Haralambos Mouratidis

Publication Statistics

Publication period start
Publication period end
Number of co-authors


Number of publications with favourite co-authors

Productive Colleagues

Most productive colleagues in number of publications


Weiss, Michael, Mouratidis, Haralambos (2008): Selecting Security Patterns that Fulfill Security Requirements. In: 16th IEEE International Requirements Engineering Conference RE 2008 8-12 September, 2008, Barcelona, Catalunya, Spain. pp. 169-172. http://dx.doi.org/10.1109/RE.2008.32

Mouratidis, Haralambos, Giorgini, Paolo, Manson, Gordon A. (2004): Using Security Attack Scenarios to Analyse Security During Information Systems Design. In: ICEIS 2004 , 2004, . pp. 10-17.

Mouratidis, Haralambos, Manson, Gordon A., Gani, Abdullah, Giorgini, Paolo (2003): Analysing Security Requirements of Information Systems Using Tropos. In: ICEIS 2003 , 2003, . pp. 623-626.

Islam, Shareeful, Mouratidis, Haralambos, Wagner, Stefan (2010): Towards a Framework to Elicit and Manage Security and Privacy Requirements from Laws and R. In: Wieringa, Roel, Persson, Anne (eds.) Requirements Engineering Foundation for Software Quality, 16th International Working Conference, REFSQ 2010, Essen, Germany, June 30 - July 2, 2010. Proceedings , 2010, . pp. 255-261. http://dx.doi.org/10.1007/978-3-642-14192-8_23