Haralambos Mouratidis
Orcid: 0000-0002-2599-0712Affiliations:
- University of Brighton, School of Computing, Engineering and Mathematics, UK
- University of East London, UK (former)
According to our database1,
Haralambos Mouratidis
authored at least 175 papers
between 2002 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
On csauthors.net:
Bibliography
2025
MARISMA: A modern and context-aware framework for assessing and managing information cybersecurity risks.
Comput. Stand. Interfaces, 2025
2024
Towards an integrated risk analysis security framework according to a systematic analysis of existing proposals.
Frontiers Comput. Sci., June, 2024
Synthetic Data Generation and Impact Analysis of Machine Learning Models for Enhanced Credit Card Fraud Detection.
Proceedings of the Artificial Intelligence Applications and Innovations, 2024
Proceedings of the Artificial Intelligence Applications and Innovations, 2024
2023
Modelling language for cyber security incident handling for critical infrastructures.
Comput. Secur., May, 2023
Proceedings of the 18th International Conference on Software Technologies, 2023
2022
A Dynamic Four-Step Data Security Model for Data in Cloud Computing Based on Cryptography and Steganography.
Sensors, 2022
An integrated cyber security risk management framework and risk predication for the critical infrastructure protection.
Neural Comput. Appl., 2022
The supply chain of a Living Lab: Modelling security, privacy, and vulnerability issues alongside with their impact and potential mitigation strategies.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2022
Integr. Comput. Aided Eng., 2022
Comput. Ind., 2022
OntoCyrene: Towards Ontology-Enhanced Asset Modelling for Supply Chains in the Context of Cyber Security.
Proceedings of the Computer Security. ESORICS 2022 International Workshops, 2022
2021
J. Data Intell., 2021
Handling of advanced persistent threats and complex incidents in healthcare, transportation and energy ICT infrastructures.
Evol. Syst., 2021
A Dynamic Cyber Security Situational Awareness Framework for Healthcare ICT Infrastructures.
Proceedings of the PCI 2021: 25th Pan-Hellenic Conference on Informatics, Volos, Greece, November 26, 2021
Cyber Supply Chain Threat Analysis and Prediction Using Machine Learning and Ontology.
Proceedings of the Artificial Intelligence Applications and Innovations, 2021
An Automated Tool to Support an Intelligence Learner Management System Using Learning Analytics and Machine Learning.
Proceedings of the Artificial Intelligence Applications and Innovations, 2021
A Framework for Privacy and Security Requirements Analysis and Conflict Resolution for Supporting GDPR Compliance Through Privacy-by-Design.
Proceedings of the Evaluation of Novel Approaches to Software Engineering, 2021
ConfIs: A Tool for Privacy and Security Analysis and Conflict Resolution for Supporting GDPR Compliance through Privacy-by-Design.
Proceedings of the 16th International Conference on Evaluation of Novel Approaches to Software Engineering, 2021
The landscape of cybersecurity vulnerabilities and challenges in healthcare: Security standards and paradigm shift recommendations.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
2020
Proceedings of the Visual Privacy Management, 2020
Proceedings of the Visual Privacy Management, 2020
Modelling the interplay of security, privacy and trust in sociotechnical systems: a computer-aided design approach.
Softw. Syst. Model., 2020
Softw. Syst. Model., 2020
Softw. Syst. Model., 2020
Protecting Citizens' Personal Data and Privacy: Joint Effort from GDPR EU Cluster Research Projects.
SN Comput. Sci., 2020
Privacy, security, legal and technology acceptance elicited and consolidated requirements for a GDPR compliance platform.
Inf. Comput. Secur., 2020
From product recommendation to cyber-attack prediction: generating attack graphs and predicting future attacks.
Evol. Syst., 2020
DEFeND DSM: A Data Scope Management Service for Model-Based Privacy by Design GDPR Compliance.
Proceedings of the Trust, Privacy and Security in Digital Business, 2020
Proceedings of the Perspectives in Business Informatics Research, 2020
2019
Practical evaluation of a reference architecture for the management of privacy level agreements.
