


default search action
Haralambos Mouratidis
Person information
- affiliation: University of Brighton, School of Computing, Engineering and Mathematics, UK
- affiliation (former): University of East London, UK
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j70]Luis Enrique Sánchez
, Antonio Santos-Olmo
, David Garcia Rosado, Carlos Blanco
, Manuel A. Serrano, Haralambos Mouratidis
, Eduardo Fernández-Medina:
MARISMA: A modern and context-aware framework for assessing and managing information cybersecurity risks. Comput. Stand. Interfaces 92: 103935 (2025) - 2024
- [j69]Antonio Santos-Olmo, Luis Enrique Sánchez, David Garcia Rosado, Manuel A. Serrano, Carlos Blanco
, Haralambos Mouratidis, Eduardo Fernández-Medina:
Towards an integrated risk analysis security framework according to a systematic analysis of existing proposals. Frontiers Comput. Sci. 18(3): 183808 (2024) - [c100]Nihala Basheer, Bernardi Pranggono, Shareeful Islam, Spyridon Papastergiou, Haralambos Mouratidis:
Enhancing Malware Detection Through Machine Learning Using XAI with SHAP Framework. AIAI (1) 2024: 316-329 - [c99]Ahmed Abdullah Khaled, Md Mahmudul Hasan, Shareeful Islam, Spyridon Papastergiou, Haralambos Mouratidis:
Synthetic Data Generation and Impact Analysis of Machine Learning Models for Enhanced Credit Card Fraud Detection. AIAI (1) 2024: 362-374 - [e12]Giancarlo Guizzardi
, Flávia Maria Santoro
, Haralambos Mouratidis
, Pnina Soffer
:
Advanced Information Systems Engineering - 36th International Conference, CAiSE 2024, Limassol, Cyprus, June 3-7, 2024, Proceedings. Lecture Notes in Computer Science 14663, Springer 2024, ISBN 978-3-031-61056-1 [contents] - 2023
- [j68]Haralambos Mouratidis
, Shareeful Islam, Antonio Santos-Olmo
, Luis Enrique Sánchez
, Umar Mukhtar Ismail:
Modelling language for cyber security incident handling for critical infrastructures. Comput. Secur. 128: 103139 (2023) - [j67]Luis Enrique Sánchez
, Antonio Santos-Olmo
, Haralambos Mouratidis
, Eduardo Fernández-Medina
:
New Frontiers in Security Risk Management. IT Prof. 25(3): 61-67 (2023) - [c98]Mohammed Ghazi Al-Obeidallah, Luca Piras, Onyinye Iloanugo, Haralambos Mouratidis, Duaa Alkubaisy, Daniele Dellagiacoma:
Goal-Modeling Privacy-by-Design Patterns for Supporting GDPR Compliance. ICSOFT 2023: 361-368 - [e11]Selmin Nurcan
, Andreas L. Opdahl
, Haralambos Mouratidis
, Aggeliki Tsohou
:
Research Challenges in Information Science: Information Science and the Connected World - 17th International Conference, RCIS 2023, Corfu, Greece, May 23-26, 2023, Proceedings. Lecture Notes in Business Information Processing 476, Springer 2023, ISBN 978-3-031-33079-7 [contents] - 2022
- [j66]Sana Alam
, Shehnila Zardari
, Shaheena Noor, Shakil Ahmed, Haralambos Mouratidis:
Trust Management in Social Internet of Things (SIoT): A Survey. IEEE Access 10: 108924-108954 (2022) - [j65]David Garcia Rosado, Antonio Santos-Olmo
, Luis Enrique Sánchez
, Manuel A. Serrano
, Carlos Blanco
, Haralambos Mouratidis, Eduardo Fernández-Medina:
Managing cybersecurity risks of cyber-physical systems: The MARISMA-CPS pattern. Comput. Ind. 142: 103715 (2022) - [j64]Shareeful Islam, Abdulrazaq Abba, Umar Mukhtar Ismail, Haralambos Mouratidis, Spyridon Papastergiou:
Vulnerability prediction for secure healthcare supply chain service delivery. Integr. Comput. Aided Eng. 29(4): 389-409 (2022) - [j63]Kitty Kioskli, Daniele Dellagiacoma
, Theofanis Fotis
, Haralambos Mouratidis:
The supply chain of a Living Lab: Modelling security, privacy, and vulnerability issues alongside with their impact and potential mitigation strategies. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 13(2): 147-182 (2022) - [j62]Halima Ibrahim Kure, Shareeful Islam, Haralambos Mouratidis:
An integrated cyber security risk management framework and risk predication for the critical infrastructure protection. Neural Comput. Appl. 34(18): 15241-15271 (2022) - [j61]Rose Adee
, Haralambos Mouratidis:
A Dynamic Four-Step Data Security Model for Data in Cloud Computing Based on Cryptography and Steganography. Sensors 22(3): 1109 (2022) - [c97]Mohammad Heydari, Haralambos Mouratidis, Vahid Heydari Fami Tafreshi:
OntoCyrene: Towards Ontology-Enhanced Asset Modelling for Supply Chains in the Context of Cyber Security. CyberICPS/SECPRE/SPOSE/CPS4CIP/CDT&SECOMAN/EIS/SecAssure@ESORICS 2022: 157-176 - 2021
- [j60]Spyridon Papastergiou, Haralambos Mouratidis
, Eleni-Maria Kalogeraki:
Handling of advanced persistent threats and complex incidents in healthcare, transportation and energy ICT infrastructures. Evol. Syst. 12(1): 91-108 (2021) - [j59]Luca Piras, Mohammed Ghazi Al-Obeidallah, Michalis Pavlidis, Haralambos Mouratidis, Aggeliki Tsohou, Emmanouil Magkos, Andrea Praitano:
A Data Scope Management Service to Support Privacy by Design and GDPR Compliance. J. Data Intell. 2(2): 136-165 (2021) - [c96]Kitty Kioskli
, Theo Fotis
, Haralambos Mouratidis:
The landscape of cybersecurity vulnerabilities and challenges in healthcare: Security standards and paradigm shift recommendations. ARES 2021: 136:1-136:9 - [c95]Duaa Alkubaisy
