


Остановите войну!
for scientists:


default search action
Haralambos Mouratidis
Haris Mouratidis
Person information

- affiliation: University of Brighton, School of Computing, Engineering and Mathematics, UK
- affiliation (former): University of East London, UK
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j68]Haralambos Mouratidis
, Shareeful Islam, Antonio Santos-Olmo Parra
, Luís Enrique Sanchez, Umar Mukhtar Ismail:
Modelling language for cyber security incident handling for critical infrastructures. Comput. Secur. 128: 103139 (2023) - [j67]Luís Enrique Sanchez
, Antonio Santos-Olmo Parra
, Haralambos Mouratidis
, Eduardo Fernández-Medina
:
New Frontiers in Security Risk Management. IT Prof. 25(3): 61-67 (2023) - [c98]Mohammed Ghazi Al-Obeidallah, Luca Piras, Onyinye Iloanugo, Haralambos Mouratidis, Duaa Alkubaisy, Daniele Dellagiacoma:
Goal-Modeling Privacy-by-Design Patterns for Supporting GDPR Compliance. ICSOFT 2023: 361-368 - [e11]Selmin Nurcan
, Andreas L. Opdahl
, Haralambos Mouratidis
, Aggeliki Tsohou
:
Research Challenges in Information Science: Information Science and the Connected World - 17th International Conference, RCIS 2023, Corfu, Greece, May 23-26, 2023, Proceedings. Lecture Notes in Business Information Processing 476, Springer 2023, ISBN 978-3-031-33079-7 [contents] - 2022
- [j66]Sana Alam
, Shehnila Zardari
, Shaheena Noor, Shakil Ahmed, Haralambos Mouratidis:
Trust Management in Social Internet of Things (SIoT): A Survey. IEEE Access 10: 108924-108954 (2022) - [j65]David G. Rosado, Antonio Santos-Olmo Parra
, Luís Enrique Sanchez, Manuel A. Serrano, Carlos Blanco, Haralambos Mouratidis, Eduardo Fernández-Medina:
Managing cybersecurity risks of cyber-physical systems: The MARISMA-CPS pattern. Comput. Ind. 142: 103715 (2022) - [j64]Shareeful Islam, Abdulrazaq Abba, Umar Mukhtar Ismail, Haralambos Mouratidis, Spyridon Papastergiou:
Vulnerability prediction for secure healthcare supply chain service delivery. Integr. Comput. Aided Eng. 29(4): 389-409 (2022) - [j63]Kitty Kioskli, Daniele Dellagiacoma
, Theofanis Fotis
, Haralambos Mouratidis:
The supply chain of a Living Lab: Modelling security, privacy, and vulnerability issues alongside with their impact and potential mitigation strategies. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 13(2): 147-182 (2022) - [j62]Halima Ibrahim Kure, Shareeful Islam, Haralambos Mouratidis:
An integrated cyber security risk management framework and risk predication for the critical infrastructure protection. Neural Comput. Appl. 34(18): 15241-15271 (2022) - [j61]Rose Adee
, Haralambos Mouratidis:
A Dynamic Four-Step Data Security Model for Data in Cloud Computing Based on Cryptography and Steganography. Sensors 22(3): 1109 (2022) - [c97]Mohammad Heydari
, Haralambos Mouratidis, Vahid Heydari Fami Tafreshi:
OntoCyrene: Towards Ontology-Enhanced Asset Modelling for Supply Chains in the Context of Cyber Security. CyberICPS/SECPRE/SPOSE/CPS4CIP/CDT&SECOMAN/EIS/SecAssure@ESORICS 2022: 157-176 - 2021
- [j60]Spyridon Papastergiou, Haralambos Mouratidis
, Eleni-Maria Kalogeraki:
