Author: Haralambos Mouratidis
Publication Overview
Publication period start: 2010
Number of co-authors: 6
Co-Authors
Number of publications with favourite co-authors
Productive Colleagues
Most productive colleagues in number of publications
Publications
Weiss,
Michael,
Mouratidis,
Haralambos
(2008):
Selecting Security Patterns that Fulfill Security Requirements.
In:
16th IEEE International Requirements Engineering Conference RE 2008
8-12 September,
2008,
Barcelona, Catalunya, Spain.
pp. 169-172.
https://dx.doi.org/10.1109/RE.2008.32
Mouratidis,
Haralambos,
Giorgini,
Paolo,
Manson,
Gordon A.
(2004):
Using Security Attack Scenarios to Analyse Security During Information Systems Design.
In:
ICEIS 2004
,
2004,
.
pp. 10-17.
Mouratidis,
Haralambos,
Manson,
Gordon A.,
Gani,
Abdullah,
Giorgini,
Paolo
(2003):
Analysing Security Requirements of Information Systems Using Tropos.
In:
ICEIS 2003
,
2003,
.
pp. 623-626.
Islam,
Shareeful,
Mouratidis,
Haralambos,
Wagner,
Stefan
(2010):
Towards a Framework to Elicit and Manage Security and Privacy Requirements from Laws and R.
In:
Wieringa,
Roel,
Persson,
Anne
(eds.)
Requirements Engineering Foundation for Software Quality, 16th International Working Conference, REFSQ 2010, Essen, Germany, June 30 - July 2, 2010. Proceedings
,
2010,
.
pp. 255-261.
https://dx.doi.org/10.1007/978-3-642-14192-8_23