, Luca Piras, Mohammed Ghazi Al-Obeidallah
, Karl Cox, Haralambos Mouratidis:
A Framework for Privacy and Security Requirements Analysis and Conflict Resolution for Supporting GDPR Compliance Through Privacy-by-Design. ENASE (Selected Papers) 2021: 67-87 - [c94]Duaa Alkubaisy, Luca Piras
, Mohammed Ghazi Al-Obeidallah
, Karl Cox, Haralambos Mouratidis:
ConfIs: A Tool for Privacy and Security Analysis and Conflict Resolution for Supporting GDPR Compliance through Privacy-by-Design. ENASE 2021: 80-91 - [c93]Shareeful Islam, Haralambos Mouratidis, Hasan Mahmud:
An Automated Tool to Support an Intelligence Learner Management System Using Learning Analytics and Machine Learning. AIAI 2021: 494-504 - [c92]Abel Yeboah-Ofori, Haralambos Mouratidis, Umar Mukhtar Ismail, Shareeful Islam, Spyridon Papastergiou:
Cyber Supply Chain Threat Analysis and Prediction Using Machine Learning and Ontology. AIAI 2021: 518-530 - [c91]Shareeful Islam, Spyridon Papastergiou, Haralambos Mouratidis:
A Dynamic Cyber Security Situational Awareness Framework for Healthcare ICT Infrastructures. PCI 2021: 334-339 - 2020
- [j58]Nikolaos Polatidis
, Elias Pimenidis, Michalis Pavlidis
, Spyridon Papastergiou, Haralambos Mouratidis:
From product recommendation to cyber-attack prediction: generating attack graphs and predicting future attacks. Evol. Syst. 11(3): 479-490 (2020) - [j57]Aggeliki Tsohou, Emmanouil Magkos, Haralambos Mouratidis, George Chrysoloras, Luca Piras
, Michalis Pavlidis
, Julien Debussche, Marco Rotoloni, Beatriz Gallego-Nicasio Crespo:
Privacy, security, legal and technology acceptance elicited and consolidated requirements for a GDPR compliance platform. Inf. Comput. Secur. 28(4): 531-553 (2020) - [j56]Renata Medeiros de Carvalho
, Camillo Del Prete, Yod Samuel Martín, Rosa M. Araujo Rivero
, Melek Önen, Francesco Paolo Schiavo, Ángel Cuevas Rumín
, Haralambos Mouratidis, Juan C. Yelmo, Maria N. Koukovini:
Protecting Citizens' Personal Data and Privacy: Joint Effort from GDPR EU Cluster Research Projects. SN Comput. Sci. 1(4): 217 (2020) - [j55]Haralambos Mouratidis, Shaun Shei
, Aidan J. Delaney:
A security requirements modelling language for cloud computing environments. Softw. Syst. Model. 19(2): 271-295 (2020) - [j54]Mattia Salnitri
, Konstantinos Angelopoulos, Michalis Pavlidis
, Vasiliki Diamantopoulou, Haralambos Mouratidis, Paolo Giorgini
:
Modelling the interplay of security, privacy and trust in sociotechnical systems: a computer-aided design approach. Softw. Syst. Model. 19(2): 467-491 (2020) - [j53]Nikolaos Argyropoulos, Haralambos Mouratidis, Andrew Fish
:
Enhancing secure business process design with security process patterns. Softw. Syst. Model. 19(3): 555-577 (2020) - [c90]Haralambos Mouratidis
, Jelena Zdravkovic
, Janis Stirna
:
Cyber Security Resilience in Business Informatics: An Exploratory Paper. BIR 2020: 53-66 - [c89]Luca Piras
, Mohammed Ghazi Al-Obeidallah
, Michalis Pavlidis
, Haralambos Mouratidis, Aggeliki Tsohou, Emmanouil Magkos, Andrea Praitano, Annarita Iodice, Beatriz Gallego-Nicasio Crespo:
DEFeND DSM: A Data Scope Management Service for Model-Based Privacy by Design GDPR Compliance. TrustBus 2020: 186-201 - [p6]Mohamad Gharib
, Paolo Giorgini
, Mattia Salnitri, Elda Paja, Haralambos Mouratidis, Michalis Pavlidis
, José Fran. Ruiz:
A Holistic Approach for Privacy Requirements Analysis: An Industrial Case Study. Visual Privacy Management 2020: 22-53 - [p5]Amir Shayan Ahmadian, Sven Peldszus, Jan Jürjens, Mattia Salnitri, Paolo Giorgini
, Haralambos Mouratidis, José Fran. Ruiz:
The Architecture of VisiOn Privacy Platform. Visual Privacy Management 2020: 54-76 - [p4]Sven Peldszus
, Amir Shayan Ahmadian, Mattia Salnitri, Jan Jürjens, Michalis Pavlidis
, Haralambos Mouratidis:
Visual Privacy Management. Visual Privacy Management 2020: 77-108 - [e10]Mattia Salnitri
, Jan Jürjens
, Haralambos Mouratidis
, Loredana Mancini
, Paolo Giorgini
:
Visual Privacy Management - Design and Applications of a Privacy-Enabling Platform. Lecture Notes in Computer Science 12030, Springer 2020, ISBN 978-3-030-59943-0 [contents] - [i3]Spyridon Papastergiou, Haralambos Mouratidis, Eleni-Maria Kalogeraki:
Cyber Security Incident Handling, Warning and Response System for the European Critical Information Infrastructures (CyberSANE). CoRR abs/2003.05720 (2020)
2010 – 2019
- 2019
- [j52]Orestis Mavropoulos
, Haralambos Mouratidis, Andrew Fish
, Emmanouil Panaousis
:
Apparatus: A framework for security analysis in internet of things systems. Ad Hoc Networks 92 (2019) - [j51]Vasiliki Diamantopoulou, Haralambos Mouratidis:
Practical evaluation of a reference architecture for the management of privacy level agreements. Inf. Comput. Secur. 27(5) (2019) - [j50]Elias Pimenidis, Nikolaos Polatidis
, Haralambos Mouratidis:
Mobile recommender systems: Identifying the major concepts. J. Inf. Sci. 45(3) (2019) - [c88]Spyridon Papastergiou, Haralambos Mouratidis, Eleni-Maria Kalogeraki:
Cyber Security Incident Handling, Warning and Response System for the European Critical Information Infrastructures (CyberSANE). EANN 2019: 476-487 - [c87]Myrsini Athinaiou, Haralambos Mouratidis, Theo Fotis
, Michalis Pavlidis
:
A Conceptual Redesign of a Modelling Language for Cyber Resiliency of Healthcare Systems. CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS 2019: 140-158 - [c86]Aggeliki Tsohou, Manos Magkos, Haralambos Mouratidis, George Chrysoloras, Luca Piras
, Michalis Pavlidis
, Julien Debussche, Marco Rotoloni, Beatriz Gallego-Nicasio Crespo:
Privacy, Security, Legal and Technology Acceptance Requirements for a GDPR Compliance Platform. CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS 2019: 204-223 - [c85]Duaa Alkubaisy
, Karl Cox, Haralambos Mouratidis:
Towards Detecting and Mitigating Conflicts for Privacy and Security Requirements. RCIS 2019: 1-6 - [c84]Nitin Naik, Paul Jenkins
, Jonathan Gillett, Haralambos Mouratidis, Kshirasagar Naik, Jingping Song:
Lockout-Tagout Ransomware: A Detection Method for Ransomware using Fuzzy Hashing and Clustering. SSCI 2019: 641-648 - [c83]Luca Piras
, Mohammed Ghazi Al-Obeidallah
, Andrea Praitano, Aggeliki Tsohou, Haralambos Mouratidis, Beatriz Gallego-Nicasio Crespo, Jean Baptiste Bernard, Marco Fiorani, Emmanouil Magkos, Andrès Castillo Sanz, Michalis Pavlidis
, Roberto D'Addario, Giuseppe Giovanni Zorzino:
DEFeND Architecture: A Privacy by Design Platform for GDPR Compliance. TrustBus 2019: 78-93 - 2018
- [j49]Nikolaos Polatidis
, Michalis Pavlidis
, Haralambos Mouratidis:
Cyber-attack path discovery in a dynamic supply chain maritime risk management system. Comput. Stand. Interfaces 56: 74-82 (2018) - [j48]Vasiliki Diamantopoulou, Haralambos Mouratidis:
Applying the physics of notation to the evaluation of a security and privacy requirements engineering methodology. Inf. Comput. Secur. 26(4): 382-400 (2018) - [j47]Nikolaos Argyropoulos, Konstantinos Angelopoulos, Haralambos Mouratidis, Andrew Fish
:
Risk-aware decision support with constrained goal models. Inf. Comput. Secur. 26(4): 472-490 (2018) - [j46]Shareeful Islam, Moussa Ouedraogo, Christos Kalloniatis, Haralambos Mouratidis
, Stefanos Gritzalis
:
Assurance of Security and Privacy Requirements for Cloud Deployment Models. IEEE Trans. Cloud Comput. 6(2): 387-400 (2018) - [j45]Haralambos Mouratidis
, Vasiliki Diamantopoulou
:
A Security Analysis Method for Industrial Internet of Things. IEEE Trans. Ind. Informatics 14(9): 4093-4100 (2018) - [c82]Vasiliki Diamantopoulou, Haralambos Mouratidis:
Evaluating a Reference Architecture for Privacy Level Agreement's Management. MCIS 2018: 28 - [c81]Myrsini Athinaiou, Haralambos Mouratidis, Theo Fotis
, Michalis Pavlidis
, Emmanouil Panaousis
:
Towards the Definition of a Security Incident Response Modelling Language. TrustBus 2018: 198-212 - [e9]Jan Mendling, Haralambos Mouratidis:
Information Systems in the Big Data Era - CAiSE Forum 2018, Tallinn, Estonia, June 11-15, 2018, Proceedings. Lecture Notes in Business Information Processing 317, Springer 2018, ISBN 978-3-319-92900-2 [contents] - [e8]Steven Furnell, Haralambos Mouratidis, Günther Pernul:
Trust, Privacy and Security in Digital Business - 15th International Conference, TrustBus 2018, Regensburg, Germany, September 5-6, 2018, Proceedings. Lecture Notes in Computer Science 11033, Springer 2018, ISBN 978-3-319-98384-4 [contents] - [i2]Nikolaos Polatidis, Elias Pimenidis, Michalis Pavlidis, Spyridon Papastergiou, Haralambos Mouratidis:
From product recommendation to cyber-attack prediction: Generating attack graphs and predicting future attacks. CoRR abs/1804.10276 (2018) - [i1]Elias Pimenidis, Nikolaos Polatidis, Haralambos Mouratidis:
Mobile recommender systems: Identifying the major concepts. CoRR abs/1805.02276 (2018) - 2017
- [j44]Orestis Mavropoulos, Haralambos Mouratidis, Andrew Fish
, Emmanouil Panaousis
, Christos Kalloniatis:
A conceptual model to support security analysis in the internet of things. Comput. Sci. Inf. Syst. 14(2): 557-578 (2017) - [j43]Nikolaos Polatidis
, Christos K. Georgiadis
, Elias Pimenidis, Haralambos Mouratidis:
Privacy-preserving collaborative recommendations based on random perturbations. Expert Syst. Appl. 71: 18-25 (2017) - [j42]Athanasios Naskos, Anastasios Gounaris, Haralambos Mouratidis, Panagiotis Katsaros:
Security-aware elasticity for NoSQL databases in multi-cloud environments. Int. J. Intell. Inf. Database Syst. 10(3/4): 168-190 (2017) - [j41]Christos K. Georgiadis, Nikolaos Polatidis, Haralambos Mouratidis, Elias Pimenidis:
A Method for Privacy-preserving Collaborative Filtering Recommendations. J. Univers. Comput. Sci. 23(2): 146-166 (2017) - [c80]Konstantinos Angelopoulos, Vasiliki Diamantopoulou, Haralambos Mouratidis, Michalis Pavlidis
, Mattia Salnitri
, Paolo Giorgini
, José Fran. Ruiz:
A Holistic Approach for Privacy Protection in E-Government. ARES 2017: 17:1-17:10 - [c79]Vasiliki Diamantopoulou, Konstantinos Angelopoulos, Julian Flake