Handling of advanced persistent threats and complex incidents in healthcare, transportation and energy ICT infrastructures. Evol. Syst. 12(1): 91-108 (2021) - [j59]Luca Piras, Mohammed Ghazi Al-Obeidallah, Michalis Pavlidis, Haralambos Mouratidis, Aggeliki Tsohou, Emmanouil Magkos, Andrea Praitano:
A Data Scope Management Service to Support Privacy by Design and GDPR Compliance. J. Data Intell. 2(2): 136-165 (2021) - [c96]Kitty Kioskli
, Theo Fotis
, Haralambos Mouratidis:
The landscape of cybersecurity vulnerabilities and challenges in healthcare: Security standards and paradigm shift recommendations. ARES 2021: 136:1-136:9 - [c95]Duaa Alkubaisy
, Luca Piras, Mohammed Ghazi Al-Obeidallah, Karl Cox, Haralambos Mouratidis:
A Framework for Privacy and Security Requirements Analysis and Conflict Resolution for Supporting GDPR Compliance Through Privacy-by-Design. ENASE (Selected Papers) 2021: 67-87 - [c94]Duaa Alkubaisy, Luca Piras
, Mohammed Ghazi Al-Obeidallah
, Karl Cox, Haralambos Mouratidis:
ConfIs: A Tool for Privacy and Security Analysis and Conflict Resolution for Supporting GDPR Compliance through Privacy-by-Design. ENASE 2021: 80-91 - [c93]Shareeful Islam, Haralambos Mouratidis, Hasan Mahmud:
An Automated Tool to Support an Intelligence Learner Management System Using Learning Analytics and Machine Learning. AIAI 2021: 494-504 - [c92]Abel Yeboah-Ofori, Haralambos Mouratidis, Umar Mukhtar Ismail, Shareeful Islam, Spyridon Papastergiou:
Cyber Supply Chain Threat Analysis and Prediction Using Machine Learning and Ontology. AIAI 2021: 518-530 - [c91]Shareeful Islam, Spyridon Papastergiou, Haralambos Mouratidis:
A Dynamic Cyber Security Situational Awareness Framework for Healthcare ICT Infrastructures. PCI 2021: 334-339 - 2020
- [j58]Nikolaos Polatidis
, Elias Pimenidis, Michalis Pavlidis
, Spyridon Papastergiou, Haralambos Mouratidis:
From product recommendation to cyber-attack prediction: generating attack graphs and predicting future attacks. Evol. Syst. 11(3): 479-490 (2020) - [j57]Aggeliki Tsohou, Emmanouil Magkos, Haralambos Mouratidis, George Chrysoloras, Luca Piras
, Michalis Pavlidis
, Julien Debussche, Marco Rotoloni, Beatriz Gallego-Nicasio Crespo:
Privacy, security, legal and technology acceptance elicited and consolidated requirements for a GDPR compliance platform. Inf. Comput. Secur. 28(4): 531-553 (2020) - [j56]Renata Medeiros de Carvalho
, Camillo Del Prete, Yod Samuel Martín, Rosa M. Araujo Rivero
, Melek Önen, Francesco Paolo Schiavo, Ángel Cuevas Rumín
, Haralambos Mouratidis, Juan C. Yelmo, Maria N. Koukovini:
Protecting Citizens' Personal Data and Privacy: Joint Effort from GDPR EU Cluster Research Projects. SN Comput. Sci. 1(4): 217 (2020) - [j55]Haralambos Mouratidis, Shaun Shei
, Aidan J. Delaney:
A security requirements modelling language for cloud computing environments. Softw. Syst. Model. 19(2): 271-295 (2020) - [j54]Mattia Salnitri, Konstantinos Angelopoulos, Michalis Pavlidis
, Vasiliki Diamantopoulou, Haralambos Mouratidis, Paolo Giorgini
:
Modelling the interplay of security, privacy and trust in sociotechnical systems: a computer-aided design approach. Softw. Syst. Model. 19(2): 467-491 (2020) - [j53]Nikolaos Argyropoulos, Haralambos Mouratidis, Andrew Fish
