If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution with ISSN or ISBN

Search results

  • 2020

    A conceptual redesign of a modelling language for cyber resiliency of healthcare systems

    Athinaiou, M., Mouratidis, H., Fotis, T. & Pavlidis, M., 22 Feb 2020, Computer Security - ESORICS 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Revised Selected Papers: In conjunction with ESORICS 2019. Katsikas, S., Katsikas, S., Cuppens, F., Cuppens, N., Lambrinoudakis, C., Gritzalis, S., Kalloniatis, C., Mylopoulos, J., Antón, A., Pallas, F., Pohle, J., Sasse, A., Meng, W., Furnell, S. & Garcia-Alfaro, J. (eds.). Cham: Springer, p. 140-158 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11980 LNCS).

    Research output: Chapter in Book/Conference proceeding with ISSN or ISBNConference contribution with ISSN or ISBNpeer-review

    Open Access
    File
  • DEFeND DSM: A Data Scope Management Service for Model-Based Privacy by Design GDPR Compliance

    Piras, L., Al-Obeidallah, M. G., Pavlidis, M., Mouratidis, H., Tsohou, A., Magkos, E., Praitano, A., Iodice, A. & Crespo, B. G. N., 14 Sep 2020, Trust, Privacy and Security in Digital Business - 17th International Conference, TrustBus 2020, Proceedings. Gritzalis, S., Weippl, E. R., Kotsis, G., Khalil, I. & Tjoa, A. M. (eds.). p. 186-201 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12395 LNCS).

    Research output: Chapter in Book/Conference proceeding with ISSN or ISBNConference contribution with ISSN or ISBNpeer-review

    Open Access
    File
  • Lockout-Tagout Ransomware: A Detection Method for Ransomware using Fuzzy Hashing and Clustering

    Naik, N., Jenkins, P., Gillett, J., Mouratidis, H., Naik, K. & Song, J., 20 Feb 2020, 2019 IEEE Symposium Series on Computational Intelligence, SSCI 2019. Institute of Electrical and Electronics Engineers Inc., p. 641-648 8 p. 9003148

    Research output: Chapter in Book/Conference proceeding with ISSN or ISBNConference contribution with ISSN or ISBNpeer-review

    Open Access
    File
  • Privacy, Security, Legal and Technology Acceptance Requirements for a GDPR Compliance Platform

    Tsohou, A., Magkos, E., Mouratidis, H., Chrysoloras, G., Piras, L., Pavlidis, M., Debussche, J., Rotoloni, M. & Gallego-Nicasio Crespo, B., 22 Feb 2020, Computer Security - ESORICS 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Revised Selected Papers: In conjunction with ESORICS 2019. Katsikas, S., Katsikas, S., Cuppens, F., Cuppens, N., Lambrinoudakis, C., Gritzalis, S., Kalloniatis, C., Mylopoulos, J., Antón, A., Pallas, F., Pohle, J., Sasse, A., Meng, W., Furnell, S. & Garcia-Alfaro, J. (eds.). Cham: Springer, p. 204-223 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11980 LNCS).

    Research output: Chapter in Book/Conference proceeding with ISSN or ISBNConference contribution with ISSN or ISBNpeer-review

    Open Access
    File
  • 2019

    Cyber security incident handling, warning and response system for the european critical information infrastructures (cyberSANE)

    Papastergiou, S., Mouratidis, H. & Kalogeraki, E. M., 15 May 2019, Engineering Applications of Neural Networks - 20th International Conference, EANN 2019, Proceedings. Maglogiannis, I., Jayne, C., Macintyre, J. & Iliadis, L. (eds.). Cham: Springer-Verlag, Vol. 1000. p. 476-487 12 p. (Communications in Computer and Information Science).

    Research output: Chapter in Book/Conference proceeding with ISSN or ISBNConference contribution with ISSN or ISBNpeer-review

    Open Access
    File
  • DEFeND Architecture: A Privacy by Design Platform for GDPR Compliance

    Piras, L., Al-Obeidallah, M. G., Praitano, A., Tsohou, A., Mouratidis, H., Gallego-Nicasio Crespo, B., Bernard, J. B., Fiorani, M., Magkos, E., Sanz, A. C., Pavlidis, M., D’Addario, R. & Zorzino, G. G., 2 Aug 2019, Trust, Privacy and Security in Digital Business - 16th International Conference, TrustBus 2019, Proceedings. Gritzalis, S., Weippl, E. R., Katsikas, S. K., Anderst-Kotsis, G., Khalil, I. & Tjoa, A. M. (eds.). Springer, p. 78-93 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11711 LNCS).

