Haralambos Mouratidis

Orcid: 0000-0002-2599-0712

Affiliations:
  • University of Brighton, School of Computing, Engineering and Mathematics, UK
  • University of East London, UK (former)


According to our database1, Haralambos Mouratidis authored at least 175 papers between 2002 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
MARISMA: A modern and context-aware framework for assessing and managing information cybersecurity risks.
Comput. Stand. Interfaces, 2025

2024
Towards an integrated risk analysis security framework according to a systematic analysis of existing proposals.
Frontiers Comput. Sci., June, 2024

Synthetic Data Generation and Impact Analysis of Machine Learning Models for Enhanced Credit Card Fraud Detection.
Proceedings of the Artificial Intelligence Applications and Innovations, 2024

Enhancing Malware Detection Through Machine Learning Using XAI with SHAP Framework.
Proceedings of the Artificial Intelligence Applications and Innovations, 2024

2023
Modelling language for cyber security incident handling for critical infrastructures.
Comput. Secur., May, 2023

New Frontiers in Security Risk Management.
IT Prof., 2023

Goal-Modeling Privacy-by-Design Patterns for Supporting GDPR Compliance.
Proceedings of the 18th International Conference on Software Technologies, 2023

2022
A Dynamic Four-Step Data Security Model for Data in Cloud Computing Based on Cryptography and Steganography.
Sensors, 2022

An integrated cyber security risk management framework and risk predication for the critical infrastructure protection.
Neural Comput. Appl., 2022

The supply chain of a Living Lab: Modelling security, privacy, and vulnerability issues alongside with their impact and potential mitigation strategies.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2022

Vulnerability prediction for secure healthcare supply chain service delivery.
Integr. Comput. Aided Eng., 2022

Managing cybersecurity risks of cyber-physical systems: The MARISMA-CPS pattern.
Comput. Ind., 2022

Trust Management in Social Internet of Things (SIoT): A Survey.
IEEE Access, 2022

OntoCyrene: Towards Ontology-Enhanced Asset Modelling for Supply Chains in the Context of Cyber Security.
Proceedings of the Computer Security. ESORICS 2022 International Workshops, 2022

2021
A Data Scope Management Service to Support Privacy by Design and GDPR Compliance.
J. Data Intell., 2021

Handling of advanced persistent threats and complex incidents in healthcare, transportation and energy ICT infrastructures.
Evol. Syst., 2021

A Dynamic Cyber Security Situational Awareness Framework for Healthcare ICT Infrastructures.
Proceedings of the PCI 2021: 25th Pan-Hellenic Conference on Informatics, Volos, Greece, November 26, 2021

Cyber Supply Chain Threat Analysis and Prediction Using Machine Learning and Ontology.
Proceedings of the Artificial Intelligence Applications and Innovations, 2021

An Automated Tool to Support an Intelligence Learner Management System Using Learning Analytics and Machine Learning.
Proceedings of the Artificial Intelligence Applications and Innovations, 2021

A Framework for Privacy and Security Requirements Analysis and Conflict Resolution for Supporting GDPR Compliance Through Privacy-by-Design.
Proceedings of the Evaluation of Novel Approaches to Software Engineering, 2021

ConfIs: A Tool for Privacy and Security Analysis and Conflict Resolution for Supporting GDPR Compliance through Privacy-by-Design.
Proceedings of the 16th International Conference on Evaluation of Novel Approaches to Software Engineering, 2021

The landscape of cybersecurity vulnerabilities and challenges in healthcare: Security standards and paradigm shift recommendations.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Visual Privacy Management.
Proceedings of the Visual Privacy Management, 2020

A Holistic Approach for Privacy Requirements Analysis: An Industrial Case Study.
Proceedings of the Visual Privacy Management, 2020

The Architecture of VisiOn Privacy Platform.
Proceedings of the Visual Privacy Management, 2020

Modelling the interplay of security, privacy and trust in sociotechnical systems: a computer-aided design approach.
Softw. Syst. Model., 2020

A security requirements modelling language for cloud computing environments.
Softw. Syst. Model., 2020

Enhancing secure business process design with security process patterns.
Softw. Syst. Model., 2020

Protecting Citizens' Personal Data and Privacy: Joint Effort from GDPR EU Cluster Research Projects.
SN Comput. Sci., 2020

Privacy, security, legal and technology acceptance elicited and consolidated requirements for a GDPR compliance platform.
Inf. Comput. Secur., 2020

From product recommendation to cyber-attack prediction: generating attack graphs and predicting future attacks.
Evol. Syst., 2020