:
Enhancing secure business process design with security process patterns. Softw. Syst. Model. 19(3): 555-577 (2020) - [c90]Haralambos Mouratidis
, Jelena Zdravkovic
, Janis Stirna
:
Cyber Security Resilience in Business Informatics: An Exploratory Paper. BIR 2020: 53-66 - [c89]Luca Piras
, Mohammed Ghazi Al-Obeidallah
, Michalis Pavlidis
, Haralambos Mouratidis, Aggeliki Tsohou, Emmanouil Magkos, Andrea Praitano, Annarita Iodice, Beatriz Gallego-Nicasio Crespo:
DEFeND DSM: A Data Scope Management Service for Model-Based Privacy by Design GDPR Compliance. TrustBus 2020: 186-201 - [p6]Mohamad Gharib
, Paolo Giorgini
, Mattia Salnitri, Elda Paja, Haralambos Mouratidis, Michalis Pavlidis
, José Fran. Ruiz:
A Holistic Approach for Privacy Requirements Analysis: An Industrial Case Study. Visual Privacy Management 2020: 22-53 - [p5]Amir Shayan Ahmadian, Sven Peldszus, Jan Jürjens, Mattia Salnitri, Paolo Giorgini
, Haralambos Mouratidis, José Fran. Ruiz:
The Architecture of VisiOn Privacy Platform. Visual Privacy Management 2020: 54-76 - [p4]Sven Peldszus, Amir Shayan Ahmadian, Mattia Salnitri, Jan Jürjens, Michalis Pavlidis
, Haralambos Mouratidis:
Visual Privacy Management. Visual Privacy Management 2020: 77-108 - [e10]Mattia Salnitri
, Jan Jürjens
, Haralambos Mouratidis
, Loredana Mancini
, Paolo Giorgini
:
Visual Privacy Management - Design and Applications of a Privacy-Enabling Platform. Lecture Notes in Computer Science 12030, Springer 2020, ISBN 978-3-030-59943-0 [contents] - [i3]Spyridon Papastergiou, Haralambos Mouratidis, Eleni-Maria Kalogeraki:
Cyber Security Incident Handling, Warning and Response System for the European Critical Information Infrastructures (CyberSANE). CoRR abs/2003.05720 (2020)
2010 – 2019
- 2019
- [j52]Orestis Mavropoulos
, Haralambos Mouratidis, Andrew Fish
, Emmanouil Panaousis
:
Apparatus: A framework for security analysis in internet of things systems. Ad Hoc Networks 92 (2019) - [j51]Vasiliki Diamantopoulou, Haralambos Mouratidis:
Practical evaluation of a reference architecture for the management of privacy level agreements. Inf. Comput. Secur. 27(5) (2019) - [j50]Elias Pimenidis, Nikolaos Polatidis
, Haralambos Mouratidis:
Mobile recommender systems: Identifying the major concepts. J. Inf. Sci. 45(3) (2019) - [c88]Spyridon Papastergiou, Haralambos Mouratidis, Eleni-Maria Kalogeraki:
Cyber Security Incident Handling, Warning and Response System for the European Critical Information Infrastructures (CyberSANE). EANN 2019: 476-487 - [c87]Myrsini Athinaiou, Haralambos Mouratidis, Theo Fotis
, Michalis Pavlidis
:
A Conceptual Redesign of a Modelling Language for Cyber Resiliency of Healthcare Systems. CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS 2019: 140-158 - [c86]Aggeliki Tsohou, Manos Magkos, Haralambos Mouratidis, George Chrysoloras, Luca Piras
, Michalis Pavlidis
, Julien Debussche, Marco Rotoloni, Beatriz Gallego-Nicasio Crespo:
Privacy, Security, Legal and Technology Acceptance Requirements for a GDPR Compliance Platform. CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS 2019: 204-223 - [c85]Duaa Alkubaisy