    Research output: Chapter in Book/Conference proceeding with ISSN or ISBNConference contribution with ISSN or ISBNpeer-review

    Open Access
    File
  • Towards Detecting and Mitigating Conflicts for Privacy and Security Requirements

    Alkubaisy, D., Cox, K. & Mouratidis, H., 31 May 2019, Proceedings: RCIS 2019 - IEEE 13th International Conference on Research Challenges in Information Science: Towards a Design Science for Information Systems. Kolp, M., Vanderdonckt, J., Snoeck, M. & Wautelet, Y. (eds.). IEEE Computer Society, 8876999. (Proceedings - International Conference on Research Challenges in Information Science; vol. 2019-May).

    Research output: Chapter in Book/Conference proceeding with ISSN or ISBNConference contribution with ISSN or ISBNpeer-review

    Open Access
    File
  • 2018

    Towards the definition of a security incident response modelling language

    Athinaiou, M., Mouratidis, H., Fotis, T., Pavlidis, M. & Panaousis, E., 27 Jul 2018, 15th International Conference, TrustBus 2018, Proceedings: Trust, Privacy and Security in Digital Business . Furnell, S., Mouratidis, H. & Pernul, G. (eds.). Springer-Verlag, p. 198-212 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11033 LNCS).

    Research output: Chapter in Book/Conference proceeding with ISSN or ISBNConference contribution with ISSN or ISBNpeer-review

    Open Access
    File
  • 2017

    A Holistic Approach for Privacy Protection in E-Government

    Angelopoulos, K., Diamantopoulou, V., Pavlidis, M., Mouratidis, H., Salnitri, M., Ruiz, J. F. & Giorgini, P., 30 Aug 2017, ARES '17: Proceedings of the 12th International Conference on Availability, Reliability and Security. New York: ACM, p. 0-0 1 p.

    Research output: Chapter in Book/Conference proceeding with ISSN or ISBNConference contribution with ISSN or ISBNpeer-review

  • An Adaptive Supply Chain Cyber Risk Management Methodology

    Schauer, S., Stamer, M., Bosse, C., Pavlidis, M., Mouratidis, H., Koenig, S. & Papastergiou, S., 12 Oct 2017, Hamburg International Conference of Logistics. Hamburg, Germany, p. 0-0 1 p.

    Research output: Chapter in Book/Conference proceeding with ISSN or ISBNConference contribution with ISSN or ISBNpeer-review

    Open Access
    File
  • Are small cells and network intelligence at the edge the drivers for 5g market adoption? The sesame case

    Neokosmidis, I., Rokkas, T., Chochliouros, I. P., Goratti, L., Mouratidis, H., Nasr, K. M., Vahid, S., Moessner, K., Albanese, A., Crosta, P. S. & Paglierani, P., 1 Jan 2017, Engineering Applications of Neural Networks - 18th International Conference, EANN 2017, Proceedings. Springer-Verlag, p. 693-703 11 p. (Communications in Computer and Information Science; vol. 744).

    Research output: Chapter in Book/Conference proceeding with ISSN or ISBNConference contribution with ISSN or ISBNpeer-review

  • A security requirements modelling language to secure cloud computing environments

    Shei, S., Mouratidis, H. & Delaney, A., 17 May 2017, Enterprise, Business-Process and Information Systems Modeling - 18th International Conference, BPMDS 2017, 22nd International Conference, EMMSAD 2017 Held at CAiSE 2017, Proceedings. Springer-Verlag, p. 337-345 9 p. (Lecture Notes in Business Information Processing; vol. 287).

    Research output: Chapter in Book/Conference proceeding with ISSN or ISBNConference contribution with ISSN or ISBNpeer-review

    Open Access
    File
  • A Semi-Automatic Approach for Eliciting Cloud Security and Privacy Requirements

    Argyropoulos, N., Shei, S., Kalloniatis, C., Mouratidis, H., Delaney, A., Fish, A. & Gritzalis, S., 4 Jan 2017, 50th Hawaii International Conference on System Sciences (HICSS). Hawaii, USA, p. 4827-4836 10 p.