Inf. Comput. Secur., 2019
Ad Hoc Networks, 2019
Proceedings of the Trust, Privacy and Security in Digital Business, 2019
Lockout-Tagout Ransomware: A Detection Method for Ransomware using Fuzzy Hashing and Clustering.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2019
Proceedings of the 13th International Conference on Research Challenges in Information Science, 2019
Privacy, Security, Legal and Technology Acceptance Requirements for a GDPR Compliance Platform.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019
A Conceptual Redesign of a Modelling Language for Cyber Resiliency of Healthcare Systems.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019
Cyber Security Incident Handling, Warning and Response System for the European Critical Information Infrastructures (CyberSANE).
Proceedings of the Engineering Applications of Neural Networks, 2019
2018
IEEE Trans. Ind. Informatics, 2018
IEEE Trans. Cloud Comput., 2018
Applying the physics of notation to the evaluation of a security and privacy requirements engineering methodology.
Inf. Comput. Secur., 2018
Cyber-attack path discovery in a dynamic supply chain maritime risk management system.
Comput. Stand. Interfaces, 2018
Proceedings of the Trust, Privacy and Security in Digital Business, 2018
Proceedings of the 12th Mediterranean Conference on Information Systems, 2018
2017
J. Univers. Comput. Sci., 2017
Int. J. Intell. Inf. Database Syst., 2017
Expert Syst. Appl., 2017
Comput. Sci. Inf. Syst., 2017
Proceedings of the 19th IEEE Conference on Business Informatics, 2017
Proceedings of the Trust, Privacy and Security in Digital Business, 2017
Proceedings of the 15th IEEE International Conference on Software Engineering Research, 2017
Proceedings of the ICT Systems Security and Privacy Protection, 2017
Proceedings of the 24th International Conference on Telecommunications, 2017
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017
Evaluation of a Security and Privacy Requirements Methodology Using the Physics of Notation.
Proceedings of the Computer Security - ESORICS 2017 International Workshops, 2017
Proceedings of the Computer Security - ESORICS 2017 International Workshops, 2017
Proceedings of the ER Forum 2017 and the ER 2017 Demo Track co-located with the 36th International Conference on Conceptual Modelling (ER 2017), Valencia, Spain,, 2017
Recommender Systems Meeting Security: From Product Recommendation to Cyber-Attack Prediction.
Proceedings of the Engineering Applications of Neural Networks, 2017
Are Small Cells and Network Intelligence at the Edge the Drivers for 5G Market Adoption? The SESAME Case.
Proceedings of the Engineering Applications of Neural Networks, 2017
Proceedings of the Enterprise, Business-Process and Information Systems Modeling, 2017
Proceedings of the Forum and Doctoral Consortium Papers Presented at the 29th International Conference on Advanced Information Systems Engineering, 2017
Proceedings of the Enterprise, Business-Process and Information Systems Modeling, 2017
Privacy Data Management and Awareness for Public Administrations: A Case Study from the Healthcare Domain.
Proceedings of the Privacy Technologies and Policy - 5th Annual Privacy Forum, 2017
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017
2016
Inf. Comput. Secur., 2016
IEEE Cloud Comput., 2016
Security Challenges of Small Cell as a Service in Virtualized Mobile Edge Computing Environments.
Proceedings of the Information Security Theory and Practice, 2016
Proceedings of the Trust, Privacy and Security in Digital Business, 2016
Proceedings of the Trust, Privacy and Security in Digital Business, 2016
Proceedings of the 24th IEEE International Requirements Engineering Conference, 2016
Proceedings of the Tenth IEEE International Conference on Research Challenges in Information Science, 2016
System architecture and deployment scenarios for SESAME: Small cEllS coodinAtion for Multi-tenancy and Edge services.
