Haralambos Mouratidis
Haralambos Mouratidis
Professor of Software Systems Engineering, University of Brighton
Verified email at brighton.ac.uk
TitleCited byYear
Secure tropos: a security-oriented extension of the tropos methodology
H Mouratidis, P Giorgini
International Journal of Software Engineering and Knowledge Engineering 17 …, 2007
3642007
FAML: a generic metamodel for MAS development
G Beydoun, G Low, B Henderson-Sellers, H Mouratidis, JJ Gomez-Sanz, ...
IEEE Transactions on Software Engineering 35 (6), 841-863, 2009
1712009
Handling concept drift in process mining
RPJC Bose, WMP van der Aalst, I Žliobaitė, M Pechenizkiy
International Conference on Advanced Information Systems Engineering, 391-405, 2011
1662011
Integrating security and systems engineering: Towards the modelling of secure information systems
H Mouratidis, P Giorgini, G Manson
International Conference on Advanced Information Systems Engineering, 63-78, 2003
1512003
When security meets software engineering: a case of modelling secure information systems
H Mouratidis, P Giorgini, G Manson
Information Systems 30 (8), 609-629, 2005
1422005
A framework to support selection of cloud providers based on security and privacy requirements
H Mouratidis, S Islam, C Kalloniatis, S Gritzalis
Journal of Systems and Software 86 (9), 2276-2293, 2013
1172013
Integrating Security and Software Engineering
H Mouratidis, P Giorgini
Idea Group Inc, Hershey, PA, USA, 2007
1142007
Website design guidelines: High power distance and high context culture
T Ahmed, H Mouratidis, D Preston
International Journal of Cyber Society and Education 2 (1), 47-60, 2009
93*2009
Modelling secure multiagent systems
H Mouratidis, P Giorgini, G Manson
Proceedings of the second international joint conference on Autonomous …, 2003
892003
Adapting secure tropos for security risk management in the early phases of information systems development
R Matulevičius, N Mayer, H Mouratidis, E Dubois, P Heymans, N Genon
International Conference on Advanced Information Systems Engineering, 541-555, 2008
872008
A natural extension of tropos methodology for modelling security
H Mouratidis
Proceedings Agent Oriented Methodologies Workshop, 2002
792002
Modelling security and trust with secure tropos
P Giorgini, H Mouratidis, N Zannone
Integrating Security and Software Engineering: Advances and Future Visions …, 2007
752007
Empirical evaluation of a cloud computing information security governance framework
O Rebollo, D Mellado, E Fernández-Medina, H Mouratidis
Information and Software Technology 58, 44-57, 2015
732015
An ontology for modelling security: The tropos approach
H Mouratidis, P Giorgini, G Manson
International Conference on Knowledge-Based and Intelligent Information and …, 2003
732003
From goal‐driven security requirements engineering to secure design
H Mouratidis, J Jurjens
International Journal of Intelligent Systems 25 (8), 813-840, 2010
662010
Towards the design of secure and privacy-oriented information systems in the cloud: Identifying the major concepts
C Kalloniatis, H Mouratidis, M Vassilis, S Islam, S Gritzalis, E Kavakli
Computer Standards & Interfaces 36 (4), 759-775, 2014
652014
Role of depressive symptoms in explaining socioeconomic status disparities in dietary quality and central adiposity among US adults: a structural equation modeling approach
MA Beydoun, MTF Kuczmarski, MA Mason, SM Ling, MK Evans, ...
The American journal of clinical nutrition 90 (4), 1084-1095, 2009
652009
Evaluating cloud deployment scenarios based on security and privacy requirements
C Kalloniatis, H Mouratidis, S Islam
Requirements Engineering 18 (4), 299-319, 2013
642013
Security Attack Testing (SAT)—testing the security of information systems at design time
H Mouratidis, P Giorgini
Information systems 32 (8), 1166-1183, 2007
612007
A security-aware metamodel for multi-agent systems (MAS)
G Beydoun, G Low, H Mouratidis, B Henderson-Sellers
Information and software technology 51 (5), 832-845, 2009
552009
The system can't perform the operation now. Try again later.
Articles 1–20