, Andrea Praitano, José Fran. Ruiz, Jan Jürjens, Michalis Pavlidis
, Dimitri Bonutto, Andrès Castillo Sanz, Haralambos Mouratidis, Javier Garcia-Robles, Alberto Eugenio Tozzi
:
Privacy Data Management and Awareness for Public Administrations: A Case Study from the Healthcare Domain. APF 2017: 192-209 - [c78]Nikolaos Argyropoulos, Haralambos Mouratidis, Andrew Fish
:
Supporting Secure Business Process Design via Security Process Patterns. BPMDS/EMMSAD@CAiSE 2017: 19-33 - [c77]Vasiliki Diamantopoulou, Michalis Pavlidis, Haralambos Mouratidis:
Privacy Level Agreements for Public Administration Information Systems. CAiSE-Forum-DC 2017: 97-104 - [c76]Shaun Shei, Haralambos Mouratidis, Aidan J. Delaney:
A Security Requirements Modelling Language to Secure Cloud Computing Environments. BPMDS/EMMSAD@CAiSE 2017: 337-345 - [c75]Nikolaos Polatidis
, Elias Pimenidis, Michalis Pavlidis
, Haralambos Mouratidis:
Recommender Systems Meeting Security: From Product Recommendation to Cyber-Attack Prediction. EANN 2017: 508-519 - [c74]Ioannis Neokosmidis, Theodoros Rokkas
, Ioannis P. Chochliouros, Leonardo Goratti, Haralambos Mouratidis, Karim M. Nasr
, Seiamak Vahid, Klaus Moessner, Antonino Albanese, Paolo Secondo Crosta, Pietro Paglierani:
Are Small Cells and Network Intelligence at the Edge the Drivers for 5G Market Adoption? The SESAME Case. EANN 2017: 693-703 - [c73]Vasiliki Diamantopoulou, Konstantinos Angelopoulos, Michalis Pavlidis, Haralambos Mouratidis:
A Metamodel for GDPR-based Privacy Level Agreements. ER Forum/Demos 2017: 285-291 - [c72]Vasiliki Diamantopoulou, Michalis Pavlidis
, Haralambos Mouratidis:
Evaluation of a Security and Privacy Requirements Methodology Using the Physics of Notation. CyberICPS/SECPRE@ESORICS 2017: 210-225 - [c71]Nikolaos Argyropoulos, Konstantinos Angelopoulos, Haralambos Mouratidis, Andrew Fish
:
Decision-Making in Security Requirements Engineering with Constrained Goal Models. CyberICPS/SECPRE@ESORICS 2017: 262-280 - [c70]Nikolaos Argyropoulos, Shaun Shei, Christos Kalloniatis, Haralambos Mouratidis, Aidan J. Delaney, Andrew Fish, Stefanos Gritzalis:
A Semi-Automatic Approach for Eliciting Cloud Security and Privacy Requirements. HICSS 2017: 1-10 - [c69]Vassilios G. Vassilakis, Haralambos Mouratidis, Emmanouil Panaousis
, Ioannis D. Moscholios, Michael D. Logothetis:
Security requirements modelling for virtualized 5G small cell networks. ICT 2017: 1-5 - [c68]Vasiliki Diamantopoulou, Christos Kalloniatis, Stefanos Gritzalis
, Haralambos Mouratidis:
Supporting Privacy by Design Using Privacy Process Patterns. SEC 2017: 491-505 - [c67]Orestis Mavropoulos, Haralambos Mouratidis, Andrew Fish
, Emmanouil A. Panaousis
:
ASTo: A tool for security analysis of IoT systems. SERA 2017: 395-400 - [c66]Michalis Pavlidis
, Haralambos Mouratidis, Emmanouil Panaousis
, Nikolaos Argyropoulos:
Selecting Security Mechanisms in Secure Tropos. TrustBus 2017: 99-114 - [c65]Nikolaos Argyropoulos, Haralambos Mouratidis, Andrew Fish
:
Attribute-Based Security Verification of Business Process Models. CBI (1) 2017: 43-52 - [e7]Saïd Assar, Oscar Pastor, Haralambos Mouratidis:
11th International Conference on Research Challenges in Information Science, RCIS 2017, Brighton, United Kingdom, May 10-12, 2017. IEEE 2017, ISBN 978-1-5090-5476-3 [contents] - 2016
- [j40]Athanasios Naskos, Anastasios Gounaris, Haralambos Mouratidis, Panagiotis Katsaros
:
Online Analysis of Security Risks in Elastic Cloud Applications. IEEE Cloud Comput. 3(5): 26-33 (2016) - [j39]Reza Alavi, Shareeful Islam, Haralambos Mouratidis:
An information security risk-driven investment model for analysing human factors. Inf. Comput. Secur. 24(2): 205-227 (2016) - [j38]Stavros Simou, Christos Kalloniatis, Stefanos Gritzalis
, Haralambos Mouratidis:
A survey on cloud forensics challenges and solutions. Secur. Commun. Networks 9(18): 6285-6314 (2016) - [c64]Orestis Mavropoulos, Haralambos Mouratidis, Andrew Fish
, Emmanouil Panaousis
, Christos Kalloniatis:
Apparatus: Reasoning About Security Requirements in the Internet of Things. CAiSE Workshops 2016: 219-230 - [c63]Danillo Sprovieri, Nikolaos Argyropoulos, Carine Souveyet, Raúl Mazo, Haralambos Mouratidis, Andrew Fish
:
Security Alignment Analysis of Software Product Lines. ES 2016: 97-103 - [c62]Ioannis Giannoulakis, George Xylouris, Emmanouil Kafetzakis, Anastasios Kourtis, Jose Oscar Fajardo, Pouria Sayyad Khodashenas, Antonino Albanese, Haralambos Mouratidis, Vassilios G. Vassilakis:
System architecture and deployment scenarios for SESAME: Small cEllS coodinAtion for Multi-tenancy and Edge services. NetSoft 2016: 447-452 - [c61]Nikolaos Argyropoulos, Christos Kalloniatis, Haralambos Mouratidis, Andrew Fish
:
Incorporating privacy patterns into semi-automatic business process derivation. RCIS 2016: 1-12 - [c60]Mohamad Gharib
, Mattia Salnitri
, Elda Paja
, Paolo Giorgini
, Haralambos Mouratidis, Michalis Pavlidis
, José Fran. Ruiz, Sandra Fernandez, Andrea Della Siria:
Privacy Requirements: Findings and Lessons Learned in Developing a Privacy Platform. RE 2016: 256-265 - [c59]Stavros Simou, Christos Kalloniatis, Haralambos Mouratidis, Stefanos Gritzalis
:
Towards a Model-Based Framework for Forensic-Enabled Cloud Information Systems. TrustBus 2016: 35-47 - [c58]Shaun Shei, Christos Kalloniatis, Haralambos Mouratidis, Aidan J. Delaney
:
Modelling Secure Cloud Computing Systems from a Security Requirements Perspective. TrustBus 2016: 48-62 - [c57]Vassilios G. Vassilakis
, Emmanouil Panaousis
, Haralambos Mouratidis:
Security Challenges of Small Cell as a Service in Virtualized Mobile Edge Computing Environments. WISTP 2016: 70-84 - [p3]Haralambos Mouratidis, Nikolaos Argyropoulos, Shaun Shei:
Security Requirements Engineering for Cloud Computing: The Secure Tropos Approach. Domain-Specific Conceptual Modeling 2016: 357-380 - [e6]John Krogstie, Haralambos Mouratidis, Jianwen Su:
Advanced Information Systems Engineering Workshops - CAiSE 2016 International Workshops, Ljubljana, Slovenia, June 13-17, 2016, Proceedings. Lecture Notes in Business Information Processing 249, Springer 2016, ISBN 978-3-319-39563-0 [contents] - 2015
- [j37]Evangelia Kavakli, Christos Kalloniatis, Haralambos Mouratidis, Stefanos Gritzalis
:
Privacy as an Integral Part of the Implementation of Cloud Solutions. Comput. J. 58(10): 2213-2224 (2015) - [j36]Oscar Rebollo, Daniel Mellado, Eduardo Fernández-Medina
, Haralambos Mouratidis
:
Empirical evaluation of a cloud computing information security governance framework. Inf. Softw. Technol. 58: 44-57 (2015) - [c56]Stavros Simou, Christos Kalloniatis, Haralambos Mouratidis, Stefanos Gritzalis
:
Towards the Development of a Cloud Forensics Methodology: A Conceptual Model. CAiSE Workshops 2015: 470-481 - [c55]Luis Márquez Alcañiz, David Garcia Rosado
, Haralambos Mouratidis, Daniel Mellado, Eduardo Fernández-Medina
:
A Framework for Secure Migration Processes of Legacy Systems to the Cloud. CAiSE Workshops 2015: 507-517 - [c54]Michalis Pavlidis
, Haralambos Mouratidis, Cesar Gonzalez-Perez
, Christos Kalloniatis:
Addressing Privacy and Trust Issues in Cultural Heritage Modelling. CRiSIS 2015: 3-16 - [c53]Stavros Simou, Christos Kalloniatis, Haralambos Mouratidis, Stefanos Gritzalis
:
A Meta-model for Assisting a Cloud Forensics Process. CRiSIS 2015: 177-187 - [c52]Shaun Shei, Aidan J. Delaney
, Stelios Kapetanakis, Haralambos Mouratidis:
Visually Mapping Requirements Models to Cloud Services. DMS 2015: 108-114 - [c51]Nikolaos Argyropoulos, Haralambos Mouratidis, Andrew Fish
:
Towards the Derivation of Secure Business Process Designs. ER Workshops 2015: 248-258 - [c50]Reza Alavi, Shareeful Islam, Haris Mouratidis, Sin Lee:
Managing Social Engineering Attacks- Considering Human Factors and Security Investment. HAISA 2015: 161-171 - [c49]Reza Alavi, Shareeful Islam, Haris Mouratidis:
Human Factors of Social Engineering Attacks (SEAs) in Hybrid Cloud Environment: Threats and Risks. ICGS3 2015: 50-56 - [c48]Umar Mukhtar Ismail, Shareeful Islam, Haralambos Mouratidis:
A Framework for Cloud Security Audit. ICGS3 2015: 296-309 - [c47]Daniel Ganji, Haralambos Mouratidis, Saeed Malekshahi Gheytassi, Miltos Petridis:
Conflicts Between Security and Privacy Measures in Software Requirements Engineering. ICGS3 2015: 323-334 - [c46]Nikolaos Argyropoulos, Luis Márquez Alcañiz, Haralambos Mouratidis, Andrew Fish
, David Garcia Rosado
, Ignacio García Rodríguez de Guzmán
, Eduardo Fernández-Medina
:
Eliciting Security Requirements for Business Processes of Legacy Systems. PoEM 2015: 91-107 - [c45]Athanasios Naskos, Anastasios Gounaris, Haralambos Mouratidis, Panagiotis Katsaros
:
Security-Aware Elasticity for NoSQL Databases. MEDI 2015: 181-197 - [c44]Shaun Shei, Luis Márquez Alcañiz, Haralambos Mouratidis, Aidan J. Delaney
, David Garcia Rosado
, Eduardo Fernández-Medina
:
Modelling secure cloud systems based on system requirements. ESPRE 2015: 19-24 - [c43]Umar Mukhtar Ismail, Shareeful Islam, Haralambos Mouratidis:
Cloud Security Audit for Migration and Continuous Monitoring. TrustCom/BigDataSE/ISPA (1) 2015: 1081-1087 - 2014
- [j35]Daniel Mellado, Haralambos Mouratidis
, Eduardo Fernández-Medina
:
Secure Tropos framework for software product lines requirements engineering. Comput. Stand. Interfaces 36(4): 711-722 (2014) - [j34]Christos Kalloniatis, Haralambos Mouratidis
, Vassilis Manousakis, Shareeful Islam, Stefanos Gritzalis
, Evangelia Kavakli:
Towards the design of secure and privacy-oriented information systems in the cloud: Identifying the major concepts. Comput. Stand. Interfaces 36(4): 759-775 (2014) - [j33]Michalis Pavlidis
, Shareeful Islam, Haralambos Mouratidis, Paul Kearney:
Modeling Trust Relationships for Developing Trustworthy Information Systems. Int. J. Inf. Syst. Model. Des. 5(1): 25-48 (2014) - [j32]Shareeful Islam, Haralambos Mouratidis
, Edgar R. Weippl:
An empirical study on the implementation and evaluation of a goal-driven software development risk management model. Inf. Softw. Technol. 56(2): 117-133 (2014) - [c42]Reza Alavi, Shareeful Islam, Haralambos Mouratidis
