Michalis Pavlidis
Title
Cited by
Cited by
Year
Cyber-attack path discovery in a dynamic supply chain maritime risk management system
N Polatidis, M Pavlidis, H Mouratidis
Computer Standards & Interfaces 56, 74-82, 2018
352018
Trustworthy selection of cloud providers based on security and privacy requirements: Justifying trust assumptions
M Pavlidis, H Mouratidis, C Kalloniatis, S Islam, S Gritzalis
International Conference on Trust, Privacy and Security in Digital Business …, 2013
232013
A CASE tool to support automated modelling and analysis of security requirements
M Pavlidis, S Islam, H Mouratidis
Lecture Notes in Business Information Processing 107, 95-109, 2012
23*2012
A CASE Tool to Support Automated Modelling and Analysis of Security Requirements, Based on Secure Tropos
M Pavlidis, S Islam, H Mouratidis
IS Olympics: Information Systems in a Diverse World, 95-109, 2012
232012
SecTro: A CASE Tool for Modelling Security in Requirements Engineering using Secure Tropos
M Pavlidis, S Islam
Proceedings of the Conference on Advanced Information Systems Engineering …, 2011
222011
Privacy requirements: findings and lessons learned in developing a privacy platform
M Gharib, M Salnitri, E Paja, P Giorgini, H Mouratidis, M Pavlidis, JF Ruiz, ...
2016 IEEE 24th International Requirements Engineering Conference (RE), 256-265, 2016
162016
Modeling trust relationships for developing trustworthy information systems
M Pavlidis, S Islam, H Mouratidis, P Kearney
International Journal of Information System Modeling and Design (IJISMD) 5 …, 2014
152014
Dealing with trust and control: A meta-model for trustworthy information systems development
M Pavlidis, H Mouratidis, S Islam, P Kearney
Research Challenges in Information Science (RCIS), 2012 Sixth International …, 2012
142012
Modelling Security Using Trust Based Concepts
M Pavlidis, H Mouratidis, S Islam
International Journal of Secure Software Engineering (IJSSE) 3 (2), 36-53, 2012
142012
From product recommendation to cyber-attack prediction: Generating attack graphs and predicting future attacks
N Polatidis, E Pimenidis, M Pavlidis, S Papastergiou, H Mouratidis
Evolving Systems, 1-12, 2018
132018
Defend architecture: A privacy by design platform for gdpr compliance
L Piras, MG Al-Obeidallah, A Praitano, A Tsohou, H Mouratidis, ...
International Conference on Trust and Privacy in Digital Business, 78-93, 2019
112019
Recommender systems meeting security: From product recommendation to cyber-attack prediction
N Polatidis, E Pimenidis, M Pavlidis, H Mouratidis
International Conference on Engineering Applications of Neural Networks, 508-519, 2017
102017
A Metamodel for GDPR-based Privacy Level Agreements.
V Diamantopoulou, K Angelopoulos, M Pavlidis, H Mouratidis
ER Forum/Demos, 285-291, 2017
102017
Designing for Trust.
M Pavlidis
CAiSE (Doctoral Consortium), 3-14, 2011
92011
Selecting security mechanisms in secure tropos
M Pavlidis, H Mouratidis, E Panaousis, N Argyropoulos
International Conference on Trust and Privacy in Digital Business, 99-114, 2017
82017
A holistic approach for privacy protection in E-government
K Angelopoulos, V Diamantopoulou, H Mouratidis, M Pavlidis, M Salnitri, ...
Proceedings of the 12th International Conference on Availability …, 2017
72017
An adaptive supply chain cyber risk management methodology
S Schauer, M Stamer, C Bosse, M Pavlidis, H Mouratidis, S König, ...
Digitalization in Supply Chain Management and Logistics: Smart and Digital …, 2017
72017
A Meta-model for Legal Compliance and Trustworthiness of Information Systems
F Zarrabi, M Pavlidis, H Mouratidis, S Islam, D Preston
Advanced Information Systems Engineering Workshops, 46-60, 2012
72012
Privacy Level Agreements for Public Administration Information Systems.
V Diamantopoulou, M Pavlidis, H Mouratidis
CAiSE-Forum-DC, 97-104, 2017
52017
Privacy, security, legal and technology acceptance requirements for a GDPR compliance platform
A Tsohou, M Magkos, H Mouratidis, G Chrysoloras, L Piras, M Pavlidis, ...
Computer Security, 204-223, 2019
42019
The system can't perform the operation now. Try again later.
Articles 1–20