/RCIS.2012.6240443}, doi = {10.1109/RCIS.2012.6240443}, timestamp = {Mon, 18 Jan 2021 08:56:35 +0100}, biburl = {https://dblp.org/rec/conf/rcis/JorshariMI12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rcis/PavlidisMIK12, author = {Michalis Pavlidis and Haralambos Mouratidis and Shareeful Islam and Paul Kearney}, editor = {Colette Rolland and Jaelson Castro and Oscar Pastor}, title = {Dealing with trust and control: {A} meta-model for trustworthy information systems development}, booktitle = {Sixth International Conference on Research Challenges in Information Science, {RCIS} 2012, Valencia, Spain, May 16-18 2012}, pages = {1--9}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/RCIS.2012.6240441}, doi = {10.1109/RCIS.2012.6240441}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/rcis/PavlidisMIK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijhcr/OuedraogoMDK11, author = {Moussa Ouedraogo and Haralambos Mouratidis and Eric Dubois and Djamel Khadraoui}, title = {Security Assurance Evaluation and {IT} Systems' Context of Use Security Criticality}, journal = {Int. J. Handheld Comput. Res.}, volume = {2}, number = {4}, pages = {59--81}, year = {2011}, url = {https://doi.org/10.4018/jhcr.2011100104}, doi = {10.4018/JHCR.2011100104}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijhcr/OuedraogoMDK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/MouratidisK11, author = {Haralambos Mouratidis and Miao Kang}, title = {Secure by Design: Developing Secure Software Systems from the Ground Up}, journal = {Int. J. Secur. Softw. Eng.}, volume = {2}, number = {3}, pages = {23--41}, year = {2011}, url = {https://doi.org/10.4018/jsse.2011070102}, doi = {10.4018/JSSE.2011070102}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/MouratidisK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/Mouratidis11, author = {Haralambos Mouratidis}, title = {Secure Software Systems Engineering: The Secure Tropos Approach (Invited Paper)}, journal = {J. Softw.}, volume = {6}, number = {3}, pages = {331--339}, year = {2011}, url = {https://doi.org/10.4304/jsw.6.3.331-339}, doi = {10.4304/JSW.6.3.331-339}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/Mouratidis11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sosym/IslamMJ11, author = {Shareeful Islam and Haralambos Mouratidis and Jan J{\"{u}}rjens}, title = {A framework to support alignment of secure software engineering with legal regulations}, journal = {Softw. Syst. Model.}, volume = {10}, number = {3}, pages = {369--394}, year = {2011}, url = {https://doi.org/10.1007/s10270-010-0154-z}, doi = {10.1007/S10270-010-0154-Z}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sosym/IslamMJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/OuedraogoMHBKDP11, author = {Moussa Ouedraogo and Haralambos Mouratidis and Artur Hecker and C{\'{e}}dric Bonhomme and Djamel Khadraoui and Eric Dubois and David Preston}, title = {A new approach to evaluating security assurance}, booktitle = {7th International Conference on Information Assurance and Security, {IAS} 2011, Melacca, Malaysia, December 5-8, 2011}, pages = {215--221}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIAS.2011.6122822}, doi = {10.1109/ISIAS.2011.6122822}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/OuedraogoMHBKDP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/caise/PavlidisIM11, author = {Michalis Pavlidis and Shareeful Islam and Haralambos Mouratidis}, editor = {Selmin Nurcan}, title = {A {CASE} Tool to Support Automated Modelling and Analysis of Security Requirements, Based on Secure Tropos}, booktitle = {{IS} Olympics: Information Systems in a Diverse World - CAiSE Forum 2011, London, UK, June 20-24, 2011, Selected Extended Papers}, series = {Lecture Notes in Business Information Processing}, volume = {107}, pages = {95--109}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29749-6\_7}, doi = {10.1007/978-3-642-29749-6\_7}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/caise/PavlidisIM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/KomotoTMYF11, author = {Takafumi Komoto and Kenji Taguchi and Haralambos Mouratidis and Nobukazu Yoshioka and Kokichi Futatsugi}, title = {A Modelling Framework to Support Internal Control}, booktitle = {Fifth International Conference on Secure Software Integration and Reliability Improvement, {SSIRI} 2011, 27-29 June, 2011, Jeju Island, Korea - Companion Volume}, pages = {187--193}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/SSIRI-C.2011.33}, doi = {10.1109/SSIRI-C.2011.33}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ssiri/KomotoTMYF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/mit/11/MouratidisC11, author = {Haralambos Mouratidis and Paolo