:
A Conceptual Framework to Analyze Human Factors of Information Security Management System (ISMS) in Organizations. HCI (24) 2014: 297-305 - [e5]Matthias Jarke, John Mylopoulos, Christoph Quix
, Colette Rolland, Yannis Manolopoulos, Haralambos Mouratidis, Jennifer Horkoff
:
Advanced Information Systems Engineering - 26th International Conference, CAiSE 2014, Thessaloniki, Greece, June 16-20, 2014. Proceedings. Lecture Notes in Computer Science 8484, Springer 2014, ISBN 978-3-319-07880-9 [contents] - 2013
- [j31]Moussa Ouedraogo, Haralambos Mouratidis
:
Selecting a Cloud Service Provider in the age of cybercrime. Comput. Secur. 38: 3-13 (2013) - [j30]Haralambos Mouratidis
, Shareeful Islam, Christos Kalloniatis, Stefanos Gritzalis
:
A framework to support selection of cloud providers based on security and privacy requirements. J. Syst. Softw. 86(9): 2276-2293 (2013) - [j29]Christos Kalloniatis, Haralambos Mouratidis
, Shareeful Islam:
Evaluating cloud deployment scenarios based on security and privacy requirements. Requir. Eng. 18(4): 299-319 (2013) - [j28]Moussa Ouedraogo, Reijo M. Savola, Haralambos Mouratidis
, David Preston, Djamel Khadraoui, Eric Dubois
:
Taxonomy of quality metrics for assessing assurance of security correctness. Softw. Qual. J. 21(1): 67-97 (2013) - [c41]Amina Souag, Camille Salinesi, Isabelle Wattiau
, Haris Mouratidis
:
Using Security and Domain Ontologies for Security Requirements Analysis. COMPSAC Workshops 2013: 101-107 - [c40]Christos Kalloniatis, Vassilis Manousakis, Haralambos Mouratidis
, Stefanos Gritzalis
:
Migrating into the Cloud: Identifying the Major Security and Privacy Concerns. I3E 2013: 73-87 - [c39]Michalis Pavlidis
, Haralambos Mouratidis
, Christos Kalloniatis, Shareeful Islam, Stefanos Gritzalis
:
Trustworthy Selection of Cloud Providers Based on Security and Privacy Requirements: Justifying Trust Assumptions. TrustBus 2013: 185-198 - 2012
- [j27]Michalis Pavlidis, Haralambos Mouratidis, Shareeful Islam:
Modelling Security Using Trust Based Concepts. Int. J. Secur. Softw. Eng. 3(2): 36-53 (2012) - [j26]Shareeful Islam, Haralambos Mouratidis, Christos Kalloniatis, Aleksandar Hudic, Lorenz Zechner:
Model Based Process to Support Security and Privacy Requirements Engineering. Int. J. Secur. Softw. Eng. 3(3): 1-22 (2012) - [j25]Haris Mouratidis
:
Preface. Inf. Syst. 37(8): 713 (2012) - [j24]Moussa Ouedraogo, Djamel Khadraoui, Haralambos Mouratidis
, Eric Dubois
:
Appraisal and reporting of security assurance at operational systems level. J. Syst. Softw. 85(1): 193-208 (2012) - [j23]Raimundas Matulevicius
, Haralambos Mouratidis, Nicolas Mayer, Eric Dubois, Patrick Heymans:
Syntactic and Semantic Extensions to Secure Tropos to Support Security Risk Management. J. Univers. Comput. Sci. 18(6): 816-844 (2012) - [j22]Haralambos Mouratidis, Christos Kalloniatis, Shareeful Islam, Marc-Philippe Huget, Stefanos Gritzalis:
Aligning Security and Privacy to Support the Development of Secure Information Systems. J. Univers. Comput. Sci. 18(12): 1608-1627 (2012) - [c38]Naved Ahmed, Raimundas Matulevicius, Haralambos Mouratidis:
A Model Transformation from Misuse Cases to Secure Tropos. CAiSE Forum 2012: 7-14 - [c37]Fatemeh Zarrabi
, Michalis Pavlidis
, Haralambos Mouratidis
, Shareeful Islam, David Preston:
A Meta-model for Legal Compliance and Trustworthiness of Information Systems. CAiSE Workshops 2012: 46-60 - [c36]Fatemeh Zarrabi Jorshari
, Haralambos Mouratidis
, Shareeful Islam:
Extracting security requirements from relevant laws and regulations. RCIS 2012: 1-9 - [c35]Michalis Pavlidis
, Haralambos Mouratidis
, Shareeful Islam, Paul Kearney:
Dealing with trust and control: A meta-model for trustworthy information systems development. RCIS 2012: 1-9 - 2011
- [j21]Moussa Ouedraogo, Haralambos Mouratidis, Eric Dubois, Djamel Khadraoui:
Security Assurance Evaluation and IT Systems' Context of Use Security Criticality. Int. J. Handheld Comput. Res. 2(4): 59-81 (2011) - [j20]Haralambos Mouratidis, Miao Kang:
Secure by Design: Developing Secure Software Systems from the Ground Up. Int. J. Secur. Softw. Eng. 2(3): 23-41 (2011) - [j19]Haralambos Mouratidis
:
Secure Software Systems Engineering: The Secure Tropos Approach (Invited Paper). J. Softw. 6(3): 331-339 (2011) - [j18]Shareeful Islam, Haralambos Mouratidis
, Jan Jürjens:
A framework to support alignment of secure software engineering with legal regulations. Softw. Syst. Model. 10(3): 369-394 (2011) - [c34]Moussa Ouedraogo, Haralambos Mouratidis
, Artur Hecker
, Cédric Bonhomme
, Djamel Khadraoui, Eric Dubois
, David Preston:
A new approach to evaluating security assurance. IAS 2011: 215-221 - [c33]Michalis Pavlidis
, Shareeful Islam, Haralambos Mouratidis
:
A CASE Tool to Support Automated Modelling and Analysis of Security Requirements, Based on Secure Tropos. CAiSE Forum (Selected Papers) 2011: 95-109 - [c32]Takafumi Komoto, Kenji Taguchi, Haralambos Mouratidis
, Nobukazu Yoshioka
, Kokichi Futatsugi:
A Modelling Framework to Support Internal Control. SSIRI (Companion) 2011: 187-193 - [p2]Haralambos Mouratidis, Paolo Ciorgini:
Secure Tropos: Extending /* and Tropos to Model Security Throughout the Development Process. Social Modeling for Requirements Engineering 2011: 363-402 - [e4]Haralambos Mouratidis, Colette Rolland:
Advanced Information Systems Engineering - 23rd International Conference, CAiSE 2011, London, UK, June 20-24, 2011. Proceedings. Lecture Notes in Computer Science 6741, Springer 2011, ISBN 978-3-642-21639-8 [contents] - 2010
- [j17]Haralambos Mouratidis
, Jan Jürjens:
From goal-driven security requirements engineering to secure design. Int. J. Intell. Syst. 25(8): 813-840 (2010) - [j16]Graham Low, Haralambos Mouratidis, Brian Henderson-Sellers:
Using a Situational Method Engineering Approach to Identify Reusable Method Fragments from the Secure TROPOS Methodology. J. Object Technol. 9(4): 93-125 (2010) - [j15]Haralambos Mouratidis
, Piotr Cofta
:
Practitioner's challenges in designing trust into online systems. J. Theor. Appl. Electron. Commer. Res. 5(3): 65-77 (2010) - [j14]Eric Dubois
, Haralambos Mouratidis
:
Guest editorial: security requirements engineering: past, present and future. Requir. Eng. 15(1): 1-5 (2010) - [j13]Haralambos Mouratidis
, Manuel Kolp, Paolo Giorgini
, Stéphane Faulkner:
An architectural description language for secure Multi-Agent Systems. Web Intell. Agent Syst. 8(1): 99-122 (2010) - [c31]Shareeful Islam, Haralambos Mouratidis
, Stefan Wagner
:
Towards a Framework to Elicit and Manage Security and Privacy Requirements from Laws and Regulations. REFSQ 2010: 255-261 - [c30]Moussa Ouedraogo, Haralambos Mouratidis
, Eric Dubois
, Djamel Khadraoui:
Information Systems Security Criticality and Assurance Evaluation. AST/UCMA/ISA/ACN 2010: 38-54 - [c29]Moussa Ouedraogo, Haralambos Mouratidis
, Djamel Khadraoui, Eric Dubois
:
An Agent-Based System to Support Assurance of Security Requirements. SSIRI 2010: 78-87
2000 – 2009
- 2009
- [j12]Ghassan Beydoun
, Graham Low, Haralambos Mouratidis
, Brian Henderson-Sellers:
A security-aware metamodel for multi-agent systems (MAS). Inf. Softw. Technol. 51(5): 832-845 (2009) - [j11]Ghassan Beydoun
, Graham C. Low, Brian Henderson-Sellers, Haralambos Mouratidis
, Jorge J. Gómez-Sanz
, Juan Pavón
, Cesar Gonzalez-Perez
:
FAML: A Generic Metamodel for MAS Development. IEEE Trans. Software Eng. 35(6): 841-863 (2009) - [c28]Haralambos Mouratidis
, Ali Sunyaev
, Jan Jürjens:
Secure Information Systems Engineering: Experiences and Lessons Learned from Two Health Care Projects. CAiSE 2009: 231-245 - [c27]Moussa Ouedraogo, Haralambos Mouratidis
, Djamel Khadraoui, Eric Dubois
:
A Risk Based Approach for Security Assurance Evaluation of IT Systems. CNSR 2009: 428-430 - [p1]Haralambos Mouratidis
, Paolo Giorgini
:
Enhancing Secure Tropos to Effectively Deal with Security Requirements in the Development of Multiagent Systems. Safety and Security in Multiagent Systems 2009: 8-26 - [e3]Dominic Palmer-Brown, Chrisina Draganova, Elias Pimenidis, Haris Mouratidis:
Engineering Applications of Neural Networks - 11th International Conference, EANN 2009, London, UK, August 27-29, 2009. Proceedings. Communications in Computer and Information Science 43, 2009, ISBN 978-3-642-03968-3 [contents] - [e2]Mike Barley, Haralambos Mouratidis, Amy Unruh, Diana F. Spears, Paul Scerri, Fabio Massacci:
Safety and Security in Multiagent Systems - Research Results from 2004-2006. Lecture Notes in Computer Science 4324, Springer 2009, ISBN 978-3-642-04878-4 [contents] - 2008
- [j10]Haralambos Mouratidis
, Hamid Jahankhani, Mathews Z. Nkhoma:
Management versus security specialists: an empirical study on security related perceptions. Inf. Manag. Comput. Secur. 16(2): 187-205 (2008) - [c26]Raimundas Matulevicius
, Nicolas Mayer
, Haralambos Mouratidis
, Eric Dubois
, Patrick Heymans, Nicolas Genon:
Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development. CAiSE 2008: 541-555 - [c25]Kamaljit Kaur Bimrah, Haralambos Mouratidis
, David Preston:
A Language for Modelling Trust in Information Systems. ISD 2008: 599-608 - [c24]Haralambos Mouratidis:
Curriculum for Modeling Security: Experiences and Lessons Learned. MODSEC@MoDELS 2008 - [c23]Moussa Ouedraogo, Djamel Khadraoui, Benoît De Rémont, Eric Dubois
, Haralambos Mouratidis
:
Deployment of a Security Assurance Monitoring Framework for Telecommunication Service Infrastructures on a VoIP Service. NTMS 2008: 1-5 - [c22]Michael Weiss, Haralambos Mouratidis
:
Selecting Security Patterns that Fulfill Security Requirements. RE 2008: 169-172 - [e1]Manuel Kolp, Brian Henderson-Sellers, Haralambos Mouratidis, Alessandro Garcia, Aditya Ghose, Paolo Bresciani:
Agent-Oriented Information Systems IV, 8th International Bi-Conference Workshop, AOIS 2006, Hakodate, Japan, May 9, 2006 and Luxembourg, Luxembourg, June 6, 2006, Revised Selected Papers. Lecture Notes in Computer Science 4898, Springer 2008, ISBN 978-3-540-77989-6 [contents] - 2007
- [j9]Haralambos Mouratidis:
