Author: Haralambos Mouratidis

Publication Overview

Publication period start: 2010
Number of co-authors: 6

Co-Authors

Number of publications with favourite co-authors

Productive Colleagues

Most productive colleagues in number of publications

Publications

Weiss, Michael, Mouratidis, Haralambos (2008): Selecting Security Patterns that Fulfill Security Requirements. In: 16th IEEE International Requirements Engineering Conference RE 2008 8-12 September, 2008, Barcelona, Catalunya, Spain. pp. 169-172. https://dx.doi.org/10.1109/RE.2008.32
Mouratidis, Haralambos, Giorgini, Paolo, Manson, Gordon A. (2004): Using Security Attack Scenarios to Analyse Security During Information Systems Design. In: ICEIS 2004 , 2004, . pp. 10-17.
Mouratidis, Haralambos, Manson, Gordon A., Gani, Abdullah, Giorgini, Paolo (2003): Analysing Security Requirements of Information Systems Using Tropos. In: ICEIS 2003 , 2003, . pp. 623-626.
Islam, Shareeful, Mouratidis, Haralambos, Wagner, Stefan (2010): Towards a Framework to Elicit and Manage Security and Privacy Requirements from Laws and R. In: Wieringa, Roel, Persson, Anne (eds.) Requirements Engineering Foundation for Software Quality, 16th International Working Conference, REFSQ 2010, Essen, Germany, June 30 - July 2, 2010. Proceedings , 2010, . pp. 255-261. https://dx.doi.org/10.1007/978-3-642-14192-8_23
Privacy Settings
By using this site, you accept our Cookie Policy and Terms of Use.
Customize
Accept all

Feel Stuck? Want Freedom?

Join 326,035+ designers who get one powerful email each week. Learn to design a life you love.

Next email in
1
day
8
hrs
39
mins
5
secs

Free forever. No spam. Unsubscribe anytime.