Addressing privacy requirements in system design: the PriS method C Kalloniatis, E Kavakli, S Gritzalis Requirements Engineering 13 (3), 241-255, 2008 | 261 | 2008 |
A framework to support selection of cloud providers based on security and privacy requirements H Mouratidis, S Islam, C Kalloniatis, S Gritzalis Journal of Systems and Software 86 (9), 2276-2293, 2013 | 145 | 2013 |
Towards the design of secure and privacy-oriented information systems in the cloud: Identifying the major concepts C Kalloniatis, H Mouratidis, M Vassilis, S Islam, S Gritzalis, E Kavakli Computer Standards & Interfaces 36 (4), 759-775, 2014 | 75 | 2014 |
Evaluating cloud deployment scenarios based on security and privacy requirements C Kalloniatis, H Mouratidis, S Islam Requirements Engineering 18 (4), 299-319, 2013 | 72 | 2013 |
Intelligent modification for the daltonization process of digitized paintings CN Anagnostopoulos, G Tsekouras, I Anagnostopoulos, C Kalloniatis International Conference on Computer Vision Systems: Proceedings (2007), 2007 | 54* | 2007 |
Cloud forensics: identifying the major issues and challenges S Simou, C Kalloniatis, E Kavakli, S Gritzalis International conference on advanced information systems engineering, 271-284, 2014 | 47 | 2014 |
Incorporating privacy requirements into the system design process: the PriS conceptual framework E Kavakli, C Kalloniatis, P Loucopoulos, S Gritzalis Internet research, 2006 | 43 | 2006 |
A survey on cloud forensics challenges and solutions S Simou, C Kalloniatis, S Gritzalis, H Mouratidis Security and Communication Networks 9 (18), 6285-6314, 2016 | 35 | 2016 |
Model based process to support security and privacy requirements engineering S Islam, H Mouratidis, C Kalloniatis, A Hudic, L Zechner International Journal of Secure Software Engineering (IJSSE) 3 (3), 1-22, 2012 | 34 | 2012 |
Fuzzy Clustering of Categorical Attributes and its Use in Analyzing Cultural Data. GE Tsekouras, D Papageorgiou, SB Kotsiantis, C Kalloniatis, PE Pintelas International Conference on Computational Intelligence, 202-206, 2004 | 31 | 2004 |
Assurance of security and privacy requirements for cloud deployment models S Islam, M Ouedraogo, C Kalloniatis, H Mouratidis, S Gritzalis IEEE Transactions on Cloud Computing 6 (2), 387-400, 2015 | 30 | 2015 |
Protecting privacy in system design: the electronic voting case E Kavakli, S Gritzalis, K Christos Transforming Government: People, Process and Policy, 2007 | 27 | 2007 |
Security requirements engineering for e-government applications: analysis of current frameworks C Kalloniatis, E Kavakli, S Gritzalis International Conference on Electronic Government, 66-71, 2004 | 27 | 2004 |
Machine learning and images for malware detection and classification K Kosmidis, C Kalloniatis Proceedings of the 21st Pan-Hellenic Conference on Informatics, 1-6, 2017 | 26 | 2017 |
Using privacy process patterns for incorporating privacy requirements into the system design process C Kalloniatis, E Kavakli, S Gritzalis The Second International Conference on Availability, Reliability and …, 2007 | 26 | 2007 |
Trustworthy selection of cloud providers based on security and privacy requirements: Justifying trust assumptions M Pavlidis, H Mouratidis, C Kalloniatis, S Islam, S Gritzalis International Conference on Trust, Privacy and Security in Digital Business …, 2013 | 24 | 2013 |
Methods for designing privacy aware information systems: a review C Kalloniatis, E Kavakli, S Gritzalis 2009 13th Panhellenic Conference on Informatics, 185-194, 2009 | 24 | 2009 |
Pris Tool: A Case Tool For Privacy-Oriented Requirements Engineering. C Kalloniatis, E Kavakli, E Kontellis MCIS, 71, 2009 | 24 | 2009 |
Dealing with privacy issues during the system design process C Kalloniatis, E Kavakli, S Gritzalis Proceedings of the Fifth IEEE International Symposium on Signal Processing …, 2005 | 23 | 2005 |
Cloud forensics solutions: A review S Simou, C Kalloniatis, E Kavakli, S Gritzalis International Conference on Advanced Information Systems Engineering, 299-309, 2014 | 22 | 2014 |