    Research output: Chapter in Book/Conference proceeding with ISSN or ISBNConference contribution with ISSN or ISBNpeer-review

    Open Access
    File
  • ASTo: A tool for security analysis of IoT systems

    Mavropoulos, O., Mouratidis, H., Fish, A. & Panaousis, E., 30 Jun 2017, Proceedings - 2017 15th IEEE/ACIS International Conference on Software Engineering Research, Management and Applications, SERA 2017. Institute of Electrical and Electronics Engineers Inc., p. 395-400 6 p. 7965757

    Research output: Chapter in Book/Conference proceeding with ISSN or ISBNConference contribution with ISSN or ISBNpeer-review

  • Attribute-based security verification of business process models

    Argyropoulos, N., Mouratidis, H. & Fish, A., 14 Aug 2017, Proceedings - 2017 IEEE 19th Conference on Business Informatics, CBI 2017. Institute of Electrical and Electronics Engineers Inc., Vol. 1. p. 43-52 10 p. 8010705. (Conference on Business Informatics).

    Research output: Chapter in Book/Conference proceeding with ISSN or ISBNConference contribution with ISSN or ISBNpeer-review

    Open Access
    File
  • Decision-making in security requirements engineering with constrained goal models

    Argyropoulos, N., Angelopoulos, K., Mouratidis, H. & Fish, A., 22 Dec 2017, Computer Security - ESORICS 2017 International Workshops, CyberICPS 2017 and SECPRE 2017, Revised Selected Papers. Springer-Verlag, p. 262-280 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10683 LNCS).

    Research output: Chapter in Book/Conference proceeding with ISSN or ISBNConference contribution with ISSN or ISBNpeer-review

  • Evaluation of a security and privacy requirements methodology using the physics of notation

    Diamantopoulou, V., Pavlidis, M. & Mouratidis, H., 22 Dec 2017, Computer Security - ESORICS 2017 International Workshops, CyberICPS 2017 and SECPRE 2017, Revised Selected Papers. Mylopoulos, J., Lambrinoudakis, C., Kalloniatis, C., Cuppens, F., Cuppens, N., Anton, A., Katsikas, S. K. & Gritzalis, S. (eds.). Oslo, Norway: Springer-Verlag, p. 210-225 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10683 LNCS).

    Research output: Chapter in Book/Conference proceeding with ISSN or ISBNConference contribution with ISSN or ISBNpeer-review

    Open Access
    File
  • Privacy Data Management and Awareness for Public Administrations: a Case Study from the Healthcare Domain

    Diamantopoulou, V., Angelopoulos, K., Flake, J., Praitano, A., Ruiz, J. F., Jurjens, J., Pavlidis, M., Bonutto, D., Castillo Sanz, A., Mouratidis, H., Garcia Robles, J. & Tozzi, A. E., 7 Jun 2017, APF2017 ENISA Annual Privacy Forum. Vienna, Austria: Springer LNCS, p. 192-209 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Conference proceeding with ISSN or ISBNConference contribution with ISSN or ISBNpeer-review

    Open Access
    File
  • Privacy Level Agreements for Public Administration Information Systems

    Diamantopoulou, V., Pavlidis, M. & Mouratidis, H., 12 Jun 2017, 29th International Conference on Advanced Information Systems Engineering (CAiSE) 2017 Forum. Essen, Germany: CEUR LNCS, p. 97-104 8 p. (CEUR Workshop Proceedings).

    Research output: Chapter in Book/Conference proceeding with ISSN or ISBNConference contribution with ISSN or ISBNpeer-review

    Open Access
    File
  • Recommender systems meeting security: from product recommendation to cyber-attack prediction

    Polatidis, N., Pimenidis, E., Pavlidis, M. & Mouratidis, H., 2 Aug 2017, International Conference on Engineering Applications of Neural Networks. Germany: Springer, p. 508-519 12 p. (Communications in Computer and Information Science).