Ciorgini}, editor = {Eric S. K. Yu and Paolo Giorgini and Neil A. M. Maiden and John Mylopoulos}, title = {Secure Tropos: Extending /* and Tropos to Model Security Throughout the Development Process}, booktitle = {Social Modeling for Requirements Engineering}, series = {Cooperative information systems}, pages = {363--402}, publisher = {{MIT} Press}, year = {2011}, timestamp = {Fri, 22 May 2020 12:08:24 +0200}, biburl = {https://dblp.org/rec/books/mit/11/MouratidisC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/caise/2011, editor = {Haralambos Mouratidis and Colette Rolland}, title = {Advanced Information Systems Engineering - 23rd International Conference, CAiSE 2011, London, UK, June 20-24, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6741}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21640-4}, doi = {10.1007/978-3-642-21640-4}, isbn = {978-3-642-21639-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/caise/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijis/MouratidisJ10, author = {Haralambos Mouratidis and Jan J{\"{u}}rjens}, title = {From goal-driven security requirements engineering to secure design}, journal = {Int. J. Intell. Syst.}, volume = {25}, number = {8}, pages = {813--840}, year = {2010}, url = {https://doi.org/10.1002/int.20432}, doi = {10.1002/INT.20432}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijis/MouratidisJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jot/LowMH10, author = {Graham Low and Haralambos Mouratidis and Brian Henderson{-}Sellers}, title = {Using a Situational Method Engineering Approach to Identify Reusable Method Fragments from the Secure {TROPOS} Methodology}, journal = {J. Object Technol.}, volume = {9}, number = {4}, pages = {93--125}, year = {2010}, url = {https://doi.org/10.5381/jot.2010.9.4.a5}, doi = {10.5381/JOT.2010.9.4.A5}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jot/LowMH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jtaer/MouratidisC10, author = {Haralambos Mouratidis and Piotr Cofta}, title = {Practitioner's challenges in designing trust into online systems}, journal = {J. Theor. Appl. Electron. Commer. Res.}, volume = {5}, number = {3}, pages = {65--77}, year = {2010}, url = {https://doi.org/10.4067/s0718-18762010000300007}, doi = {10.4067/S0718-18762010000300007}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jtaer/MouratidisC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/re/DuboisM10, author = {Eric Dubois and Haralambos Mouratidis}, title = {Guest editorial: security requirements engineering: past, present and future}, journal = {Requir. Eng.}, volume = {15}, number = {1}, pages = {1--5}, year = {2010}, url = {https://doi.org/10.1007/s00766-009-0094-8}, doi = {10.1007/S00766-009-0094-8}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/re/DuboisM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wias/MouratidisKGF10, author = {Haralambos Mouratidis and Manuel Kolp and Paolo Giorgini and St{\'{e}}phane Faulkner}, title = {An architectural description language for secure Multi-Agent Systems}, journal = {Web Intell. Agent Syst.}, volume = {8}, number = {1}, pages = {99--122}, year = {2010}, url = {https://doi.org/10.3233/WIA-2010-0182}, doi = {10.3233/WIA-2010-0182}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wias/MouratidisKGF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/refsq/IslamMW10, author = {Shareeful Islam and Haralambos Mouratidis and Stefan Wagner}, editor = {Roel J. Wieringa and Anne Persson}, title = {Towards a Framework to Elicit and Manage Security and Privacy Requirements from Laws and Regulations}, booktitle = {Requirements Engineering: Foundation for Software Quality, 16th International Working Conference, {REFSQ} 2010, Essen, Germany, June 30 - July 2, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6182}, pages = {255--261}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14192-8\_23}, doi = {10.1007/978-3-642-14192-8\_23}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/refsq/IslamMW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sersc-isa/OuedraogoMDK10, author = {Moussa Ouedraogo and Haralambos Mouratidis and Eric Dubois and Djamel Khadraoui}, editor = {Tai{-}Hoon Kim and Hojjat Adeli}, title = {Information Systems Security Criticality and Assurance Evaluation}, booktitle = {Advances in Computer Science and Information Technology, {AST/UCMA/ISA/ACN} 2010 Conferences, Miyazaki, Japan, June 23-25, 2010. Joint Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6059}, pages = {38--54}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13577-4\_4}, doi = {10.1007/978-3-642-13577-4\_4}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sersc-isa/OuedraogoMDK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/OuedraogoMKD10, author = {Moussa Ouedraogo and Haralambos Mouratidis and Djamel Khadraoui and Eric Dubois}, title = {An Agent-Based System to Support Assurance of Security Requirements}, booktitle = {Fourth International Conference on Secure Software Integration and Reliability Improvement, {SSIRI} 2010, Singapore, June 9-11, 2010}, pages = {78--87}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/SSIRI.2010.32}, doi = {10.1109/SSIRI.2010.32}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ssiri/OuedraogoMKD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/infsof/BeydounLMH09, author = {Ghassan Beydoun and Graham Low and Haralambos Mouratidis and Brian Henderson{-}Sellers}, title = {A security-aware metamodel for multi-agent systems {(MAS)}}, journal = {Inf. Softw. Technol.}, volume = {51}, number = {5}, pages = {832--845}, year = {2009}, url = {https://doi.org/10.1016/j.infsof.2008.05.003}, doi = {10.1016/J.INFSOF.2008.05.003}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/infsof/BeydounLMH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tse/BeydounLHMGPG09, author = {Ghassan Beydoun and Graham C. Low and Brian Henderson{-}Sellers and Haralambos Mouratidis and Jorge J. G{\'{o}}mez{-}Sanz and Juan Pav{\'{o}}n and Cesar Gonzalez{-}Perez}, title = {{FAML:} {A} Generic Metamodel for {MAS} Development}, journal = {{IEEE} Trans. Software Eng.}, volume = {35}, number = {6}, pages = {841--863}, year = {2009}, url = {https://doi.org/10.1109/TSE.2009.34}, doi = {10.1109/TSE.2009.34}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tse/BeydounLHMGPG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/caise/MouratidisSJ09, author = {Haralambos Mouratidis and Ali Sunyaev and Jan J{\"{u}}rjens}, editor = {Pascal van Eck and Jaap Gordijn and Roel J. Wieringa}, title = {Secure Information Systems Engineering: Experiences and Lessons Learned from Two Health Care Projects}, booktitle = {Advanced Information Systems Engineering, 21st International Conference, CAiSE 2009, Amsterdam, The Netherlands, June 8-12, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5565}, pages = {231--245}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02144-2\_21}, doi = {10.1007/978-3-642-02144-2\_21}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/caise/MouratidisSJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsr/OuedraogoMKD09, author = {Moussa Ouedraogo and Haralambos Mouratidis and Djamel Khadraoui and Eric Dubois}, title = {A Risk Based Approach for Security Assurance Evaluation of {IT} Systems}, booktitle = {7th Annual Conference on Communication Networks and Services Research, {CNSR} 2009, 11-13 May 2009, Moncton, New Brunswick, Canada}, pages = {428--430}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CNSR.2009.74}, doi = {10.1109/CNSR.2009.74}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cnsr/OuedraogoMKD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/MouratidisG09, author = {Haralambos Mouratidis and Paolo Giorgini}, editor = {Mike Barley and Haralambos Mouratidis and Amy Unruh and Diana F. Spears and Paul Scerri and Fabio Massacci}, title = {Enhancing Secure Tropos to Effectively Deal with Security Requirements in the Development of Multiagent Systems}, booktitle = {Safety and Security in Multiagent Systems - Research Results from 2004-2006}, series = {Lecture Notes in Computer Science}, volume = {4324}, pages = {8--26}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04879-1\_2}, doi = {10.1007/978-3-642-04879-1\_2}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lncs/MouratidisG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eann/2009, editor = {Dominic Palmer{-}Brown and Chrisina Draganova and Elias Pimenidis and Haris Mouratidis}, title = {Engineering Applications of Neural Networks - 11th International Conference, {EANN} 2009, London, UK, August 27-29, 2009. Proceedings}, series = {Communications in Computer and Information Science}, volume = {43}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03969-0}, doi = {10.1007/978-3-642-03969-0}, isbn = {978-3-642-03968-3}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eann/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/lncs/4324, editor = {Mike Barley and Haralambos Mouratidis and Amy Unruh and Diana F. Spears and Paul Scerri and Fabio Massacci}, title = {Safety and Security in Multiagent Systems - Research Results from 2004-2006}, series = {Lecture Notes in Computer Science}, volume = {4324}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04879-1}, doi = {10.1007/978-3-642-04879-1}, isbn = {978-3-642-04878-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lncs/4324.