Cyber-attack path discovery in a dynamic supply chain maritime risk management system N Polatidis, M Pavlidis, H Mouratidis Computer Standards & Interfaces 56, 74-82, 2018 | 115 | 2018 |
From product recommendation to cyber-attack prediction: Generating attack graphs and predicting future attacks N Polatidis, E Pimenidis, M Pavlidis, S Papastergiou, H Mouratidis Evolving Systems 11, 479-490, 2020 | 72 | 2020 |
DEFeND architecture: a privacy by design platform for GDPR compliance L Piras, MG Al-Obeidallah, A Praitano, A Tsohou, H Mouratidis, ... Trust, Privacy and Security in Digital Business: 16th International …, 2019 | 53 | 2019 |
Privacy requirements: findings and lessons learned in developing a privacy platform M Gharib, M Salnitri, E Paja, P Giorgini, H Mouratidis, M Pavlidis, JF Ruiz, ... 2016 IEEE 24th International Requirements Engineering Conference (RE), 256-265, 2016 | 34 | 2016 |
SecTro: A CASE Tool for Modelling Security in Requirements Engineering using Secure Tropos M Pavlidis, S Islam Proceedings of the Conference on Advanced Information Systems Engineering …, 2011 | 34 | 2011 |
Recommender systems meeting security: From product recommendation to cyber-attack prediction N Polatidis, E Pimenidis, M Pavlidis, H Mouratidis Engineering Applications of Neural Networks: 18th International Conference …, 2017 | 33 | 2017 |
Trustworthy selection of cloud providers based on security and privacy requirements: Justifying trust assumptions M Pavlidis, H Mouratidis, C Kalloniatis, S Islam, S Gritzalis Trust, Privacy, and Security in Digital Business: 10th International …, 2013 | 28 | 2013 |
A CASE Tool to Support Automated Modelling and Analysis of Security Requirements, Based on Secure Tropos M Pavlidis, S Islam, H Mouratidis IS Olympics: Information Systems in a Diverse World, 95-109, 2012 | 28 | 2012 |
HamDroid: permission-based harmful android anti-malware detection using neural networks S Seraj, S Khodambashi, M Pavlidis, N Polatidis Neural Computing and Applications 34 (18), 15165-15174, 2022 | 25 | 2022 |
Privacy, security, legal and technology acceptance elicited and consolidated requirements for a GDPR compliance platform A Tsohou, E Magkos, H Mouratidis, G Chrysoloras, L Piras, M Pavlidis, ... Information & Computer Security 28 (4), 531-553, 2020 | 24 | 2020 |
A metamodel for GDPR-based privacy level agreements V Diamantopoulou, K Angelopoulos, M Pavlidis, H Mouratidis CEUR Workshop Proceedings 1979, 299-305, 2017 | 22 | 2017 |
Dealing with trust and control: A meta-model for trustworthy information systems development M Pavlidis, H Mouratidis, S Islam, P Kearney Research Challenges in Information Science (RCIS), 2012 Sixth International …, 2012 | 22 | 2012 |
Modeling trust relationships for developing trustworthy information systems M Pavlidis, S Islam, H Mouratidis, P Kearney International Journal of Information System Modeling and Design (IJISMD) 5 …, 2014 | 21 | 2014 |
Privacy, security, legal and technology acceptance requirements for a GDPR compliance platform A Tsohou, M Magkos, H Mouratidis, G Chrysoloras, L Piras, M Pavlidis, ... Computer Security: ESORICS 2019 International Workshops, CyberICPS, SECPRE …, 2020 | 19 | 2020 |
Modelling Security Using Trust Based Concepts M Pavlidis, H Mouratidis, S Islam International Journal of Secure Software Engineering (IJSSE) 3 (2), 36-53, 2012 | 18 | 2012 |
Designing for Trust. M Pavlidis CAiSE (doctoral consortium), 3-14, 2011 | 16 | 2011 |
An adaptive supply chain cyber risk management methodology S Schauer, M Stamer, C Bosse, M Pavlidis, H Mouratidis, S König, ... Hamburg International Conference of Logistics, 0-0, 2017 | 15 | 2017 |
A holistic approach for privacy protection in E-government K Angelopoulos, V Diamantopoulou, H Mouratidis, M Pavlidis, M Salnitri, ... Proceedings of the 12th International Conference on Availability …, 2017 | 15 | 2017 |
Selecting security mechanisms in secure tropos M Pavlidis, H Mouratidis, E Panaousis, N Argyropoulos Trust, Privacy and Security in Digital Business: 14th International …, 2017 | 15 | 2017 |
DEFeND DSM: A data scope management service for model-based privacy by design GDPR compliance L Piras, MG Al-Obeidallah, M Pavlidis, H Mouratidis, A Tsohou, E Magkos, ... Trust, Privacy and Security in Digital Business: 17th International …, 2020 | 14 | 2020 |