    Research output: Chapter in Book/Conference proceeding with ISSN or ISBNConference contribution with ISSN or ISBNpeer-review

    Open Access
    File
  • Security Alignment Analysis of Software Product Lines

    Sprovieri, D., Argyropoulos, N., Souveyet, C., Mazo, R., Mouratidis, H. & Fish, A., 16 Mar 2017, Proceedings - 4th International Conference on Enterprise Systems: Advances in Enterprise Systems, ES 2016. Institute of Electrical and Electronics Engineers Inc., p. 97-103 7 p. 7880478

    Research output: Chapter in Book/Conference proceeding with ISSN or ISBNConference contribution with ISSN or ISBNpeer-review

  • Security requirements modelling for virtualized 5G small cell networks

    Vassilakis, V. G., Mouratidis, H., Panaousis, E., Moscholios, I. D. & Logothetis, M. D., 31 Jul 2017, Proceedings of the 24th International Conference on Telecommunications: Intelligence in Every Form, ICT 2017. Institute of Electrical and Electronics Engineers Inc., 7998269

    Research output: Chapter in Book/Conference proceeding with ISSN or ISBNConference contribution with ISSN or ISBNpeer-review

  • Selecting Security Mechanisms in Secure Tropos

    Pavlidis, M., Panaousis, E. & Mouratidis, H., 27 Jul 2017, TrustBus 2017: Trust, Privacy and Security in Digital Business. Cham: Springer, Vol. 10442. p. 99-114 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Conference proceeding with ISSN or ISBNConference contribution with ISSN or ISBNpeer-review

    Open Access
    File
  • Supporting Privacy by Design using Privacy Process Patterns

    Diamantopoulou, V., Kalloniatis, C., Gritzalis, S. & Mouratidis, H., 4 May 2017, IFIP SEC 2017 32nd IFIP International Information Security Conference. Rome, Italy: Springer LNCS, p. 491-505 15 p. (IFIP Advances in Information and Communication Technology).

    Research output: Chapter in Book/Conference proceeding with ISSN or ISBNConference contribution with ISSN or ISBNpeer-review

    Open Access
    File
  • Supporting secure business process design via security process patterns

    Argyropoulos, N., Mouratidis, H. & Fish, A., 1 May 2017, Enterprise, Business-Process and Information Systems Modeling - 18th International Conference, BPMDS 2017, 22nd International Conference, EMMSAD 2017 Held at CAiSE 2017, Proceedings. Springer-Verlag, p. 9-13 5 p. (Lecture Notes in Business Information Processing; vol. 287).

    Research output: Chapter in Book/Conference proceeding with ISSN or ISBNConference contribution with ISSN or ISBNpeer-review

  • 2016

    Apparatus: Reasoning About Security Requirements in the Internet of Things

    Mavropoulos, O., Mouratidis, H., Fish, A., Panaousis, E. & Kalloniatis, C., 7 Jun 2016, Advanced Information Systems Engineering Workshops,CAiSE 2016 International Workshops, Proceedings.. Slovenia: Springer International Publishing, Vol. 249. p. 219-230 12 p. (Lecture Notes in Business Information Processing).

    Research output: Chapter in Book/Conference proceeding with ISSN or ISBNConference contribution with ISSN or ISBNpeer-review

    Open Access
    File
  • Incorporating privacy patterns into semi-automatic business process derivation

    Argyropoulos, N., Kalloniatis, C., Mouratidis, H. & Fish, A., 25 Aug 2016, 2016 IEEE Tenth International Conference on Research Challenges in Information Science (RCIS). Piscataway, NJ: IEEE, p. 1-12 12 p.

    Research output: Chapter in Book/Conference proceeding with ISSN or ISBNConference contribution with ISSN or ISBNpeer-review

    Open Access
    File
  • Modelling secure cloud computing systems from a security requirements perspective

    Shei, S., Kalloniatis, C., Mouratidis, H. & Delaney, A., 6 Aug 2016, Trust, Privacy and Security in Digital Business - 13th International Conference, TrustBus 2016, Proceedings. Springer-Verlag, p. 48-62 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9830 LNCS).

    Research output: Chapter in Book/Conference proceeding with ISSN or ISBNConference contribution with ISSN or ISBNpeer-review

    Open Access
    File
  • Security Challenges of Small Cell as a Service in Virtualized Mobile Edge Computing Environments

    Vassilakis, V., Panaousis, E. & Mouratidis, H., 17 Sep 2016, 10th WISTP International Conference on Information Security Theory and Practice.. Heraklion, Crete: Springer International Publishing, Vol. 9895. p. 70-84 15 p. (Lecture notes in computer science).

