Author of the publication

Syntactic and Semantic Extensions to Secure Tropos to Support Security Risk Management.

, , , , and . J. UCS, 18 (6): 816-844 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Mouratidis, Haralambos
add a person with the name Mouratidis, Haralambos
 

Other publications of authors with the same name

Syntactic and Semantic Extensions to Secure Tropos to Support Security Risk Management., , , , and . J. UCS, 18 (6): 816-844 (2012)Information Systems Security: Cases of Network Administrator Threats., , , and . IJISP, 1 (3): 13-25 (2007)Model Based Process to Support Security and Privacy Requirements Engineering., , , , and . IJSSE, 3 (3): 1-22 (2012)Privacy as an Integral Part of the Implementation of Cloud Solutions., , , and . Comput. J., 58 (10): 2213-2224 (2015)Cloud Security Audit for Migration and Continuous Monitoring., , and . TrustCom/BigDataSE/ISPA (1), page 1081-1087. IEEE, (2015)Visually Mapping Requirements Models to Cloud Services., , , and . DMS, page 108-114. Knowledge Systems Institute, (2015)Conflicts Between Security and Privacy Measures in Software Requirements Engineering., , , and . ICGS3, volume 534 of Communications in Computer and Information Science, page 323-334. Springer, (2015)Apparatus: Reasoning About Security Requirements in the Internet of Things., , , , and . CAiSE Workshops, volume 249 of Lecture Notes in Business Information Processing, page 219-230. Springer, (2016)Online Analysis of Security Risks in Elastic Cloud Applications., , , and . IEEE Cloud Computing, 3 (5): 26-33 (2016)Secure Software Systems Engineering: The Secure Tropos Approach (Invited Paper).. JSW, 6 (3): 331-339 (2011)