Secure information systems engineering: a manifesto. Int. J. Electron. Secur. Digit. Forensics 1(1): 27-41 (2007) - [j8]Hamid Jahankhani, Shantha Fernando
, Mathews Z. Nkhoma, Haralambos Mouratidis:
Information Systems Security: Cases of Network Administrator Threats. Int. J. Inf. Secur. Priv. 1(3): 13-25 (2007) - [j7]Haralambos Mouratidis
, Paolo Giorgini
:
Secure Tropos: a Security-Oriented Extension of the Tropos Methodology. Int. J. Softw. Eng. Knowl. Eng. 17(2): 285-309 (2007) - [j6]Haralambos Mouratidis
, Paolo Giorgini
:
Security Attack Testing (SAT) - testing the security of information systems at design time. Inf. Syst. 32(8): 1166-1183 (2007) - [c21]Ghassan Beydoun, Graham Low, Haris Mouratidis, Brian Henderson-Sellers:
Modelling MAS-Specific Security Features. EMMSAD 2007: 173-182 - [c20]Abdullah Al-Zakwani, Allan J. Brimicombe, Haralambos Mouratidis
:
An Agent-Based System to Support Geo-Information Analysis. IAT 2007: 269-272 - [c19]Kamaljit Kaur Bimrah, Haralambos Mouratidis, David Preston:
Trust Ontology for Information Systems Development. ISD (2) 2007: 767-779 - [c18]Kamaljit Kaur Bimrah, Haralambos Mouratidis, David Preston:
Information Systems Development: A Trust Ontology. OTM Workshops (1) 2007: 25-26 - 2006
- [j5]Haralambos Mouratidis
, Michael Weiss, Paolo Giorgini
:
Modeling Secure Systems Using an Agent-oriented Approach and Security Patterns. Int. J. Softw. Eng. Knowl. Eng. 16(3): 471 (2006) - [c17]Haralambos Mouratidis
, Jan Jürjens, Jorge Fox:
Towards a Comprehensive Framework for Secure Systems Development. CAiSE 2006: 48-62 - [c16]Stéphane Dehousse, Lin Liu, Stéphane Faulkner, Manuel Kolp, Haralambos Mouratidis
:
Modeling Delegation through an i*-based Approach. IAT 2006: 393-397 - [c15]Stéphane Dehousse, Stéphane Faulkner, Haralambos Mouratidis
, Paolo Giorgini
, Manuel Kolp:
Reasoning about willingness in networks of agents. SELMAS 2006: 91-98 - [c14]Stéphane Dehousse, Stéphane Faulkner, Haralambos Mouratidis, Manuel Kolp, Paolo Giorgini
:
Reasoning About Willingness in Networks of Agents. SELMAS (LNCS) 2006: 117-131 - 2005
- [j4]Haralambos Mouratidis
:
Safety and Security in Multiagent Systems: Report on the 2nd SASEMAS workshop (SASEMAS'05). Comput. Secur. 24(8): 614-617 (2005) - [j3]Haralambos Mouratidis
, Paolo Giorgini
, Gordon A. Manson:
When security meets software engineering: a case of modelling secure information systems. Inf. Syst. 30(8): 609-629 (2005) - [c13]Haralambos Mouratidis, Manuel Kolp, Stéphane Faulkner, Paolo Giorgini:
A secure architectural description language for agent systems. AAMAS 2005: 578-585 - [c12]Haralambos Mouratidis
, Michael Weiss, Paolo Giorgini
:
Security Patterns Meet Agent Oriented Software Engineering: A Complementary Solution for Developing Secure Information Systems. ER 2005: 225-240 - [c11]Stéphane Faulkner, Stéphane Dehousse, Manuel Kolp, Haralambos Mouratidis
, Paolo Giorgini
:
Delegation Mechanisms for Agent Architectural Design. IAT 2005: 503-507 - [c10]Haralambos Mouratidis, Michael Weiss:
Patterns for Modelling Agent Systems with Tropos. SELMAS (LNCS) 2005: 207-223 - 2004
- [c9]Haralambos Mouratidis, Paolo Giorgini, Gordon A. Manson:
Using Security Attack Scenarios to Analyse Security During Information Systems Design. ICEIS (3) 2004: 10-17 - 2003
- [j2]Haralambos Mouratidis, Gordon A. Manson, Ian R. Philp
:
Analysis and Design of the eSAP: An Integrated Health and Social Care Information System. Health Informatics J. 9(2): 89-92 (2003) - [j1]Haralambos Mouratidis, Gordon A. Manson, Ian R. Philp
:
A Novel Agent-Based System to Support the Single Assessment Process of Older People. Health Informatics J. 9(3): 149-162 (2003) - [c8]Agostino Poggi, Giovanni Rimassa, Paola Turci, James Odell, Haralambos Mouratidis, Gordon A. Manson:
Modeling Deployment and Mobility Issues in Multiagent Systems Using AUML. AOSE 2003: 69-84 - [c7]Haralambos Mouratidis, Paolo Giorgini, Gordon A. Manson:
Modelling secure multiagent systems. AAMAS 2003: 859-866 - [c6]Haralambos Mouratidis, Paolo Giorgini, Gordon A. Manson:
Integrating Security and Systems Engineering: Towards the Modelling of Secure Information Systems. CAiSE 2003: 63-78 - [c5]Haralambos Mouratidis, Paolo Giorgini, Markus Schumacher:
A Set of Patterns for Secure Agent Systems. EuroPLoP 2003: 399-416 - [c4]Haralambos Mouratidis, Gordon A. Manson, Abdullah Gani, Paolo Giorgini:
Analysing Security Requirements of Information Systems Using Tropos. ICEIS (3) 2003: 623-626 - [c3]Haralambos Mouratidis, Paolo Giorgini, Gordon A. Manson:
An Ontology for Modelling Security: The Tropos Approach. KES 2003: 1387-1394 - [c2]Paolo Bresciani, Paolo Giorgini, Haralambos Mouratidis, Gordon A. Manson:
Multi-agent Systems and Security Requirements Analysis. SELMAS 2003: 35-48 - 2002
- [c1]Haralambos Mouratidis, Paolo Giorgini, Ian R. Philp, Gordon A. Manson:
Using Tropos Methodology to Model an Integrated Health Assessment System. AOIS@CAiSE 2002
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 22:58 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint