Author: Haralambos Mouratidis

Publication Overview

Publication period start: 2010
Number of co-authors: 6

Co-Authors

Number of publications with favourite co-authors

Productive Colleagues

Most productive colleagues in number of publications

Publications

Weiss, Michael, Mouratidis, Haralambos (2008): Selecting Security Patterns that Fulfill Security Requirements. In: 16th IEEE International Requirements Engineering Conference RE 2008 8-12 September, 2008, Barcelona, Catalunya, Spain. pp. 169-172. https://dx.doi.org/10.1109/RE.2008.32
Mouratidis, Haralambos, Giorgini, Paolo, Manson, Gordon A. (2004): Using Security Attack Scenarios to Analyse Security During Information Systems Design. In: ICEIS 2004 , 2004, . pp. 10-17.
Mouratidis, Haralambos, Manson, Gordon A., Gani, Abdullah, Giorgini, Paolo (2003): Analysing Security Requirements of Information Systems Using Tropos. In: ICEIS 2003 , 2003, . pp. 623-626.
Islam, Shareeful, Mouratidis, Haralambos, Wagner, Stefan (2010): Towards a Framework to Elicit and Manage Security and Privacy Requirements from Laws and R. In: Wieringa, Roel, Persson, Anne (eds.) Requirements Engineering Foundation for Software Quality, 16th International Working Conference, REFSQ 2010, Essen, Germany, June 30 - July 2, 2010. Proceedings , 2010, . pp. 255-261. https://dx.doi.org/10.1007/978-3-642-14192-8_23
Privacy Settings
By using this site, you accept our Cookie Policy and Terms of Use.
Customize
Accept all

Feel Stuck? Want Freedom?

Get one powerful email each week, like 326,021 others.

Learn to design a life you love.

Next email in
6
days
1
hrs
39
mins
58
secs