DEFeND DSM: A Data Scope Management Service for Model-Based Privacy by Design GDPR Compliance.
Proceedings of the Trust, Privacy and Security in Digital Business, 2020

Cyber Security Resilience in Business Informatics: An Exploratory Paper.
Proceedings of the Perspectives in Business Informatics Research, 2020

2019
Mobile recommender systems: Identifying the major concepts.
J. Inf. Sci., 2019

Practical evaluation of a reference architecture for the management of privacy level agreements.
Inf. Comput. Secur., 2019

Apparatus: A framework for security analysis in internet of things systems.
Ad Hoc Networks, 2019


Lockout-Tagout Ransomware: A Detection Method for Ransomware using Fuzzy Hashing and Clustering.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2019

Towards Detecting and Mitigating Conflicts for Privacy and Security Requirements.
Proceedings of the 13th International Conference on Research Challenges in Information Science, 2019

Privacy, Security, Legal and Technology Acceptance Requirements for a GDPR Compliance Platform.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019

A Conceptual Redesign of a Modelling Language for Cyber Resiliency of Healthcare Systems.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019

Cyber Security Incident Handling, Warning and Response System for the European Critical Information Infrastructures (CyberSANE).
Proceedings of the Engineering Applications of Neural Networks, 2019

2018
A Security Analysis Method for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2018

Assurance of Security and Privacy Requirements for Cloud Deployment Models.
IEEE Trans. Cloud Comput., 2018

Applying the physics of notation to the evaluation of a security and privacy requirements engineering methodology.
Inf. Comput. Secur., 2018

Risk-aware decision support with constrained goal models.
Inf. Comput. Secur., 2018

Cyber-attack path discovery in a dynamic supply chain maritime risk management system.
Comput. Stand. Interfaces, 2018

Towards the Definition of a Security Incident Response Modelling Language.
Proceedings of the Trust, Privacy and Security in Digital Business, 2018

Evaluating a Reference Architecture for Privacy Level Agreement's Management.
Proceedings of the 12th Mediterranean Conference on Information Systems, 2018

2017
A Method for Privacy-preserving Collaborative Filtering Recommendations.
J. Univers. Comput. Sci., 2017

Security-aware elasticity for NoSQL databases in multi-cloud environments.
Int. J. Intell. Inf. Database Syst., 2017

Privacy-preserving collaborative recommendations based on random perturbations.
Expert Syst. Appl., 2017

A conceptual model to support security analysis in the internet of things.
Comput. Sci. Inf. Syst., 2017

Attribute-Based Security Verification of Business Process Models.
Proceedings of the 19th IEEE Conference on Business Informatics, 2017

Selecting Security Mechanisms in Secure Tropos.
Proceedings of the Trust, Privacy and Security in Digital Business, 2017

ASTo: A tool for security analysis of IoT systems.
Proceedings of the 15th IEEE International Conference on Software Engineering Research, 2017

Supporting Privacy by Design Using Privacy Process Patterns.
Proceedings of the ICT Systems Security and Privacy Protection, 2017

Security requirements modelling for virtualized 5G small cell networks.
Proceedings of the 24th International Conference on Telecommunications, 2017

A Semi-Automatic Approach for Eliciting Cloud Security and Privacy Requirements.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

Evaluation of a Security and Privacy Requirements Methodology Using the Physics of Notation.
Proceedings of the Computer Security - ESORICS 2017 International Workshops, 2017

Decision-Making in Security Requirements Engineering with Constrained Goal Models.
Proceedings of the Computer Security - ESORICS 2017 International Workshops, 2017

A Metamodel for GDPR-based Privacy Level Agreements.
Proceedings of the ER Forum 2017 and the ER 2017 Demo Track co-located with the 36th International Conference on Conceptual Modelling (ER 2017), Valencia, Spain,, 2017

Recommender Systems Meeting Security: From Product Recommendation to Cyber-Attack Prediction.
Proceedings of the Engineering Applications of Neural Networks, 2017

Are Small Cells and Network Intelligence at the Edge the Drivers for 5G Market Adoption? The SESAME Case.
Proceedings of the Engineering Applications of Neural Networks, 2017

A Security Requirements Modelling Language to Secure Cloud Computing Environments.
Proceedings of the Enterprise, Business-Process and Information Systems Modeling, 2017

Privacy Level Agreements for Public Administration Information Systems.
Proceedings of the Forum and Doctoral Consortium Papers Presented at the 29th International Conference on Advanced Information Systems Engineering, 2017

Supporting Secure Business Process Design via Security Process Patterns.
Proceedings of the Enterprise, Business-Process and Information Systems Modeling, 2017

