If you made any changes in Pure these will be visible here soon.

Research Output 2012 2019

Filter
Article
2019

Enhancing secure business process design with security process patterns

Argyropoulos, N., Mouratidis, H. & Fish, A., 13 Jul 2019, In : Software and Systems Modeling. p. 1-23

Research output: Contribution to journalArticle

Process Design
Business Process
Process design
Industry
Business Process Modeling

Modelling the Interplay of Security, Privacy and Trust in Sociotechnical Systems: A Computer-Aided Design Approach

Salnitri, M., Angelopoulos, K., Pavlidis, M., Diamantopoulou, V., Mouratidis, H. & Giorgini, P., 20 Jul 2019, In : Software and Systems Modeling. p. 1-25

Research output: Contribution to journalArticle

Computer aided design
Industry
Data privacy
Requirements engineering
Specifications

Practical evaluation of a reference architecture for the management of privacy level agreements

Diamantopoulou, V. & Mouratidis, H., 19 Aug 2019, In : Information and Computer Security. 26, 5, p. 711-730 20 p.

Research output: Contribution to journalArticle

Open Access
File
Data privacy
Controllers
Public administration
Health care
Transparency
2018

A novel risk assessment methodology for SCADA maritime logistics environments

Kalogeraki, E. M., Papastergiou, S., Mouratidis, H. & Polemi, N., 28 Aug 2018, In : Applied Sciences (Switzerland). 8, 9, 1477.

Research output: Contribution to journalArticle

Open Access
File
risk assessment
logistics
Risk assessment
Supply chains
Logistics

Apparatus: A framework for security analysis in internet of things systems

Mavropoulos, O., Mouratidis, H., Fish, A. & Panaousis, E., 23 Aug 2018, In : Ad Hoc Networks.

Research output: Contribution to journalArticle

Open Access
File
Application programs
Refining
Visualization
Hardware
Internet of things

Applying the physics of notation to the evaluation of a security and privacy requirements engineering methodology

Diamantopoulou, V. & Mouratidis, H., 8 Oct 2018, In : Information and Computer Security. 26, 4, p. 382-400 19 p.

Research output: Contribution to journalArticle

Open Access
File
Requirements engineering
Physics
Information systems
Communication
Industry

A Security Analysis Method for Industrial Internet of Things

Mouratidis, H. & Diamantopoulou, V., 3 May 2018, In : IEEE Transactions on Industrial Informatics.

Research output: Contribution to journalArticle

Open Access
File
Personal computers
Large scale systems
Internet of things
Sensors
Industry
Open Access
File
Recommender systems
Risk management
Supply chains
Information systems

MITIGATE: a dynamic supply chain cyber risk assessment methodology

Schauer, S., Polemi, N. & Mouratidis, H., 1 Sep 2018, In : Journal of Transportation Security. 12, 1-2, p. 1–35

Research output: Contribution to journalArticle

Open Access
File
Risk assessment
risk assessment
Supply chains
supply
methodology

Mobile recommender systems: Identifying the major concepts

Pimenidis, E., Polatidis, N. & Mouratidis, H., 3 Aug 2018, In : Journal of Information Science.

Research output: Contribution to journalArticle

Open Access
File
Recommender systems
Mobile devices
Internet

Risk-aware decision support with Constrained Goal Models

Argyropoulos, N., Angelopoulos, K., Mouratidis, H. & Fish, A., 8 Oct 2018, In : Information and Computer Security. 26, 4, p. 472-490

Research output: Contribution to journalArticle

Open Access
File
Risk assessment
Systems analysis
Requirements engineering
Information systems
Decision making
2017

A Conceptual Model to Support Security Analysis in the Internet of Things

Mavropoulos, O., Mouratidis, H., Fish, A., Panaousis, E. & Kalloniatis, C., 1 Jul 2017, In : Computer Science And Information Systems. 14, 2, p. 557-578 22 p.

Research output: Contribution to journalArticle

Open Access
File
Ubiquitous computing
Internet of things
Industry

A Method for Privacy-preserving Collaborative Filtering Recommendations

Georgiadis, C. K., Polatidis, N., Mouratidis, H. & Pimenidis, E., 28 Feb 2017, In : Journal of Universal Computer Science. 23, 2, p. 146-166 21 p.

Research output: Contribution to journalArticle

Open Access
File
Collaborative filtering
Recommender systems
Information use
Electronic commerce
Access control
Open Access
File
Supply chain management
Risk management
Risk assessment
Supply chains
Information systems

Security-aware elasticity for NoSQL databases in multi-cloud environments

Naskos, A., Gounaris, A., Mouratidis, H. & Katsaros, P., 14 Sep 2017, In : International Journal of Intelligent Information and Database Systems. 10, 3-4, p. 168-190 23 p.

