Publications

Below you can find selected publications from members of our research cluster. For a complete list of publications visit each researcher’s profile in Our Team section.

  • Mouratidis, H., & Giorgini, P. (2007). Secure tropos: a security-oriented extension of the tropos methodology. International Journal of Software Engineering and Knowledge Engineering, 17(02), 285-309. – [Link]
  • Mouratidis, H., Giorgini, P., & Manson, G. (2003, June). Integrating security and systems engineering: Towards the modelling of secure information systems. In Advanced Information Systems Engineering (pp. 63-78). Springer Berlin Heidelberg. – [Link]
  • Mouratidis, H., Islam, S., Kalloniatis, C., & Gritzalis, S. (2013). A framework to support selection of cloud providers based on security and privacy requirements. Journal of Systems and Software, 86(9), 2276-2293. – [Link]
  • Mouratidis, H., Argyropoulos, N., & Shei, S. (2016). Security Requirements Engineering for Cloud Computing: The Secure Tropos Approach. In Domain-Specific Conceptual Modeling (pp. 357-380). Springer International Publishing. – [Link]
  • Pavlidis, M., Mouratidis, H., Islam, S., & Kearney, P. (2012, May). Dealing with trust and control: a meta-model for trustworthy information systems development. In Research Challenges in Information Science (RCIS), 2012 Sixth International Conference on (pp. 1-9). IEEE – [Link]
  • Pavlidis, M., Islam, S., Mouratidis, H., & Kearney, P. (2014). Modeling trust relationships for developing trustworthy Information systems. International Journal of Information System Modeling and Design (IJISMD), 5(1), 25-48. – [Link]
  • Pavlidis, M., Mouratidis, H., & Islam, S. (2012). Modelling security using trust based concepts. International Journal of Secure Software Engineering (IJSSE), 3(2), 36-53. – [Link]
  • Panaousis, E., Laszka, A., Pohl, J., Noack, A., & Alpcan, T. (2015, August). Game-Theoretic Model of Incentivizing Privacy-Aware Users to Consent to Location Tracking. In Trustcom/BigDataSE/ISPA, 2015 IEEE (Vol. 1, pp. 1006-1013). IEEE. – [Link]
  • Rontidis, G., Panaousis, E., Laszka, A., Dagiuklas, T., Malacaria, P., & Alpcan, T. (2015, June). A game-theoretic approach for minimizing security risks in the Internet-of-Things. In Communication Workshop (ICCW), 2015 IEEE International Conference on (pp. 2639-2644). IEEE. – [Link]
  • Fielder, A., Panaousis, E., Malacaria, P., Hankin, C., & Smeraldi, F. (2016). Decision support approaches for cyber security investment. Decision Support Systems, 86, pp.13-23. – [Link]