Privacy Data Management and Awareness for Public Administrations: A Case Study from the Healthcare Domain.
Proceedings of the Privacy Technologies and Policy - 5th Annual Privacy Forum, 2017

A Holistic Approach for Privacy Protection in E-Government.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
A survey on cloud forensics challenges and solutions.
Secur. Commun. Networks, 2016

An information security risk-driven investment model for analysing human factors.
Inf. Comput. Secur., 2016

Online Analysis of Security Risks in Elastic Cloud Applications.
IEEE Cloud Comput., 2016

Security Challenges of Small Cell as a Service in Virtualized Mobile Edge Computing Environments.
Proceedings of the Information Security Theory and Practice, 2016

Towards a Model-Based Framework for Forensic-Enabled Cloud Information Systems.
Proceedings of the Trust, Privacy and Security in Digital Business, 2016

Modelling Secure Cloud Computing Systems from a Security Requirements Perspective.
Proceedings of the Trust, Privacy and Security in Digital Business, 2016

Privacy Requirements: Findings and Lessons Learned in Developing a Privacy Platform.
Proceedings of the 24th IEEE International Requirements Engineering Conference, 2016

Incorporating privacy patterns into semi-automatic business process derivation.
Proceedings of the Tenth IEEE International Conference on Research Challenges in Information Science, 2016

System architecture and deployment scenarios for SESAME: Small cEllS coodinAtion for Multi-tenancy and Edge services.
Proceedings of the IEEE NetSoft Conference and Workshops, 2016

Security Alignment Analysis of Software Product Lines.
Proceedings of the 4th International Conference on Enterprise Systems, 2016

Apparatus: Reasoning About Security Requirements in the Internet of Things.
Proceedings of the Advanced Information Systems Engineering Workshops, 2016

Security Requirements Engineering for Cloud Computing: The Secure Tropos Approach.
Proceedings of the Domain-Specific Conceptual Modeling, Concepts, Methods and Tools, 2016

2015
Empirical evaluation of a cloud computing information security governance framework.
Inf. Softw. Technol., 2015

Privacy as an Integral Part of the Implementation of Cloud Solutions.
Comput. J., 2015

Cloud Security Audit for Migration and Continuous Monitoring.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Modelling secure cloud systems based on system requirements.
Proceedings of the 2nd IEEE Workshop on Evolving Security and Privacy Requirements Engineering, 2015

Security-Aware Elasticity for NoSQL Databases.
Proceedings of the Model and Data Engineering - 5th International Conference, 2015

Eliciting Security Requirements for Business Processes of Legacy Systems.
Proceedings of the Practice of Enterprise Modeling, 2015

A Framework for Cloud Security Audit.
Proceedings of the Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security, 2015

Conflicts Between Security and Privacy Measures in Software Requirements Engineering.
Proceedings of the Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security, 2015

Human Factors of Social Engineering Attacks (SEAs) in Hybrid Cloud Environment: Threats and Risks.
Proceedings of the Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security, 2015

Managing Social Engineering Attacks- Considering Human Factors and Security Investment.
Proceedings of the Ninth International Symposium on Human Aspects of Information Security & Assurance, 2015

Towards the Derivation of Secure Business Process Designs.
Proceedings of the Advances in Conceptual Modeling, 2015

Visually Mapping Requirements Models to Cloud Services.
Proceedings of the 21st International Conference on Distributed Multimedia Systems, Vancouver, Canada, August 31, 2015

A Meta-model for Assisting a Cloud Forensics Process.
Proceedings of the Risks and Security of Internet and Systems, 2015

Addressing Privacy and Trust Issues in Cultural Heritage Modelling.
Proceedings of the Risks and Security of Internet and Systems, 2015

Towards the Development of a Cloud Forensics Methodology: A Conceptual Model.
Proceedings of the Advanced Information Systems Engineering Workshops, 2015

A Framework for Secure Migration Processes of Legacy Systems to the Cloud.
Proceedings of the Advanced Information Systems Engineering Workshops, 2015

2014
An empirical study on the implementation and evaluation of a goal-driven software development risk management model.
Inf. Softw. Technol., 2014

Modeling Trust Relationships for Developing Trustworthy Information Systems.
Int. J. Inf. Syst. Model. Des., 2014

Secure Tropos framework for software product lines requirements engineering.
Comput. Stand. Interfaces, 2014

Towards the design of secure and privacy-oriented information systems in the cloud: Identifying the major concepts.
Comput. Stand. Interfaces, 2014

A Conceptual Framework to Analyze Human Factors of Information Security Management System (ISMS) in Organizations.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014

2013
Taxonomy of quality metrics for assessing assurance of security correctness.
Softw. Qual. J., 2013

Evaluating cloud deployment scenarios based on security and privacy requirements.
Requir. Eng., 2013

A framework to support selection of cloud providers based on security and privacy requirements.
J. Syst. Softw., 2013

Selecting a Cloud Service Provider in the age of cybercrime.
Comput. Secur., 2013

Trustworthy Selection of Cloud Providers Based on Security and Privacy Requirements: Justifying Trust Assumptions.
Proceedings of the Trust, Privacy, and Security in Digital Business, 2013

Migrating into the Cloud: Identifying the Major Security and Privacy Concerns.
Proceedings of the Collaborative, Trusted and Privacy-Aware e/m-Services, 2013

Using Security and Domain Ontologies for Security Requirements Analysis.
Proceedings of the IEEE 37th Annual Computer Software and Applications Conference, 2013

2012
Aligning Security and Privacy to Support the Development of Secure Information Systems.
J. Univers. Comput. Sci., 2012

Syntactic and Semantic Extensions to Secure Tropos to Support Security Risk Management.
J. Univers. Comput. Sci., 2012

Appraisal and reporting of security assurance at operational systems level.
J. Syst. Softw., 2012

Preface.
Inf. Syst., 2012

Modelling Security Using Trust Based Concepts.
Int. J. Secur. Softw. Eng., 2012

Model Based Process to Support Security and Privacy Requirements Engineering.
Int. J. Secur. Softw. Eng., 2012

Dealing with trust and control: A meta-model for trustworthy information systems development.
Proceedings of the Sixth International Conference on Research Challenges in Information Science, 2012

Extracting security requirements from relevant laws and regulations.
Proceedings of the Sixth International Conference on Research Challenges in Information Science, 2012

A Meta-model for Legal Compliance and Trustworthiness of Information Systems.
Proceedings of the Advanced Information Systems Engineering Workshops, 2012

A Model Transformation from Misuse Cases to Secure Tropos.
Proceedings of the CAiSE'12 Forum at the 24<sup>th</sup> International Conference on Advanced Information Systems Engineering (CAiSE), 2012

2011
A framework to support alignment of secure software engineering with legal regulations.
Softw. Syst. Model., 2011

Secure Software Systems Engineering: The Secure Tropos Approach (Invited Paper).
J. Softw., 2011

Secure by Design: Developing Secure Software Systems from the Ground Up.
Int. J. Secur. Softw. Eng., 2011

Security Assurance Evaluation and IT Systems' Context of Use Security Criticality.
Int. J. Handheld Comput. Res., 2011

A Modelling Framework to Support Internal Control.
Proceedings of the Fifth International Conference on Secure Software Integration and Reliability Improvement, 2011

A CASE Tool to Support Automated Modelling and Analysis of Security Requirements, Based on Secure Tropos.
Proceedings of the IS Olympics: Information Systems in a Diverse World, 2011

A new approach to evaluating security assurance.
Proceedings of the 7th International Conference on Information Assurance and Security, 2011

Secure Tropos: Extending /* and Tropos to Model Security Throughout the Development Process.
Proceedings of the Social Modeling for Requirements Engineering., 2011

2010
An architectural description language for secure Multi-Agent Systems.
Web Intell. Agent Syst., 2010

Guest editorial: security requirements engineering: past, present and future.
Requir. Eng., 2010

Practitioner's challenges in designing trust into online systems.
J. Theor. Appl. Electron. Commer. Res., 2010

Using a Situational Method Engineering Approach to Identify Reusable Method Fragments from the Secure TROPOS Methodology.
J. Object Technol., 2010

From goal-driven security requirements engineering to secure design.
Int. J. Intell. Syst., 2010

An Agent-Based System to Support Assurance of Security Requirements.
Proceedings of the Fourth International Conference on Secure Software Integration and Reliability Improvement, 2010

Information Systems Security Criticality and Assurance Evaluation.
Proceedings of the Advances in Computer Science and Information Technology, 2010

Towards a Framework to Elicit and Manage Security and Privacy Requirements from Laws and Regulations.
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2010

2009
Enhancing Secure Tropos to Effectively Deal with Security Requirements in the Development of Multiagent Systems.
Proceedings of the Safety and Security in Multiagent Systems, 2009

FAML: A Generic Metamodel for MAS Development.
IEEE Trans. Software Eng., 2009

A security-aware metamodel for multi-agent systems (MAS).
Inf. Softw. Technol., 2009

A Risk Based Approach for Security Assurance Evaluation of IT Systems.
Proceedings of the 7th Annual Conference on Communication Networks and Services Research, 2009

Secure Information Systems Engineering: Experiences and Lessons Learned from Two Health Care Projects.
Proceedings of the Advanced Information Systems Engineering, 21st International Conference, 2009

2008
Management versus security specialists: an empirical study on security related perceptions.
Inf. Manag. Comput. Secur., 2008

Selecting Security Patterns that Fulfill Security Requirements.
Proceedings of the 16th IEEE International Requirements Engineering Conference, 2008

Deployment of a Security Assurance Monitoring Framework for Telecommunication Service Infrastructures on a VoIP Service.
Proceedings of the NTMS 2008, 2008

Curriculum for Modeling Security: Experiences and Lessons Learned.
Proceedings of the Workshop on Modeling Security ( MODSEC08 ) held as part of the 2008 International Conference on Model Driven Engineering Languages and Systems ( MODELS ) Toulouse, 2008

A Language for Modelling Trust in Information Systems.
Proceedings of the Information Systems Development, 2008

Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development.
Proceedings of the Advanced Information Systems Engineering, 20th International Conference, 2008

2007
Security Attack Testing (SAT) - testing the security of information systems at design time.
Inf. Syst., 2007

Secure Tropos: a Security-Oriented Extension of the Tropos Methodology.
Int. J. Softw. Eng. Knowl. Eng., 2007

Information Systems Security: Cases of Network Administrator Threats.
Int. J. Inf. Secur. Priv., 2007

Secure information systems engineering: a manifesto.
Int. J. Electron. Secur. Digit. Forensics, 2007

Information Systems Development: A Trust Ontology.
Proceedings of the On the Move to Meaningful Internet Systems 2007: OTM 2007 Workshops, 2007

Trust Ontology for Information Systems Development.
Proceedings of the Information Systems Development, 2007

An Agent-Based System to Support Geo-Information Analysis.
Proceedings of the 2007 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2007

Modelling MAS-Specific Security Features.
Proceedings of the 12th International Workshop on Exploring Modeling Methods for Systems Analysis and Design, 2007

2006
Modeling Secure Systems Using an Agent-oriented Approach and Security Patterns.
Int. J. Softw. Eng. Knowl. Eng., 2006

Reasoning About Willingness in Networks of Agents.
Proceedings of the Software Engineering for Multi-Agent Systems V, 2006

Modeling Delegation through an i*-based Approach.
Proceedings of the 2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2006

Towards a Comprehensive Framework for Secure Systems Development.
Proceedings of the Advanced Information Systems Engineering, 18th International Conference, 2006

2005
When security meets software engineering: a case of modelling secure information systems.
Inf. Syst., 2005

Safety and Security in Multiagent Systems: Report on the 2nd SASEMAS workshop (SASEMAS'05).
Comput. Secur., 2005

Patterns for Modelling Agent Systems with Tropos.
Proceedings of the Software Engineering for Multi-Agent Systems IV, 2005

Delegation Mechanisms for Agent Architectural Design.
Proceedings of the 2005 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2005

Security Patterns Meet Agent Oriented Software Engineering: A Complementary Solution for Developing Secure Information Systems.
Proceedings of the Conceptual Modeling, 2005

A secure architectural description language for agent systems.
Proceedings of the 4th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2005), 2005

2004
Using Security Attack Scenarios to Analyse Security During Information Systems Design.
Proceedings of the ICEIS 2004, 2004

2003
A Novel Agent-Based System to Support the Single Assessment Process of Older People.
Health Informatics J., 2003

Analysis and Design of the eSAP: An Integrated Health and Social Care Information System.
Health Informatics J., 2003

Multi-agent Systems and Security Requirements Analysis.
Proceedings of the Software Engineering for Multi-Agent Systems II, 2003

An Ontology for Modelling Security: The Tropos Approach.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2003

Analysing Security Requirements of Information Systems Using Tropos.
Proceedings of the ICEIS 2003, 2003

A Set of Patterns for Secure Agent Systems.
Proceedings of the 8th European Conference on Pattern Languages of Programms (EuroPLoP '2003), 2003

Integrating Security and Systems Engineering: Towards the Modelling of Secure Information Systems.
Proceedings of the Advanced Information Systems Engineering, 15th International Conference, 2003

Modelling secure multiagent systems.
Proceedings of the Second International Joint Conference on Autonomous Agents & Multiagent Systems, 2003

Modeling Deployment and Mobility Issues in Multiagent Systems Using AUML.
Proceedings of the Agent-Oriented Software Engineering IV, 4th International Workshop, 2003

2002
Using Tropos Methodology to Model an Integrated Health Assessment System.
Proceedings of the AOIS '02, 2002


  Loading...