Author: Haralambos Mouratidis

Publications

Publication period start: 2010
Number of co-authors: 6

Co-authors

Number of publications with favourite co-authors
Stefan Wagner
1
Paolo Giorgini
2
Gordon A. Manson
2

Productive Colleagues

Most productive colleagues in number of publications
Gordon A. Manson
3
Stefan Wagner
4
Paolo Giorgini
8

Publications

Weiss, Michael, Mouratidis, Haralambos (2008): Selecting Security Patterns that Fulfill Security Requirements. In: 16th IEEE International Requirements Engineering Conference RE 2008 8-12 September, 2008, Barcelona, Catalunya, Spain. pp. 169-172. https://dx.doi.org/10.1109/RE.2008.32

Mouratidis, Haralambos, Giorgini, Paolo, Manson, Gordon A. (2004): Using Security Attack Scenarios to Analyse Security During Information Systems Design. In: ICEIS 2004 , 2004, . pp. 10-17.

Mouratidis, Haralambos, Manson, Gordon A., Gani, Abdullah, Giorgini, Paolo (2003): Analysing Security Requirements of Information Systems Using Tropos. In: ICEIS 2003 , 2003, . pp. 623-626.

Islam, Shareeful, Mouratidis, Haralambos, Wagner, Stefan (2010): Towards a Framework to Elicit and Manage Security and Privacy Requirements from Laws and R. In: Wieringa, Roel, Persson, Anne (eds.) Requirements Engineering Foundation for Software Quality, 16th International Working Conference, REFSQ 2010, Essen, Germany, June 30 - July 2, 2010. Proceedings , 2010, . pp. 255-261. https://dx.doi.org/10.1007/978-3-642-14192-8_23