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/MouratidisJN08, author = {Haralambos Mouratidis and Hamid Jahankhani and Mathews Z. Nkhoma}, title = {Management versus security specialists: an empirical study on security related perceptions}, journal = {Inf. Manag. Comput. Secur.}, volume = {16}, number = {2}, pages = {187--205}, year = {2008}, url = {https://doi.org/10.1108/09685220810879645}, doi = {10.1108/09685220810879645}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/MouratidisJN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/caise/MatuleviciusMMDHG08, author = {Raimundas Matulevicius and Nicolas Mayer and Haralambos Mouratidis and Eric Dubois and Patrick Heymans and Nicolas Genon}, editor = {Zohra Bellahsene and Michel L{\'{e}}onard}, title = {Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development}, booktitle = {Advanced Information Systems Engineering, 20th International Conference, CAiSE 2008, Montpellier, France, June 16-20, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5074}, pages = {541--555}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-69534-9\_40}, doi = {10.1007/978-3-540-69534-9\_40}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/caise/MatuleviciusMMDHG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isdevel/BimrahMP08, author = {Kamaljit Kaur Bimrah and Haralambos Mouratidis and David Preston}, editor = {George Angelos Papadopoulos and Wita Wojtkowski and W. Gregory Wojtkowski and Stanislaw Wrycza and Joze Zupancic}, title = {A Language for Modelling Trust in Information Systems}, booktitle = {Information Systems Development, Towards a Service Provision Society [Proceedings of {ISD} 2008, University of Cyprus, Paphos, Cyprus. August 25-27, 2008]}, pages = {599--608}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/b137171\_62}, doi = {10.1007/B137171\_62}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isdevel/BimrahMP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/models/Mouratidis08, author = {Haralambos Mouratidis}, editor = {Jon Whittle and Jan J{\"{u}}rjens and Bashar Nuseibeh and Glen Dobson}, title = {Curriculum for Modeling Security: Experiences and Lessons Learned}, booktitle = {Proceedings of the Workshop on Modeling Security {(} {MODSEC08} {)} held as part of the 2008 International Conference on Model Driven Engineering Languages and Systems {(} {MODELS} {)} Toulouse, France, September 28, 2008}, series = {{CEUR} Workshop Proceedings}, volume = {413}, publisher = {CEUR-WS.org}, year = {2008}, url = {https://ceur-ws.org/Vol-413/paper04.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:21 +0100}, biburl = {https://dblp.org/rec/conf/models/Mouratidis08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ntms/OuedraogoKRDM08, author = {Moussa Ouedraogo and Djamel Khadraoui and Beno{\^{\i}}t De R{\'{e}}mont and Eric Dubois and Haralambos Mouratidis}, editor = {Akshai Aggarwal and Mohamad Badra and Fabio Massacci}, title = {Deployment of a Security Assurance Monitoring Framework for Telecommunication Service Infrastructures on a VoIP Service}, booktitle = {{NTMS} 2008, 2nd International Conference on New Technologies, Mobility and Security, November 5-7, 2008, Tangier, Morocco}, pages = {1--5}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/NTMS.2008.ECP.38}, doi = {10.1109/NTMS.2008.ECP.38}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ntms/OuedraogoKRDM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/WeissM08, author = {Michael Weiss and Haralambos Mouratidis}, title = {Selecting Security Patterns that Fulfill Security Requirements}, booktitle = {16th {IEEE} International Requirements Engineering Conference, {RE} 2008, 8-12 September 2008, Barcelona, Catalunya, Spain}, pages = {169--172}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/RE.2008.32}, doi = {10.1109/RE.2008.32}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/re/WeissM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/aois/2006, editor = {Manuel Kolp and Brian Henderson{-}Sellers and Haralambos Mouratidis and Alessandro Garcia and Aditya Ghose and Paolo Bresciani}, title = {Agent-Oriented Information Systems IV, 8th International Bi-Conference Workshop, {AOIS} 2006, Hakodate, Japan, May 9, 2006 and Luxembourg, Luxembourg, June 6, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4898}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-77990-2}, doi = {10.1007/978-3-540-77990-2}, isbn = {978-3-540-77989-6}, timestamp = {Fri, 06 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aois/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/Mouratidis07, author = {Haralambos Mouratidis}, title = {Secure information systems engineering: a manifesto}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {1}, number = {1}, pages = {27--41}, year = {2007}, url = {https://doi.org/10.1504/IJESDF.2007.013590}, doi = {10.1504/IJESDF.2007.013590}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/Mouratidis07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisp/JahankhaniFNM07, author = {Hamid Jahankhani and Shantha Fernando and Mathews Z. Nkhoma and Haralambos Mouratidis}, title = {Information Systems Security: Cases of Network Administrator Threats}, journal = {Int. J. Inf. Secur. Priv.}, volume = {1}, number = {3}, pages = {13--25}, year = {2007}, url = {https://doi.org/10.4018/jisp.2007070102}, doi = {10.4018/JISP.2007070102}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisp/JahankhaniFNM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijseke/MouratidisG07, author = {Haralambos Mouratidis and Paolo Giorgini}, title = {Secure Tropos: a Security-Oriented Extension of the Tropos Methodology}, journal = {Int. J. Softw. Eng. Knowl. Eng.}, volume = {17}, number = {2}, pages = {285--309}, year = {2007}, url = {https://doi.org/10.1142/S0218194007003240}, doi = {10.1142/S0218194007003240}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijseke/MouratidisG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/is/MouratidisG07, author = {Haralambos Mouratidis and Paolo Giorgini}, title = {Security Attack Testing {(SAT)} - testing the security of information systems at design time}, journal = {Inf. Syst.}, volume = {32}, number = {8}, pages = {1166--1183}, year = {2007}, url = {https://doi.org/10.1016/j.is.2007.03.002}, doi = {10.1016/J.IS.2007.03.002}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/is/MouratidisG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/emmsad/BeydounLMH07, author = {Ghassan Beydoun and Graham Low and Haris Mouratidis and Brian Henderson{-}Sellers}, editor = {Erik Proper and Terry A. Halpin and John Krogstie}, title = {Modelling MAS-Specific Security Features}, booktitle = {Proceedings of the 12th International Workshop on Exploring Modeling Methods for Systems Analysis and Design, {EMMSAD} 2008, held in conjunction with the 19th Conference on Advanced Information Systems (CAiSE 2007), Trondheim, Norway, 11-15 June, 2007}, series = {{CEUR} Workshop Proceedings}, volume = {365}, pages = {173--182}, publisher = {CEUR-WS.org}, year = {2007}, url = {https://ceur-ws.org/Vol-365/paper18.pdf}, timestamp = {Fri, 10 Mar 2023 16:23:10 +0100}, biburl = {https://dblp.org/rec/conf/emmsad/BeydounLMH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iat/Al-ZakwaniBM07, author = {Abdullah Al{-}Zakwani and Allan J. Brimicombe and Haralambos Mouratidis}, title = {An Agent-Based System to Support Geo-Information Analysis}, booktitle = {Proceedings of the 2007 {IEEE/WIC/ACM} International Conference on Intelligent Agent Technology, Silicon Valley, CA, USA, November 2-5, 2007}, pages = {269--272}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/IAT.2007.13}, doi = {10.1109/IAT.2007.13}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iat/Al-ZakwaniBM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isdevel/BimrahMP07, author = {Kamaljit Kaur Bimrah and Haralambos Mouratidis and David Preston}, editor = {Chris Barry and Michael Lang and Wita Wojtkowski and Kieran Conboy and W. Gregory Wojtkowski}, title = {Trust Ontology for Information Systems Development}, booktitle = {Information Systems Development, Challenges in Practice, Theory, and Education Volume 2 [Proceedings of {ISD} 2007, National University of Ireland, Galway, Ireland. August 29-31, 2007]}, pages = {767--779}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-78578-3\_14}, doi = {10.1007/978-0-387-78578-3\_14}, timestamp = {Sat, 26 Aug 2017 16:52:21 +0200}, biburl = {https://dblp.org/rec/conf/isdevel/BimrahMP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/otm/BimrahMP07, author = {Kamaljit Kaur Bimrah and Haralambos Mouratidis and David Preston}, editor = {Robert Meersman and Zahir Tari and Pilar Herrero}, title = {Information Systems Development: {A} Trust Ontology}, booktitle = {On the Move to Meaningful Internet Systems 2007: {OTM} 2007 Workshops, {OTM} Confederated International Workshops and Posters, AWeSOMe, CAMS, {OTM} Academy Doctoral Consortium, MONET, OnToContent, ORM, PerSys, PPN, RDDS, SSWS, and {SWWS} 2007, Vilamoura, Portugal, November 25-30, 2007, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {4805}, pages = {25--26}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76888-3\_13}, doi = {10.1007/978-3-540-76888-3\_13}, timestamp = {Thu, 14 Oct 2021 10:28:28 +0200}, biburl = {https://dblp.org/rec/conf/otm/BimrahMP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijseke/MouratidisWG06, author = {Haralambos Mouratidis and Michael Weiss and Paolo Giorgini}, title = {Modeling Secure Systems Using an Agent-oriented Approach and Security Patterns}, journal = {Int. J. Softw. Eng. Knowl. Eng.