Folgen
Haralambos Mouratidis
Haralambos Mouratidis
Sonstige NamenHaris Mouratidis
Director, Institute for Analytics and Data Science (IADS), University of Essex
Bestätigte E-Mail-Adresse bei essex.ac.uk
Titel
Zitiert von
Zitiert von
Jahr
Secure tropos: a security-oriented extension of the tropos methodology
H Mouratidis, P Giorgini
International Journal of Software Engineering and Knowledge Engineering 17 …, 2007
4972007
FAML: a generic metamodel for MAS development
G Beydoun, G Low, B Henderson-Sellers, H Mouratidis, JJ Gomez-Sanz, ...
IEEE Transactions on Software Engineering 35 (6), 841-863, 2009
2222009
When security meets software engineering: a case of modelling secure information systems
H Mouratidis, P Giorgini, G Manson
Information Systems 30 (8), 609-629, 2005
1902005
Integrating security and systems engineering: Towards the modelling of secure information systems
H Mouratidis, P Giorgini, G Manson
Advanced Information Systems Engineering: 15th International Conference …, 2003
1752003
A framework to support selection of cloud providers based on security and privacy requirements
H Mouratidis, S Islam, C Kalloniatis, S Gritzalis
Journal of Systems and Software 86 (9), 2276-2293, 2013
1712013
Website design guidelines: high power distance and high context culture
T Ahmed, H Mouratidis, D Preston
International Journal of Cyber Society and Education 2 (1), 47-60, 2009
139*2009
Integrating Security and Software Engineering: Advances and Future Visions: Advances and Future Visions
H Mouratidis, P Giorgini
Igi Global, 2006
1212006
Empirical evaluation of a cloud computing information security governance framework
O Rebollo, D Mellado, E Fernández-Medina, H Mouratidis
Information and Software Technology 58, 44-57, 2015
1182015
Cyber-attack path discovery in a dynamic supply chain maritime risk management system
N Polatidis, M Pavlidis, H Mouratidis
Computer Standards & Interfaces 56, 74-82, 2018
1152018
Modelling secure systems using an agent oriented approach and security patterns
H Mouratidis, M Weiss, P Giorgini
International Journal of Software Engineering and Knowledge Engineering 16 …, 2006
1122006
Adapting secure tropos for security risk management in the early phases of information systems development
R Matulevičius, N Mayer, H Mouratidis, E Dubois, P Heymans, N Genon
Advanced Information Systems Engineering: 20th International Conference …, 2008
1052008
Modelling secure multiagent systems
H Mouratidis, P Giorgini, G Manson
Proceedings of the second international joint conference on Autonomous …, 2003
1022003
Towards the design of secure and privacy-oriented information systems in the cloud: Identifying the major concepts
C Kalloniatis, H Mouratidis, M Vassilis, S Islam, S Gritzalis, E Kavakli
Computer Standards & Interfaces 36 (4), 759-775, 2014
922014
A natural extension of tropos methodology for modelling security
H Mouratidis
Proceedings Agent Oriented Methodologies Workshop, 2002
882002
From goal‐driven security requirements engineering to secure design
H Mouratidis, J Jurjens
International Journal of Intelligent Systems 25 (8), 813-840, 2010
872010
Privacy-preserving collaborative recommendations based on random perturbations
N Polatidis, CK Georgiadis, E Pimenidis, H Mouratidis
Expert Systems with Applications 71, 18-25, 2017
852017
An ontology for modelling security: The tropos approach
H Mouratidis, P Giorgini, G Manson
Knowledge-Based Intelligent Information and Engineering Systems: 7th …, 2003
852003
Evaluating cloud deployment scenarios based on security and privacy requirements
C Kalloniatis, H Mouratidis, S Islam
Requirements Engineering 18, 299-319, 2013
842013
Modelling security and trust with secure tropos
P Giorgini, H Mouratidis, N Zannone
Integrating Security and Software Engineering: Advances and Future Visions …, 2007
842007
An empirical study on the implementation and evaluation of a goal-driven software development risk management model
S Islam, H Mouratidis, ER Weippl
Information and Software Technology 56 (2), 117-133, 2014
812014
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20