Research output: Contribution to journalArticle

Open Access
File
Elasticity
Model checking
2016

An information security risk-driven investment model for analysing human factors

Alavi, R., Islam, S. & Mouratidis, H., 13 Jun 2016, In : Information Management and Computer Security. 24, 2, p. 205-227 23 p.

Research output: Contribution to journalArticle

Open Access
File
Information security
Human factors
Incidents
Justification
Investment process

A survey on cloud forensics challenges and solutions

Simou, S., Kalloniatis, C., Gritzalis, S. & Mouratidis, H., 8 Nov 2016, In : Security and Communication Networks. 9, 18, p. 6285-6314 30 p.

Research output: Contribution to journalArticle

Cloud computing

Design Activity in the Process of Migrating Security Features to Cloud

Marquez, L., Rosado, D. G., Mouratidis, H. & Fernandez Medina, E., 1 Jun 2016, In : IEEE Latin America Transactions. 14, 6, p. 2846-2852 7 p., 7555263.

Research output: Contribution to journalArticle

Legacy systems
Cloud computing
Information systems

Privacy-preserving collaborative recommendations based on random perturbations

Polatidis, N., Georgiadis, C. K., Pimenidis, E. & Mouratidis, H., 18 Nov 2016, In : Expert Systems with Applications. 71, p. 18-25 8 p.

Research output: Contribution to journalArticle

Open Access
File
Collaborative filtering
Recommender systems
Servers
2015

Assurance of Security and Privacy Requirements for Cloud Deployment Models

Islam, S., Ouedraogo, M., Kalloniatis, C., Mouratidis, H. & Gritzalis, S., 23 Dec 2015, In : IEEE Transactions on Cloud Computing. 6, 2, p. 387-400 14 p.

Research output: Contribution to journalArticle

Open Access
File
Requirements engineering
Industry

Empirical evaluation of a cloud computing information security governance

Rebolloa, O., Melladob, D., Fernandez-Medinac, E. & Mouratidis, H., 1 Feb 2015, In : Information and Software Technology. 58, p. 44-57 14 p.

Research output: Contribution to journalArticle

Open Access
File
Security of data
Cloud computing
Industry

Privacy as an Integral Part of the Implementation of Cloud Solutions

Kavakli, E., Kalloniatis, C., Mouratidis, H. & Gritzalis, S., 28 Sep 2015, In : Computer Journal. 58, 10, p. 2213-2224 12 p.

Research output: Contribution to journalArticle

Open Access
File
Information systems
Systems engineering
Cloud computing
2014

An empirical study on the Implementation and evaluation of a goal-driven software development risk management model

Islam, S., Mouratidis, H. & Weipplc, E. R., 1 Feb 2014, In : Information and Software Technology. 56, 2, p. 117-133

Research output: Contribution to journalArticle

File
Risk management
Software engineering
Industry
Requirements engineering
Managers

Modeling trust relationships for developing trustworthy Information systems

Pavlidis, M., Islam, S., Mouratidis, H. & Kearney, P., 1 Jan 2014, In : International Journal of Information System Modeling and Design. 5, 1, p. 25-48 24 p.

Research output: Contribution to journalArticle

Information systems
Health care
Modeling languages

Secure Tropos framework for software product lines requirements engineering

Mellado, D., Mouratidis, H. & Fernandez-Medina, E., 1 Jan 2014, In : Computer Standards & Interfaces. 36, 4

Research output: Contribution to journalArticle

Open Access
File
Requirements engineering

Towards the design of secure and privacy-oriented Information Systems in the Cloud: Identifying the major concepts

Kalloniatis, C., Mouratidis, H., Vassilis, M., Islam, S., Gritzalis, S. & Kavakli, E., 1 Jan 2014, In : Computer Standards & Interfaces. 36, 4, p. 759-775 17 p.

Research output: Contribution to journalArticle

Open Access
File
Cloud computing
Information systems
Requirements engineering
Innovation
Costs
2013

Evaluating cloud deployment scenarios based on security and privacy requirements

Kalloniatis, C., Mouratidis, H. & Islam, S., 4 Apr 2013, In : Requirements Engineering. 18, 4, p. 299-319 21 p.

Research output: Contribution to journalArticle

Open Access
File
Cloud computing
Requirements engineering
Cost reduction
Application programming interfaces (API)
2012

Modelling Security Using Trust Based Concepts

Pavlidis, M., Mouratidis, H. & Islam, S., 15 May 2012, In : International Journal of Secure Software Engineering. 3, 2, p. 36-53 18 p.

Research output: Contribution to journalArticle