, Karl Cox, Haralambos Mouratidis:
Towards Detecting and Mitigating Conflicts for Privacy and Security Requirements. RCIS 2019: 1-6 - [c84]Nitin Naik, Paul Jenkins, Jonathan Gillett, Haralambos Mouratidis, Kshirasagar Naik, Jingping Song:
Lockout-Tagout Ransomware: A Detection Method for Ransomware using Fuzzy Hashing and Clustering. SSCI 2019: 641-648 - [c83]Luca Piras
, Mohammed Ghazi Al-Obeidallah
, Andrea Praitano, Aggeliki Tsohou, Haralambos Mouratidis, Beatriz Gallego-Nicasio Crespo, Jean Baptiste Bernard, Marco Fiorani, Emmanouil Magkos, Andrès Castillo Sanz, Michalis Pavlidis
, Roberto D'Addario, Giuseppe Giovanni Zorzino:
DEFeND Architecture: A Privacy by Design Platform for GDPR Compliance. TrustBus 2019: 78-93 - 2018
- [j49]Nikolaos Polatidis
, Michalis Pavlidis
, Haralambos Mouratidis:
Cyber-attack path discovery in a dynamic supply chain maritime risk management system. Comput. Stand. Interfaces 56: 74-82 (2018) - [j48]Vasiliki Diamantopoulou, Haralambos Mouratidis:
Applying the physics of notation to the evaluation of a security and privacy requirements engineering methodology. Inf. Comput. Secur. 26(4): 382-400 (2018) - [j47]Nikolaos Argyropoulos, Konstantinos Angelopoulos, Haralambos Mouratidis, Andrew Fish
:
Risk-aware decision support with constrained goal models. Inf. Comput. Secur. 26(4): 472-490 (2018) - [j46]Shareeful Islam, Moussa Ouedraogo, Christos Kalloniatis, Haralambos Mouratidis
, Stefanos Gritzalis
:
Assurance of Security and Privacy Requirements for Cloud Deployment Models. IEEE Trans. Cloud Comput. 6(2): 387-400 (2018) - [j45]Haralambos Mouratidis
, Vasiliki Diamantopoulou
:
A Security Analysis Method for Industrial Internet of Things. IEEE Trans. Ind. Informatics 14(9): 4093-4100 (2018) - [c82]Vasiliki Diamantopoulou, Haralambos Mouratidis:
Evaluating a Reference Architecture for Privacy Level Agreement's Management. MCIS 2018: 28 - [c81]Myrsini Athinaiou, Haralambos Mouratidis, Theo Fotis
, Michalis Pavlidis
, Emmanouil Panaousis
:
Towards the Definition of a Security Incident Response Modelling Language. TrustBus 2018: 198-212 - [e9]Jan Mendling, Haralambos Mouratidis:
Information Systems in the Big Data Era - CAiSE Forum 2018, Tallinn, Estonia, June 11-15, 2018, Proceedings. Lecture Notes in Business Information Processing 317, Springer 2018, ISBN 978-3-319-92900-2 [contents] - [e8]Steven Furnell, Haralambos Mouratidis, Günther Pernul:
Trust, Privacy and Security in Digital Business - 15th International Conference, TrustBus 2018, Regensburg, Germany, September 5-6, 2018, Proceedings. Lecture Notes in Computer Science 11033, Springer 2018, ISBN 978-3-319-98384-4 [contents] - [i2]Nikolaos Polatidis, Elias Pimenidis, Michalis Pavlidis, Spyridon Papastergiou, Haralambos Mouratidis:
From product recommendation to cyber-attack prediction: Generating attack graphs and predicting future attacks. CoRR abs/1804.10276 (2018) - [i1]Elias Pimenidis, Nikolaos Polatidis, Haralambos Mouratidis:
Mobile recommender systems: Identifying the major concepts. CoRR abs/1805.02276 (2018) - 2017
