Secure tropos: a security-oriented extension of the tropos methodology H Mouratidis, P Giorgini International Journal of Software Engineering and Knowledge Engineering 17 …, 2007 | 500 | 2007 |
FAML: a generic metamodel for MAS development G Beydoun, G Low, B Henderson-Sellers, H Mouratidis, JJ Gomez-Sanz, ... IEEE Transactions on Software Engineering 35 (6), 841-863, 2009 | 223 | 2009 |
When security meets software engineering: a case of modelling secure information systems H Mouratidis, P Giorgini, G Manson Information Systems 30 (8), 609-629, 2005 | 193 | 2005 |
Integrating security and systems engineering: Towards the modelling of secure information systems H Mouratidis, P Giorgini, G Manson Advanced Information Systems Engineering: 15th International Conference …, 2003 | 175 | 2003 |
A framework to support selection of cloud providers based on security and privacy requirements H Mouratidis, S Islam, C Kalloniatis, S Gritzalis Journal of Systems and Software 86 (9), 2276-2293, 2013 | 174 | 2013 |
Website design guidelines: high power distance and high context culture T Ahmed, H Mouratidis, D Preston International Journal of Cyber Society and Education 2 (1), 47-60, 2009 | 140* | 2009 |
Empirical evaluation of a cloud computing information security governance framework O Rebollo, D Mellado, E Fernández-Medina, H Mouratidis Information and Software Technology 58, 44-57, 2015 | 122 | 2015 |
Integrating Security and Software Engineering: Advances and Future Visions: Advances and Future Visions H Mouratidis, P Giorgini Igi Global, 2006 | 121 | 2006 |
Cyber-attack path discovery in a dynamic supply chain maritime risk management system N Polatidis, M Pavlidis, H Mouratidis Computer Standards & Interfaces 56, 74-82, 2018 | 118 | 2018 |
Modelling secure systems using an agent oriented approach and security patterns H Mouratidis, M Weiss, P Giorgini International Journal of Software Engineering and Knowledge Engineering 16 …, 2006 | 112 | 2006 |
Adapting secure tropos for security risk management in the early phases of information systems development R Matulevičius, N Mayer, H Mouratidis, E Dubois, P Heymans, N Genon Advanced Information Systems Engineering: 20th International Conference …, 2008 | 105 | 2008 |
Modelling secure multiagent systems H Mouratidis, P Giorgini, G Manson Proceedings of the second international joint conference on Autonomous …, 2003 | 103 | 2003 |
Towards the design of secure and privacy-oriented information systems in the cloud: Identifying the major concepts C Kalloniatis, H Mouratidis, M Vassilis, S Islam, S Gritzalis, E Kavakli Computer Standards & Interfaces 36 (4), 759-775, 2014 | 94 | 2014 |
A natural extension of tropos methodology for modelling security H Mouratidis Proceedings Agent Oriented Methodologies Workshop, 2002 | 88 | 2002 |
Privacy-preserving collaborative recommendations based on random perturbations N Polatidis, CK Georgiadis, E Pimenidis, H Mouratidis Expert Systems with Applications 71, 18-25, 2017 | 87 | 2017 |
From goal‐driven security requirements engineering to secure design H Mouratidis, J Jurjens International Journal of Intelligent Systems 25 (8), 813-840, 2010 | 87 | 2010 |
Evaluating cloud deployment scenarios based on security and privacy requirements C Kalloniatis, H Mouratidis, S Islam Requirements Engineering 18, 299-319, 2013 | 86 | 2013 |
Modelling security and trust with secure tropos P Giorgini, H Mouratidis, N Zannone Integrating Security and Software Engineering: Advances and Future Visions …, 2007 | 86 | 2007 |
An ontology for modelling security: The tropos approach H Mouratidis, P Giorgini, G Manson Knowledge-Based Intelligent Information and Engineering Systems: 7th …, 2003 | 85 | 2003 |
An empirical study on the implementation and evaluation of a goal-driven software development risk management model S Islam, H Mouratidis, ER Weippl Information and Software Technology 56 (2), 117-133, 2014 | 82 | 2014 |