Suivre
Haralambos Mouratidis
Haralambos Mouratidis
Autres nomsHaris Mouratidis
Director, Institute for Analytics and Data Science (IADS), University of Essex
Adresse e-mail validée de essex.ac.uk
Titre
Citée par
Citée par
Année
Secure tropos: a security-oriented extension of the tropos methodology
H Mouratidis, P Giorgini
International Journal of Software Engineering and Knowledge Engineering 17 …, 2007
4942007
FAML: a generic metamodel for MAS development
G Beydoun, G Low, B Henderson-Sellers, H Mouratidis, JJ Gomez-Sanz, ...
IEEE Transactions on Software Engineering 35 (6), 841-863, 2009
2202009
When security meets software engineering: a case of modelling secure information systems
H Mouratidis, P Giorgini, G Manson
Information Systems 30 (8), 609-629, 2005
1892005
Integrating security and systems engineering: Towards the modelling of secure information systems
H Mouratidis, P Giorgini, G Manson
Advanced Information Systems Engineering: 15th International Conference …, 2003
1752003
A framework to support selection of cloud providers based on security and privacy requirements
H Mouratidis, S Islam, C Kalloniatis, S Gritzalis
Journal of Systems and Software 86 (9), 2276-2293, 2013
1722013
Website design guidelines: high power distance and high context culture
T Ahmed, H Mouratidis, D Preston
International Journal of Cyber Society and Education 2 (1), 47-60, 2009
135*2009
Integrating Security and Software Engineering: Advances and Future Visions: Advances and Future Visions
H Mouratidis, P Giorgini
Igi Global, 2006
1212006
Empirical evaluation of a cloud computing information security governance framework
O Rebollo, D Mellado, E Fernández-Medina, H Mouratidis
Information and Software Technology 58, 44-57, 2015
1172015
Cyber-attack path discovery in a dynamic supply chain maritime risk management system
N Polatidis, M Pavlidis, H Mouratidis
Computer Standards & Interfaces 56, 74-82, 2018
1132018
Modelling secure systems using an agent oriented approach and security patterns
H Mouratidis, M Weiss, P Giorgini
International Journal of Software Engineering and Knowledge Engineering 16 …, 2006
1122006
Adapting secure tropos for security risk management in the early phases of information systems development
R Matulevičius, N Mayer, H Mouratidis, E Dubois, P Heymans, N Genon
Advanced Information Systems Engineering: 20th International Conference …, 2008
1042008
Modelling secure multiagent systems
H Mouratidis, P Giorgini, G Manson
Proceedings of the second international joint conference on Autonomous …, 2003
1042003
Towards the design of secure and privacy-oriented information systems in the cloud: Identifying the major concepts
C Kalloniatis, H Mouratidis, M Vassilis, S Islam, S Gritzalis, E Kavakli
Computer Standards & Interfaces 36 (4), 759-775, 2014
932014
From goal‐driven security requirements engineering to secure design
H Mouratidis, J Jurjens
International Journal of Intelligent Systems 25 (8), 813-840, 2010
892010
A natural extension of tropos methodology for modelling security
H Mouratidis
Proceedings Agent Oriented Methodologies Workshop, 2002
892002
Evaluating cloud deployment scenarios based on security and privacy requirements
C Kalloniatis, H Mouratidis, S Islam
Requirements Engineering 18, 299-319, 2013
842013
Privacy-preserving collaborative recommendations based on random perturbations
N Polatidis, CK Georgiadis, E Pimenidis, H Mouratidis
Expert Systems with Applications 71, 18-25, 2017
832017
Modelling security and trust with secure tropos
P Giorgini, H Mouratidis, N Zannone
Integrating Security and Software Engineering: Advances and Future Visions …, 2007
832007
An ontology for modelling security: The tropos approach
H Mouratidis, P Giorgini, G Manson
Knowledge-Based Intelligent Information and Engineering Systems: 7th …, 2003
832003
An empirical study on the implementation and evaluation of a goal-driven software development risk management model
S Islam, H Mouratidis, ER Weippl
Information and Software Technology 56 (2), 117-133, 2014
802014
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20