- [j44]Orestis Mavropoulos, Haralambos Mouratidis, Andrew Fish
, Emmanouil Panaousis
, Christos Kalloniatis:
A conceptual model to support security analysis in the internet of things. Comput. Sci. Inf. Syst. 14(2): 557-578 (2017) - [j43]Nikolaos Polatidis
, Christos K. Georgiadis
, Elias Pimenidis, Haralambos Mouratidis:
Privacy-preserving collaborative recommendations based on random perturbations. Expert Syst. Appl. 71: 18-25 (2017) - [j42]Athanasios Naskos, Anastasios Gounaris, Haralambos Mouratidis, Panagiotis Katsaros:
Security-aware elasticity for NoSQL databases in multi-cloud environments. Int. J. Intell. Inf. Database Syst. 10(3/4): 168-190 (2017) - [j41]Christos K. Georgiadis, Nikolaos Polatidis, Haralambos Mouratidis, Elias Pimenidis:
A Method for Privacy-preserving Collaborative Filtering Recommendations. J. Univers. Comput. Sci. 23(2): 146-166 (2017) - [c80]Konstantinos Angelopoulos, Vasiliki Diamantopoulou, Haralambos Mouratidis, Michalis Pavlidis
, Mattia Salnitri, Paolo Giorgini
, José Fran. Ruiz:
A Holistic Approach for Privacy Protection in E-Government. ARES 2017: 17:1-17:10 - [c79]Vasiliki Diamantopoulou, Konstantinos Angelopoulos, Julian Flake, Andrea Praitano, José Fran. Ruiz, Jan Jürjens, Michalis Pavlidis
, Dimitri Bonutto, Andrès Castillo Sanz, Haralambos Mouratidis, Javier Garcia-Robles, Alberto Eugenio Tozzi
:
Privacy Data Management and Awareness for Public Administrations: A Case Study from the Healthcare Domain. APF 2017: 192-209 - [c78]Nikolaos Argyropoulos, Haralambos Mouratidis, Andrew Fish
:
Supporting Secure Business Process Design via Security Process Patterns. BPMDS/EMMSAD@CAiSE 2017: 19-33 - [c77]Vasiliki Diamantopoulou, Michalis Pavlidis, Haralambos Mouratidis:
Privacy Level Agreements for Public Administration Information Systems. CAiSE-Forum-DC 2017: 97-104 - [c76]Shaun Shei, Haralambos Mouratidis, Aidan J. Delaney:
A Security Requirements Modelling Language to Secure Cloud Computing Environments. BPMDS/EMMSAD@CAiSE 2017: 337-345 - [c75]Nikolaos Polatidis
, Elias Pimenidis, Michalis Pavlidis
, Haralambos Mouratidis:
Recommender Systems Meeting Security: From Product Recommendation to Cyber-Attack Prediction. EANN 2017: 508-519 - [c74]Ioannis Neokosmidis, Theodoros Rokkas
, Ioannis P. Chochliouros, Leonardo Goratti, Haralambos Mouratidis, Karim M. Nasr
, Seiamak Vahid, Klaus Moessner, Antonino Albanese, Paolo Secondo Crosta, Pietro Paglierani:
Are Small Cells and Network Intelligence at the Edge the Drivers for 5G Market Adoption? The SESAME Case. EANN 2017: 693-703 - [c73]Vasiliki Diamantopoulou, Konstantinos Angelopoulos, Michalis Pavlidis, Haralambos Mouratidis:
A Metamodel for GDPR-based Privacy Level Agreements. ER Forum/Demos 2017: 285-291 - [c72]Vasiliki Diamantopoulou, Michalis Pavlidis
, Haralambos Mouratidis:
Evaluation of a Security and Privacy Requirements Methodology Using the Physics of Notation. CyberICPS/SECPRE@ESORICS 2017: 210-225 - [c71]Nikolaos Argyropoulos, Konstantinos Angelopoulos, Haralambos Mouratidis, Andrew Fish
:
Decision-Making in Security Requirements Engineering with Constrained Goal Models. CyberICPS/SECPRE@ESORICS 2017: 262-280 - [c70]Nikolaos Argyropoulos, Shaun Shei, Christos Kalloniatis, Haralambos Mouratidis, Aidan J. Delaney, Andrew Fish, Stefanos Gritzalis:
A Semi-Automatic Approach for Eliciting Cloud Security and Privacy Requirements. HICSS 2017: 1-10 - [c69]Vassilios G. Vassilakis, Haralambos Mouratidis, Emmanouil Panaousis
, Ioannis D. Moscholios, Michael D. Logothetis:
Security requirements modelling for virtualized 5G small cell networks. ICT 2017: 1-5 - [c68]Vasiliki Diamantopoulou, Christos Kalloniatis, Stefanos Gritzalis
, Haralambos Mouratidis:
Supporting Privacy by Design Using Privacy Process Patterns. SEC 2017: 491-505 - [c67]Orestis Mavropoulos, Haralambos Mouratidis, Andrew Fish
, Emmanouil A. Panaousis
:
ASTo: A tool for security analysis of IoT systems. SERA 2017: 395-400 - [c66]Michalis Pavlidis
, Haralambos Mouratidis, Emmanouil Panaousis
, Nikolaos Argyropoulos:
Selecting Security Mechanisms in Secure Tropos. TrustBus 2017: 99-114 - [c65]Nikolaos Argyropoulos, Haralambos Mouratidis, Andrew Fish
:
Attribute-Based Security Verification of Business Process Models. CBI (1) 2017: 43-52 - [e7]Saïd Assar, Oscar Pastor, Haralambos Mouratidis:
11th International Conference on Research Challenges in Information Science, RCIS 2017, Brighton, United Kingdom, May 10-12, 2017. IEEE 2017, ISBN 978-1-5090-5476-3 [contents] - 2016
- [j40]Athanasios Naskos, Anastasios Gounaris, Haralambos Mouratidis, Panagiotis Katsaros
:
Online Analysis of Security Risks in Elastic Cloud Applications. IEEE Cloud Comput. 3(5): 26-33 (2016) - [j39]Reza Alavi, Shareeful Islam, Haralambos Mouratidis:
An information security risk-driven investment model for analysing human factors. Inf. Comput. Secur. 24(2): 205-227 (2016) - [j38]Stavros Simou, Christos Kalloniatis, Stefanos Gritzalis
, Haralambos Mouratidis:
A survey on cloud forensics challenges and solutions. Secur. Commun. Networks 9(18): 6285-6314 (2016) - [c64]Orestis Mavropoulos, Haralambos Mouratidis, Andrew Fish
, Emmanouil Panaousis
, Christos Kalloniatis:
Apparatus: Reasoning About Security Requirements in the Internet of Things. CAiSE Workshops 2016: 219-230 - [c63]Danillo Sprovieri, Nikolaos Argyropoulos, Carine Souveyet, Raúl Mazo, Haralambos Mouratidis, Andrew Fish
:
Security Alignment Analysis of Software Product Lines. ES 2016: 97-103 - [c62]Ioannis Giannoulakis, George Xylouris, Emmanouil Kafetzakis, Anastasios Kourtis, Jose Oscar Fajardo, Pouria Sayyad Khodashenas, Antonino Albanese, Haralambos Mouratidis, Vassilios G. Vassilakis:
System architecture and deployment scenarios for SESAME: Small cEllS coodinAtion for Multi-tenancy and Edge services. NetSoft 2016: 447-452 - [c61]Nikolaos Argyropoulos, Christos Kalloniatis, Haralambos Mouratidis, Andrew Fish
:
Incorporating privacy patterns into semi-automatic business process derivation. RCIS 2016: 1-12 - [c60]Mohamad Gharib
, Mattia Salnitri, Elda Paja
, Paolo Giorgini
, Haralambos Mouratidis, Michalis Pavlidis
, José Fran. Ruiz, Sandra Fernandez, Andrea Della Siria:
Privacy Requirements: Findings and Lessons Learned in Developing a Privacy Platform. RE 2016: 256-265 - [c59]Stavros Simou, Christos Kalloniatis, Haralambos Mouratidis, Stefanos Gritzalis
:
Towards a Model-Based Framework for Forensic-Enabled Cloud Information Systems. TrustBus 2016: 35-47 - [c58]Shaun Shei, Christos Kalloniatis, Haralambos Mouratidis, Aidan J. Delaney
:
Modelling Secure Cloud Computing Systems from a Security Requirements Perspective. TrustBus 2016: 48-62 - [c57]Vassilios G. Vassilakis
, Emmanouil Panaousis
, Haralambos Mouratidis:
Security Challenges of Small Cell as a Service in Virtualized Mobile Edge Computing Environments. WISTP 2016: 70-84 - [p3]Haralambos Mouratidis, Nikolaos Argyropoulos, Shaun Shei:
Security Requirements Engineering for Cloud Computing: The Secure Tropos Approach. Domain-Specific Conceptual Modeling 2016: 357-380 - [e6]John Krogstie, Haralambos Mouratidis, Jianwen Su:
Advanced Information Systems Engineering Workshops - CAiSE 2016 International Workshops, Ljubljana, Slovenia, June 13-17, 2016, Proceedings. Lecture Notes in Business Information Processing 249, Springer 2016, ISBN 978-3-319-39563-0 [contents] - 2015
- [j37]Evangelia Kavakli, Christos Kalloniatis, Haralambos Mouratidis, Stefanos Gritzalis
:
Privacy as an Integral Part of the Implementation of Cloud Solutions. Comput. J. 58(10): 2213-2224 (2015) - [j36]Oscar Rebollo, Daniel Mellado, Eduardo Fernández-Medina
, Haralambos Mouratidis
:
Empirical evaluation of a cloud computing information security governance framework. Inf. Softw. Technol. 58: 44-57 (2015) - [c56]Stavros Simou, Christos Kalloniatis, Haralambos Mouratidis, Stefanos Gritzalis
:
Towards the Development of a Cloud Forensics Methodology: A Conceptual Model. CAiSE Workshops 2015: 470-481 - [c55]Luis Márquez Alcañiz, David G. Rosado
, Haralambos Mouratidis, Daniel Mellado, Eduardo Fernández-Medina
:
A Framework for Secure Migration Processes of Legacy Systems to the Cloud. CAiSE Workshops 2015: 507-517 - [c54]Michalis Pavlidis
, Haralambos Mouratidis, Cesar Gonzalez-Perez, Christos Kalloniatis:
Addressing Privacy and Trust Issues in Cultural Heritage Modelling. CRiSIS 2015: 3-16 - [c53]Stavros Simou, Christos Kalloniatis, Haralambos Mouratidis, Stefanos Gritzalis
:
A Meta-model for Assisting a Cloud Forensics Process. CRiSIS 2015: 177-187 - [c52]Shaun Shei, Aidan J. Delaney
, Stelios Kapetanakis, Haralambos Mouratidis:
Visually Mapping Requirements Models to Cloud Services. DMS 2015: 108-114 - [c51]Nikolaos Argyropoulos, Haralambos Mouratidis, Andrew Fish
:
Towards the Derivation of Secure Business Process Designs. ER Workshops 2015: 248-258 - [c50]Reza Alavi, Shareeful Islam, Haris Mouratidis, Sin Lee:
Managing Social Engineering Attacks- Considering Human Factors and Security Investment. HAISA 2015: 161-171 - [c49]Reza Alavi, Shareeful Islam, Haris Mouratidis:
Human Factors of Social Engineering Attacks (SEAs) in Hybrid Cloud Environment: Threats and Risks. ICGS3 2015: 50-56 - [c48]Umar Mukhtar Ismail, Shareeful Islam, Haralambos Mouratidis:
A Framework for Cloud Security Audit. ICGS3 2015: 296-309 - [c47]Daniel Ganji, Haralambos Mouratidis, Saeed Malekshahi Gheytassi, Miltos Petridis:
Conflicts Between Security and Privacy Measures in Software Requirements Engineering. ICGS3 2015: 323-334 - [c46]Nikolaos Argyropoulos, Luis Márquez Alcañiz, Haralambos Mouratidis, Andrew Fish
, David G. Rosado
, Ignacio García Rodríguez de Guzmán
, Eduardo Fernández-Medina
:
Eliciting Security Requirements for Business Processes of Legacy Systems. PoEM 2015: 91-107 - [c45]Athanasios Naskos, Anastasios Gounaris, Haralambos Mouratidis, Panagiotis Katsaros
:
Security-Aware Elasticity for NoSQL Databases. MEDI 2015: 181-197 - [c44]Shaun Shei, Luis Márquez Alcañiz, Haralambos Mouratidis, Aidan J. Delaney
, David G. Rosado
, Eduardo Fernández-Medina
:
Modelling secure cloud systems based on system requirements. ESPRE 2015: 19-24 - [c43]Umar Mukhtar Ismail, Shareeful Islam, Haralambos Mouratidis:
Cloud Security Audit for Migration and Continuous Monitoring. TrustCom/BigDataSE/ISPA (1) 2015: 1081-1087 - 2014
- [j35]Daniel Mellado, Haralambos Mouratidis
, Eduardo Fernández-Medina
:
Secure Tropos framework for software product lines requirements engineering. Comput. Stand. Interfaces 36(4): 711-722 (2014) - [j34]Christos Kalloniatis, Haralambos Mouratidis
, Vassilis Manousakis, Shareeful Islam, Stefanos Gritzalis
, Evangelia Kavakli:
Towards the design of secure and privacy-oriented information systems in the cloud: Identifying the major concepts. Comput. Stand. Interfaces 36(4): 759-775 (2014) - [j33]Michalis Pavlidis
, Shareeful Islam, Haralambos Mouratidis, Paul Kearney:
Modeling Trust Relationships for Developing Trustworthy Information Systems. Int. J. Inf. Syst. Model. Des. 5(1): 25-48 (2014) - [j32]Shareeful Islam, Haralambos Mouratidis
, Edgar R. Weippl:
An empirical study on the implementation and evaluation of a goal-driven software development risk management model. Inf. Softw. Technol. 56(2): 117-133 (2014) - [c42]Reza Alavi, Shareeful Islam, Haralambos Mouratidis
:
A Conceptual Framework to Analyze Human Factors of Information Security Management System (ISMS) in Organizations. HCI (24) 2014: 297-305 - [e5]Matthias Jarke, John Mylopoulos, Christoph Quix
, Colette Rolland, Yannis Manolopoulos, Haralambos Mouratidis, Jennifer Horkoff
:
Advanced Information Systems Engineering - 26th International Conference, CAiSE 2014, Thessaloniki, Greece, June 16-20, 2014. Proceedings. Lecture Notes in Computer Science 8484, Springer 2014, ISBN 978-3-319-07880-9 [contents] - 2013
- [j31]Moussa Ouedraogo, Haralambos Mouratidis
:
Selecting a Cloud Service Provider in the age of cybercrime. Comput. Secur. 38: 3-13 (2013) - [j30]Haralambos Mouratidis
, Shareeful Islam, Christos Kalloniatis, Stefanos Gritzalis
:
A framework to support selection of cloud providers based on security and privacy requirements. J. Syst. Softw. 86(9): 2276-2293 (2013) - [j29]Christos Kalloniatis, Haralambos Mouratidis
, Shareeful Islam:
Evaluating cloud deployment scenarios based on security and privacy requirements. Requir. Eng. 18(4): 299-319 (2013) - [j28]Moussa Ouedraogo, Reijo M. Savola, Haralambos Mouratidis
, David Preston, Djamel Khadraoui, Eric Dubois
:
Taxonomy of quality metrics for assessing assurance of security correctness.