    Research output: Chapter in Book/Conference proceeding with ISSN or ISBNConference contribution with ISSN or ISBNpeer-review

    Open Access
    File
  • 2015

    Addressing Privacy and Trust Issues in Cultural Heritage Modelling

    Pavlidis, M., Mouratidis, H., Gonzalez-Perez, C. & Kalloniatis, C., 22 Jul 2015, 10th International Conference, CRiSIS 2015. Lesbos Island, Greece: Springer International Publishing, Vol. 9572. p. 3-16 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Conference proceeding with ISSN or ISBNConference contribution with ISSN or ISBNpeer-review

    Open Access
    File
  • Conflicts between Security and Privacy Measures in Software Requirements Engineering

    Ganji, D., Malekshahi Gheytassi, S. & Mouratidis, H., 4 Sep 2015, International Conference on Global Security, Safety, and Sustainability: ICGS3 2015: Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security. Cham: Springer, (Communications in Computer and Information Science; vol. 534).

    Research output: Chapter in Book/Conference proceeding with ISSN or ISBNConference contribution with ISSN or ISBNpeer-review

  • Eliciting security requirements for business processes of legacy systems

    Argyropoulos, N., Alcañiz, L. M., Mouratidis, H., Fish, A., Rosado, D. G., de Guzmán, I. G-R. & Fernandez-Medina, E., 26 Nov 2015, The Practice of Enterprise Modeling. Switzerland: Springer International Publishing, Vol. 235. p. 91-107 17 p. (Lecture Notes in Business Information Processing).

    Research output: Chapter in Book/Conference proceeding with ISSN or ISBNConference contribution with ISSN or ISBNpeer-review

  • Towards the derivation of secure business process designs

    Argyropoulos, N., Mouratidis, H. & Fish, A., 15 Dec 2015, Advances in Conceptual Modeling. Switzerland: Springer International Publishing, Vol. 9382. p. 248-258 11 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Conference proceeding with ISSN or ISBNConference contribution with ISSN or ISBNpeer-review

  • 2013

    The role of trust in the development and adoption of cultural internet-based systems

    Pavlidis, M., Kavakli, E., Bantimaroudis, P., Mouratidis, H., Kalloniatis, C. & Gritzalis, S., 1 Jan 2013, Proceedings of the European, Mediterranean and Middle Eastern Conference on Information Systems, EMCIS 2013. Ghoneim, A., AlShawi, S. & Ali, M. (eds.). (Proceedings of the European, Mediterranean and Middle Eastern Conference on Information Systems, EMCIS 2013).

    Research output: Chapter in Book/Conference proceeding with ISSN or ISBNConference contribution with ISSN or ISBNpeer-review

  • Trustworthy Selection of Cloud Providers Based on Security and Privacy Requirements: Justifying Trust Assumptions

    Pavlidis, M., Mouratidis, H. & Islam, S., 28 Aug 2013, 10th International Conference on Trust, Privacy and Security in Digital Business (TrustBus). Prague, Czech Republic, Vol. 8058. p. 185-198 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Conference proceeding with ISSN or ISBNConference contribution with ISSN or ISBNpeer-review

  • 2012

    A CASE tool to support automated modelling and analysis of security requirements, based on secure tropos

    Pavlidis, M., Islam, S. & Mouratidis, H., 1 Jan 2012, IS Olympics: Information Systems in a Diverse World - CAiSE Forum 2011, Selected Extended Papers. Springer-Verlag, p. 95-109 15 p. (Lecture Notes in Business Information Processing; vol. 107 LNBIP).

    Research output: Chapter in Book/Conference proceeding with ISSN or ISBNConference contribution with ISSN or ISBNpeer-review

  • A meta-model for legal compliance and trustworthiness of information systems

    Zarrabi, F., Pavlidis, M., Mouratidis, H., Islam, S. & Preston, D., 1 Jan 2012, Advanced Information Systems EngineeringWorkshops - CAiSE 2012 International Workshops, Proceedings. Springer-Verlag, p. 46-60 15 p. (Lecture Notes in Business Information Processing; vol. 112 LNBIP).

    Research output: Chapter in Book/Conference proceeding with ISSN or ISBNConference contribution with ISSN or ISBNpeer-review

  • Dealing with Trust and Control: A Meta-Model for Trustworthy Information Systems Development

    Pavlidis, M., Mouratidis, H., Islam, S. & Kearney, P., 16 May 2012, Sixth International Conference on Research Challenges in Information Science (RCIS), 2012. Valencia, Spain: IEEE, p. 1-9 9 p.

    Research output: Chapter in Book/Conference proceeding with ISSN or ISBNConference contribution with ISSN or ISBNpeer-review