Secure tropos: a security-oriented extension of the tropos methodology H Mouratidis, P Giorgini International Journal of Software Engineering and Knowledge Engineering 17 …, 2007 | 429 | 2007 |
FAML: a generic metamodel for MAS development G Beydoun, G Low, B Henderson-Sellers, H Mouratidis, JJ Gomez-Sanz, ... IEEE Transactions on Software Engineering 35 (6), 841-863, 2009 | 197 | 2009 |
Integrating security and systems engineering: Towards the modelling of secure information systems H Mouratidis, P Giorgini, G Manson International Conference on Advanced Information Systems Engineering, 63-78, 2003 | 165 | 2003 |
When security meets software engineering: a case of modelling secure information systems H Mouratidis, P Giorgini, G Manson Information Systems 30 (8), 609-629, 2005 | 161 | 2005 |
A framework to support selection of cloud providers based on security and privacy requirements H Mouratidis, S Islam, C Kalloniatis, S Gritzalis Journal of Systems and Software 86 (9), 2276-2293, 2013 | 144 | 2013 |
Analyzing security requirements as relationships among strategic actors EY Lin Liu, J Mylopoulos | 130 | 2002 |
Integrating Security and Software Engineering: Advances and Future Visions: Advances and Future Visions H Mouratidis, P Giorgini Igi Global, 2006 | 120* | 2006 |
Website design guidelines: high power distance and high context culture T Ahmed, H Mouratidis, D Preston International Journal of Cyber Society and Education 2 (1), 47-60, 2009 | 109* | 2009 |
Adapting secure tropos for security risk management in the early phases of information systems development R Matulevičius, N Mayer, H Mouratidis, E Dubois, P Heymans, N Genon International Conference on Advanced Information Systems Engineering, 541-555, 2008 | 96 | 2008 |
Modelling secure multiagent systems H Mouratidis, P Giorgini, G Manson Proceedings of the second international joint conference on Autonomous …, 2003 | 93 | 2003 |
Empirical evaluation of a cloud computing information security governance framework O Rebollo, D Mellado, E Fernández-Medina, H Mouratidis Information and Software Technology 58, 44-57, 2015 | 89 | 2015 |
Modelling security and trust with secure tropos P Giorgini, H Mouratidis, N Zannone Integrating Security and Software Engineering: Advances and Future Visions …, 2007 | 81 | 2007 |
A natural extension of tropos methodology for modelling security H Mouratidis Proceedings Agent Oriented Methodologies Workshop, 2002 | 81 | 2002 |
An ontology for modelling security: The tropos approach H Mouratidis, P Giorgini, G Manson International Conference on Knowledge-Based and Intelligent Information and …, 2003 | 79 | 2003 |
From goal‐driven security requirements engineering to secure design H Mouratidis, J Jurjens International Journal of Intelligent Systems 25 (8), 813-840, 2010 | 77 | 2010 |
Towards the design of secure and privacy-oriented information systems in the cloud: Identifying the major concepts C Kalloniatis, H Mouratidis, M Vassilis, S Islam, S Gritzalis, E Kavakli Computer Standards & Interfaces 36 (4), 759-775, 2014 | 75 | 2014 |
Evaluating cloud deployment scenarios based on security and privacy requirements C Kalloniatis, H Mouratidis, S Islam Requirements Engineering 18 (4), 299-319, 2013 | 69 | 2013 |
Security Attack Testing (SAT)—testing the security of information systems at design time H Mouratidis, P Giorgini Information systems 32 (8), 1166-1183, 2007 | 67 | 2007 |
A security oriented approach in the development of multiagent systems: applied to the management of the health and social care needs of older people in England. H Mouratidis University of Sheffield, 2004 | 64 | 2004 |
A security-aware metamodel for multi-agent systems (MAS) G Beydoun, G Low, H Mouratidis, B Henderson-Sellers Information and software technology 51 (5), 832-845, 2009 | 62 | 2009 |