}, volume = {16}, number = {3}, pages = {471}, year = {2006}, url = {https://doi.org/10.1142/S0218194006002823}, doi = {10.1142/S0218194006002823}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijseke/MouratidisWG06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/caise/MouratidisJF06, author = {Haralambos Mouratidis and Jan J{\"{u}}rjens and Jorge Fox}, editor = {Eric Dubois and Klaus Pohl}, title = {Towards a Comprehensive Framework for Secure Systems Development}, booktitle = {Advanced Information Systems Engineering, 18th International Conference, CAiSE 2006, Luxembourg, Luxembourg, June 5-9, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4001}, pages = {48--62}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11767138\_5}, doi = {10.1007/11767138\_5}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/caise/MouratidisJF06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iat/DehousseLFKM06, author = {St{\'{e}}phane Dehousse and Lin Liu and St{\'{e}}phane Faulkner and Manuel Kolp and Haralambos Mouratidis}, title = {Modeling Delegation through an i*-based Approach}, booktitle = {Proceedings of the 2006 {IEEE/WIC/ACM} International Conference on Intelligent Agent Technology, Hong Kong, China, 18-22 December 2006}, pages = {393--397}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/IAT.2006.89}, doi = {10.1109/IAT.2006.89}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iat/DehousseLFKM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/selmas/DehousseFMGK06, author = {St{\'{e}}phane Dehousse and St{\'{e}}phane Faulkner and Haralambos Mouratidis and Paolo Giorgini and Manuel Kolp}, editor = {Ricardo Choren and Alessandro F. Garcia and Holger Giese and Ho{-}fung Leung and Carlos Jos{\'{e}} Pereira de Lucena and Alexander B. Romanovsky}, title = {Reasoning about willingness in networks of agents}, booktitle = {Proceedings of the 2006 international workshop on Software engineering for large-scale multi-agent systems, {SELMAS} '06, Shanghai, China, May 22-23, 2006}, pages = {91--98}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1138063.1138080}, doi = {10.1145/1138063.1138080}, timestamp = {Thu, 18 Aug 2022 13:33:52 +0200}, biburl = {https://dblp.org/rec/conf/selmas/DehousseFMGK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/selmas/DehousseFMKG06, author = {St{\'{e}}phane Dehousse and St{\'{e}}phane Faulkner and Haralambos Mouratidis and Manuel Kolp and Paolo Giorgini}, editor = {Ricardo Choren and Alessandro F. Garcia and Holger Giese and Ho{-}fung Leung and Carlos Jos{\'{e}} Pereira de Lucena and Alexander B. Romanovsky}, title = {Reasoning About Willingness in Networks of Agents}, booktitle = {Software Engineering for Multi-Agent Systems V, Research Issues and Practical Applications [the book is a result of {SELMAS} 2006]}, series = {Lecture Notes in Computer Science}, volume = {4408}, pages = {117--131}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-73131-3\_7}, doi = {10.1007/978-3-540-73131-3\_7}, timestamp = {Mon, 20 Dec 2021 09:52:14 +0100}, biburl = {https://dblp.org/rec/conf/selmas/DehousseFMKG06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Mouratidis05, author = {Haralambos Mouratidis}, title = {Safety and Security in Multiagent Systems: Report on the 2nd {SASEMAS} workshop (SASEMAS'05)}, journal = {Comput. Secur.}, volume = {24}, number = {8}, pages = {614--617}, year = {2005}, url = {https://doi.org/10.1016/j.cose.2005.08.001}, doi = {10.1016/J.COSE.2005.08.001}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Mouratidis05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/is/MouratidisGM05, author = {Haralambos Mouratidis and Paolo Giorgini and Gordon A. Manson}, title = {When security meets software engineering: a case of modelling secure information systems}, journal = {Inf. Syst.}, volume = {30}, number = {8}, pages = {609--629}, year = {2005}, url = {https://doi.org/10.1016/j.is.2004.06.002}, doi = {10.1016/J.IS.2004.06.002}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/is/MouratidisGM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atal/MouratidisKFG05, author = {Haralambos Mouratidis and Manuel Kolp and St{\'{e}}phane Faulkner and Paolo Giorgini}, editor = {Frank Dignum and Virginia Dignum and Sven Koenig and Sarit Kraus and Munindar P. Singh and Michael J. Wooldridge}, title = {A secure architectural description language for agent systems}, booktitle = {4th International Joint Conference on Autonomous Agents and Multiagent Systems {(AAMAS} 2005), July 25-29, 2005, Utrecht, The Netherlands}, pages = {578--585}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1082473.1082561}, doi = {10.1145/1082473.1082561}, timestamp = {Fri, 26 Apr 2019 14:26:42 +0200}, biburl = {https://dblp.org/rec/conf/atal/MouratidisKFG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/er/MouratidisWG05, author = {Haralambos Mouratidis and Michael Weiss and Paolo Giorgini}, editor = {Lois M. L. Delcambre and Christian Kop and Heinrich C. Mayr and John Mylopoulos and Oscar Pastor}, title = {Security Patterns Meet Agent Oriented Software Engineering: {A} Complementary Solution for Developing Secure Information Systems}, booktitle = {Conceptual Modeling - {ER} 2005, 24th International Conference on Conceptual Modeling, Klagenfurt, Austria, October 24-28, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3716}, pages = {225--240}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11568322\_15}, doi = {10.1007/11568322\_15}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/er/MouratidisWG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iat/FaulknerDKMG05, author = {St{\'{e}}phane Faulkner and St{\'{e}}phane Dehousse and Manuel Kolp and Haralambos Mouratidis and Paolo Giorgini}, editor = {Andrzej Skowron and Jean{-}Paul A. Barth{\`{e}}s and Lakhmi C. Jain and Ron Sun and Pierre Morizet{-}Mahoudeaux and Jiming Liu and Ning Zhong}, title = {Delegation Mechanisms for Agent Architectural Design}, booktitle = {Proceedings of the 2005 {IEEE/WIC/ACM} International Conference on Intelligent Agent Technology, Compiegne, France, September 19-22, 2005}, pages = {503--507}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/IAT.2005.65}, doi = {10.1109/IAT.2005.65}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iat/FaulknerDKMG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/selmas/MouratidisW05, author = {Haralambos Mouratidis and Michael Weiss}, editor = {Alessandro F. Garcia and Ricardo Choren and Carlos Jos{\'{e}} Pereira de Lucena and Paolo Giorgini and Tom Holvoet and Alexander B. Romanovsky}, title = {Patterns for Modelling Agent Systems with Tropos}, booktitle = {Software Engineering for Multi-Agent Systems IV, Research Issues and Practical Applications [the book is a result of {SELMAS} 2005]}, series = {Lecture Notes in Computer Science}, volume = {3914}, pages = {207--223}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11738817\_13}, doi = {10.1007/11738817\_13}, timestamp = {Mon, 20 Dec 2021 10:29:19 +0100}, biburl = {https://dblp.org/rec/conf/selmas/MouratidisW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iceis/MouratidisGM04, author = {Haralambos Mouratidis and Paolo Giorgini and Gordon A. Manson}, title = {Using Security Attack Scenarios to Analyse Security During Information Systems Design}, booktitle = {{ICEIS} 2004, Proceedings of the 6th International Conference on Enterprise Information Systems, Porto, Portugal, April 14-17, 2004}, pages = {10--17}, year = {2004}, timestamp = {Thu, 02 Feb 2017 12:56:49 +0100}, biburl = {https://dblp.org/rec/conf/iceis/MouratidisGM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/hij/MouratidisMP03, author = {Haralambos Mouratidis and Gordon A. Manson and Ian R. Philp}, title = {Analysis and Design of the eSAP: An Integrated Health and Social Care Information System}, journal = {Health Informatics J.}, volume = {9}, number = {2}, pages = {89--92}, year = {2003}, url = {https://doi.org/10.1177/1460458203009002003}, doi = {10.1177/1460458203009002003}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/hij/MouratidisMP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/hij/MouratidisMP03a, author = {Haralambos Mouratidis and Gordon A. Manson and Ian R. Philp}, title = {A Novel Agent-Based System to Support the Single Assessment Process of Older People}, journal = {Health Informatics J.}, volume = {9}, number = {3}, pages = {149--162}, year = {2003}, url = {https://doi.org/10.1177/14604582030093003}, doi = {10.1177/14604582030093003}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/hij/MouratidisMP03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aose/PoggiRTOMM03, author = {Agostino Poggi and Giovanni Rimassa and Paola Turci and James Odell and Haralambos Mouratidis and Gordon A. Manson}, editor = {Paolo Giorgini and J{\"{o}}rg P. M{\"{u}}ller and James Odell}, title = {Modeling Deployment and Mobility Issues in Multiagent Systems Using {AUML}}, booktitle = {Agent-Oriented Software Engineering IV, 4th International Workshop, {AOSE} 2003, Melbourne, Australia, July 15, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2935}, pages = {69--84}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24620-6\_5}, doi = {10.1007/978-3-540-24620-6\_5}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/aose/PoggiRTOMM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atal/MouratidisGM03, author = {Haralambos Mouratidis and Paolo Giorgini and Gordon A. Manson}, title = {Modelling secure multiagent systems}, booktitle = {The Second International Joint Conference on Autonomous Agents {\&} Multiagent Systems, {AAMAS} 2003, July 14-18, 2003, Melbourne, Victoria, Australia, Proceedings}, pages = {859--866}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/860575.860713}, doi = {10.1145/860575.860713}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/atal/MouratidisGM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/caise/MouratidisGM03, author = {Haralambos Mouratidis and Paolo Giorgini and Gordon A. Manson}, editor = {Johann Eder and Michele Missikoff}, title = {Integrating Security and Systems Engineering: Towards the Modelling of Secure Information Systems}, booktitle = {Advanced Information Systems Engineering, 15th International Conference, CAiSE 2003, Klagenfurt, Austria, June 16-18, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2681}, pages = {63--78}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45017-3\_7}, doi = {10.1007/3-540-45017-3\_7}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/caise/MouratidisGM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/europlop/MouratidisGS03, author = {Haralambos Mouratidis and Paolo Giorgini and Markus Schumacher}, editor = {Kevlin Henney and Dietmar Sch{\"{u}}tz}, title = {A Set of Patterns for Secure Agent Systems}, booktitle = {Proceedings of the 8th European Conference on Pattern Languages of Programms (EuroPLoP '2003), Irsee, Germany, June 25-29, 2003}, pages = {399--416}, publisher = {{UVK} - Universitaetsverlag Konstanz}, year = {2003}, url = {http://hillside.net/europlop/HillsideEurope/Papers/EuroPLoP2003/2003\_MouratidisEtAl\_ASetOfPatternsForSecureAgentSystems.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/europlop/MouratidisGS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iceis/MouratidisMGG03, author = {Haralambos Mouratidis and Gordon A. Manson and Abdullah Gani and Paolo Giorgini}, title = {Analysing Security Requirements of Information Systems Using Tropos}, booktitle = {{ICEIS} 2003, Proceedings of the 5th International Conference on Enterprise Information Systems, Angers, France, April 22-26, 2003}, pages = {623--626}, year = {2003}, timestamp = {Thu, 02 Feb 2017 12:57:29 +0100}, biburl = {https://dblp.org/rec/conf/iceis/MouratidisMGG03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kes/MouratidisGM03, author = {Haralambos Mouratidis and Paolo Giorgini and Gordon A. Manson}, editor = {Vasile Palade and Robert J. Howlett and Lakhmi C. Jain}, title = {An Ontology for Modelling Security: The Tropos Approach}, booktitle = {Knowledge-Based Intelligent Information and Engineering Systems, 7th International Conference, {KES} 2003, Oxford, UK, September 3-5, 2003, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {2773}, pages = {1387--1394}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45224-9\_187}, doi = {10.1007/978-3-540-45224-9\_187}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/kes/MouratidisGM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/selmas/BrescianiGMM03, author = {Paolo Bresciani and Paolo Giorgini and Haralambos Mouratidis and Gordon A. Manson}, editor = {Carlos Jos{\'{e}} Pereira de Lucena and Alessandro F. Garcia and Alexander B. Romanovsky and Jaelson Castro and Paulo S. C. Alencar}, title = {Multi-agent Systems and Security Requirements Analysis}, booktitle = {Software Engineering for Multi-Agent Systems II, Research Issues and Practical Applications [the book is a result of {SELMAS} 2003]}, series = {Lecture Notes in Computer Science}, volume = {2940}, pages = {35--48}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24625-1\_3}, doi = {10.1007/978-3-540-24625-1\_3}, timestamp = {Fri, 06 Nov 2020 10:10:09 +0100}, biburl = {https://dblp.org/rec/conf/selmas/BrescianiGMM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aois/MouratidisGPM02, author = {Haralambos Mouratidis and Paolo Giorgini and Ian R. Philp and Gordon A. Manson}, editor = {Paolo Giorgini and Yves Lesp{\'{e}}rance and Gerd Wagner and Eric S. K. Yu}, title = {Using Tropos Methodology to Model an Integrated Health Assessment System}, booktitle = {{AOIS} '02, Agent-Oriented Information Systems, Proceedings of the Fourth International Bi-Conference Workshop on Agent-Oriented Information Systems {(AOIS-2002} at CAiSE*02)}, series = {{CEUR} Workshop Proceedings}, volume = {57}, publisher = {CEUR-WS.org}, year = {2002}, url = {https://ceur-ws.org/Vol-57/id-16.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:53 +0100}, biburl = {https://dblp.org/rec/conf/aois/MouratidisGPM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.