Michalis Pavlidis
Citée par
Citée par
Cyber-attack path discovery in a dynamic supply chain maritime risk management system
N Polatidis, M Pavlidis, H Mouratidis
Computer Standards & Interfaces 56, 74-82, 2018
SecTro: A CASE Tool for Modelling Security in Requirements Engineering using Secure Tropos
M Pavlidis, S Islam
Proceedings of the Conference on Advanced Information Systems Engineering …, 2011
Privacy requirements: findings and lessons learned in developing a privacy platform
M Gharib, M Salnitri, E Paja, P Giorgini, H Mouratidis, M Pavlidis, JF Ruiz, ...
2016 IEEE 24th International Requirements Engineering Conference (RE), 256-265, 2016
Trustworthy selection of cloud providers based on security and privacy requirements: Justifying trust assumptions
M Pavlidis, H Mouratidis, C Kalloniatis, S Islam, S Gritzalis
International Conference on Trust, Privacy and Security in Digital Business …, 2013
A CASE tool to support automated modelling and analysis of security requirements
M Pavlidis, S Islam, H Mouratidis
Lecture Notes in Business Information Processing 107, 95-109, 2012
A CASE Tool to Support Automated Modelling and Analysis of Security Requirements, Based on Secure Tropos
M Pavlidis, S Islam, H Mouratidis
IS Olympics: Information Systems in a Diverse World, 95-109, 2012
From product recommendation to cyber-attack prediction: generating attack graphs and predicting future attacks
N Polatidis, E Pimenidis, M Pavlidis, S Papastergiou, H Mouratidis
Evolving Systems 11 (3), 479-490, 2020
Modeling trust relationships for developing trustworthy information systems
M Pavlidis, S Islam, H Mouratidis, P Kearney
International Journal of Information System Modeling and Design (IJISMD) 5 …, 2014
Dealing with trust and control: A meta-model for trustworthy information systems development
M Pavlidis, H Mouratidis, S Islam, P Kearney
Research Challenges in Information Science (RCIS), 2012 Sixth International …, 2012
Modelling Security Using Trust Based Concepts
M Pavlidis, H Mouratidis, S Islam
International Journal of Secure Software Engineering (IJSSE) 3 (2), 36-53, 2012
DEFeND architecture: a privacy by design platform for GDPR compliance
L Piras, MG Al-Obeidallah, A Praitano, A Tsohou, H Mouratidis, ...
International Conference on Trust and Privacy in Digital Business, 78-93, 2019
Recommender systems meeting security: From product recommendation to cyber-attack prediction
N Polatidis, E Pimenidis, M Pavlidis, H Mouratidis
International Conference on Engineering Applications of Neural Networks, 508-519, 2017
A Metamodel for GDPR-based Privacy Level Agreements.
V Diamantopoulou, K Angelopoulos, M Pavlidis, H Mouratidis
ER Forum/Demos 1979, 285-291, 2017
Designing for Trust.
M Pavlidis
CAiSE (Doctoral Consortium), 3-14, 2011
Privacy, security, legal and technology acceptance requirements for a GDPR compliance platform.
A Tsohou, M Magkos, H Mouratidis, G Chrysoloras, L Piras, M Pavlidis, ...
Springer, 2020
A holistic approach for privacy protection in E-government
K Angelopoulos, V Diamantopoulou, H Mouratidis, M Pavlidis, M Salnitri, ...
Proceedings of the 12th International Conference on Availability …, 2017
An adaptive supply chain cyber risk management methodology
S Schauer, M Stamer, C Bosse, M Pavlidis, H Mouratidis, S König, ...
Digitalization in Supply Chain Management and Logistics: Smart and Digital …, 2017
Selecting security mechanisms in secure tropos
M Pavlidis, H Mouratidis, E Panaousis, N Argyropoulos
International Conference on Trust and Privacy in Digital Business, 99-114, 2017
A Meta-model for Legal Compliance and Trustworthiness of Information Systems
F Zarrabi, M Pavlidis, H Mouratidis, S Islam, D Preston
Advanced Information Systems Engineering Workshops, 46-60, 2012
Evaluation of a security and privacy requirements methodology using the physics of notation
V Diamantopoulou, M Pavlidis, H Mouratidis
Computer Security, 210-225, 2017
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20