Proceedings of the IEEE NetSoft Conference and Workshops, 2016
Proceedings of the 4th International Conference on Enterprise Systems, 2016
Proceedings of the Advanced Information Systems Engineering Workshops, 2016
Proceedings of the Domain-Specific Conceptual Modeling, Concepts, Methods and Tools, 2016
2015
Inf. Softw. Technol., 2015
Comput. J., 2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the 2nd IEEE Workshop on Evolving Security and Privacy Requirements Engineering, 2015
Proceedings of the Model and Data Engineering - 5th International Conference, 2015
Proceedings of the Practice of Enterprise Modeling, 2015
Proceedings of the Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security, 2015
Conflicts Between Security and Privacy Measures in Software Requirements Engineering.
Proceedings of the Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security, 2015
Human Factors of Social Engineering Attacks (SEAs) in Hybrid Cloud Environment: Threats and Risks.
Proceedings of the Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security, 2015
Managing Social Engineering Attacks- Considering Human Factors and Security Investment.
Proceedings of the Ninth International Symposium on Human Aspects of Information Security & Assurance, 2015
Proceedings of the Advances in Conceptual Modeling, 2015
Proceedings of the 21st International Conference on Distributed Multimedia Systems, Vancouver, Canada, August 31, 2015
Proceedings of the Risks and Security of Internet and Systems, 2015
Proceedings of the Risks and Security of Internet and Systems, 2015
Proceedings of the Advanced Information Systems Engineering Workshops, 2015
Proceedings of the Advanced Information Systems Engineering Workshops, 2015
2014
An empirical study on the implementation and evaluation of a goal-driven software development risk management model.
Inf. Softw. Technol., 2014
Int. J. Inf. Syst. Model. Des., 2014
Comput. Stand. Interfaces, 2014
Towards the design of secure and privacy-oriented information systems in the cloud: Identifying the major concepts.
Comput. Stand. Interfaces, 2014
A Conceptual Framework to Analyze Human Factors of Information Security Management System (ISMS) in Organizations.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014
2013
Softw. Qual. J., 2013
Requir. Eng., 2013
A framework to support selection of cloud providers based on security and privacy requirements.
J. Syst. Softw., 2013
Trustworthy Selection of Cloud Providers Based on Security and Privacy Requirements: Justifying Trust Assumptions.
Proceedings of the Trust, Privacy, and Security in Digital Business, 2013
Proceedings of the Collaborative, Trusted and Privacy-Aware e/m-Services, 2013
Proceedings of the IEEE 37th Annual Computer Software and Applications Conference, 2013
2012
Aligning Security and Privacy to Support the Development of Secure Information Systems.
J. Univers. Comput. Sci., 2012
Syntactic and Semantic Extensions to Secure Tropos to Support Security Risk Management.
J. Univers. Comput. Sci., 2012
J. Syst. Softw., 2012
Int. J. Secur. Softw. Eng., 2012
Dealing with trust and control: A meta-model for trustworthy information systems development.
Proceedings of the Sixth International Conference on Research Challenges in Information Science, 2012
Proceedings of the Sixth International Conference on Research Challenges in Information Science, 2012
Proceedings of the Advanced Information Systems Engineering Workshops, 2012
Proceedings of the CAiSE'12 Forum at the 24<sup>th</sup> International Conference on Advanced Information Systems Engineering (CAiSE), 2012
2011
A framework to support alignment of secure software engineering with legal regulations.
Softw. Syst. Model., 2011
J. Softw., 2011
Int. J. Secur. Softw. Eng., 2011
Int. J. Handheld Comput. Res., 2011
Proceedings of the Fifth International Conference on Secure Software Integration and Reliability Improvement, 2011
A CASE Tool to Support Automated Modelling and Analysis of Security Requirements, Based on Secure Tropos.
Proceedings of the IS Olympics: Information Systems in a Diverse World, 2011
Proceedings of the 7th International Conference on Information Assurance and Security, 2011
Secure Tropos: Extending /* and Tropos to Model Security Throughout the Development Process.
Proceedings of the Social Modeling for Requirements Engineering., 2011
2010
Web Intell. Agent Syst., 2010
Requir. Eng., 2010
J. Theor. Appl. Electron. Commer. Res., 2010
Using a Situational Method Engineering Approach to Identify Reusable Method Fragments from the Secure TROPOS Methodology.
J. Object Technol., 2010
Int. J. Intell. Syst., 2010
Proceedings of the Fourth International Conference on Secure Software Integration and Reliability Improvement, 2010
Proceedings of the Advances in Computer Science and Information Technology, 2010
Towards a Framework to Elicit and Manage Security and Privacy Requirements from Laws and Regulations.
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2010
2009
Enhancing Secure Tropos to Effectively Deal with Security Requirements in the Development of Multiagent Systems.
Proceedings of the Safety and Security in Multiagent Systems, 2009
Proceedings of the 7th Annual Conference on Communication Networks and Services Research, 2009
Secure Information Systems Engineering: Experiences and Lessons Learned from Two Health Care Projects.
Proceedings of the Advanced Information Systems Engineering, 21st International Conference, 2009
2008
Management versus security specialists: an empirical study on security related perceptions.
Inf. Manag. Comput. Secur., 2008
Proceedings of the 16th IEEE International Requirements Engineering Conference, 2008
Deployment of a Security Assurance Monitoring Framework for Telecommunication Service Infrastructures on a VoIP Service.
Proceedings of the NTMS 2008, 2008
Proceedings of the Workshop on Modeling Security ( MODSEC08 ) held as part of the 2008 International Conference on Model Driven Engineering Languages and Systems ( MODELS ) Toulouse, 2008
Proceedings of the Information Systems Development, 2008
Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development.
Proceedings of the Advanced Information Systems Engineering, 20th International Conference, 2008
2007
Security Attack Testing (SAT) - testing the security of information systems at design time.
Inf. Syst., 2007
Int. J. Softw. Eng. Knowl. Eng., 2007
Int. J. Inf. Secur. Priv., 2007
Int. J. Electron. Secur. Digit. Forensics, 2007
Proceedings of the On the Move to Meaningful Internet Systems 2007: OTM 2007 Workshops, 2007
Proceedings of the Information Systems Development, 2007
Proceedings of the 2007 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2007
Proceedings of the 12th International Workshop on Exploring Modeling Methods for Systems Analysis and Design, 2007
2006
Int. J. Softw. Eng. Knowl. Eng., 2006
Proceedings of the Software Engineering for Multi-Agent Systems V, 2006
Proceedings of the 2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2006
Proceedings of the Advanced Information Systems Engineering, 18th International Conference, 2006
2005
When security meets software engineering: a case of modelling secure information systems.
Inf. Syst., 2005
Safety and Security in Multiagent Systems: Report on the 2nd SASEMAS workshop (SASEMAS'05).
Comput. Secur., 2005
Proceedings of the Software Engineering for Multi-Agent Systems IV, 2005
Proceedings of the 2005 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2005
Security Patterns Meet Agent Oriented Software Engineering: A Complementary Solution for Developing Secure Information Systems.
Proceedings of the Conceptual Modeling, 2005
Proceedings of the 4th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2005), 2005
2004
Using Security Attack Scenarios to Analyse Security During Information Systems Design.
Proceedings of the ICEIS 2004, 2004
2003
Health Informatics J., 2003
Analysis and Design of the eSAP: An Integrated Health and Social Care Information System.
Health Informatics J., 2003
Proceedings of the Software Engineering for Multi-Agent Systems II, 2003
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2003
Analysing Security Requirements of Information Systems Using Tropos.
Proceedings of the ICEIS 2003, 2003
Proceedings of the 8th European Conference on Pattern Languages of Programms (EuroPLoP '2003), 2003
Integrating Security and Systems Engineering: Towards the Modelling of Secure Information Systems.
Proceedings of the Advanced Information Systems Engineering, 15th International Conference, 2003
Proceedings of the Second International Joint Conference on Autonomous Agents & Multiagent Systems, 2003
Proceedings of the Agent-Oriented Software Engineering IV, 4th International Workshop, 2003
2002
Proceedings of the AOIS '02, 2002