Michalis Pavlidis
TitleCited byYear
Cyber-attack path discovery in a dynamic supply chain maritime risk management system
N Polatidis, M Pavlidis, H Mouratidis
Computer Standards & Interfaces 56, 74-82, 2018
242018
SecTro: A CASE Tool for Modelling Security in Requirements Engineering using Secure Tropos
M Pavlidis, S Islam
Proceedings of the Conference on Advanced Information Systems Engineering …, 2011
192011
Trustworthy selection of cloud providers based on security and privacy requirements: Justifying trust assumptions
M Pavlidis, H Mouratidis, C Kalloniatis, S Islam, S Gritzalis
International Conference on Trust, Privacy and Security in Digital Business …, 2013
182013
A CASE tool to support automated modelling and analysis of security requirements
M Pavlidis, S Islam, H Mouratidis
Lecture Notes in Business Information Processing 107, 95-109, 2012
16*2012
A CASE Tool to Support Automated Modelling and Analysis of Security Requirements, Based on Secure Tropos
M Pavlidis, S Islam, H Mouratidis
IS Olympics: Information Systems in a Diverse World, 95-109, 2012
162012
Modeling trust relationships for developing trustworthy information systems
M Pavlidis, S Islam, H Mouratidis, P Kearney
International Journal of Information System Modeling and Design (IJISMD) 5 …, 2014
132014
Dealing with trust and control: A meta-model for trustworthy information systems development
M Pavlidis, H Mouratidis, S Islam, P Kearney
Research Challenges in Information Science (RCIS), 2012 Sixth International …, 2012
132012
Modelling Security Using Trust Based Concepts
M Pavlidis, H Mouratidis, S Islam
International Journal of Secure Software Engineering (IJSSE) 3 (2), 36-53, 2012
132012
Privacy requirements: findings and lessons learned in developing a privacy platform
M Gharib, M Salnitri, E Paja, P Giorgini, H Mouratidis, M Pavlidis, JF Ruiz, ...
2016 IEEE 24th International Requirements Engineering Conference (RE), 256-265, 2016
112016
Recommender systems meeting security: From product recommendation to cyber-attack prediction
N Polatidis, E Pimenidis, M Pavlidis, H Mouratidis
International Conference on Engineering Applications of Neural Networks, 508-519, 2017
102017
From product recommendation to cyber-attack prediction: Generating attack graphs and predicting future attacks
N Polatidis, E Pimenidis, M Pavlidis, S Papastergiou, H Mouratidis
Evolving Systems, 1-12, 2018
72018
An adaptive supply chain cyber risk management methodology
S Schauer, M Stamer, C Bosse, M Pavlidis, H Mouratidis, S König, ...
72017
A Meta-model for Legal Compliance and Trustworthiness of Information Systems
F Zarrabi, M Pavlidis, H Mouratidis, S Islam, D Preston
Advanced Information Systems Engineering Workshops, 46-60, 2012
72012
Designing for Trust.
M Pavlidis
CAiSE (Doctoral Consortium), 3-14, 2011
72011
Selecting security mechanisms in secure tropos
M Pavlidis, H Mouratidis, E Panaousis, N Argyropoulos
International Conference on Trust and Privacy in Digital Business, 99-114, 2017
62017
Privacy level agreements for public administration information systems
V Diamantopoulou, M Pavlidis, H Mouratidis
CEUR LNCS, 2017
52017
A Metamodel for GDPR-based Privacy Level Agreements.
V Diamantopoulou, K Angelopoulos, M Pavlidis, H Mouratidis
ER Forum/Demos, 285-291, 2017
52017
Privacy data management and awareness for public administrations: a case study from the healthcare domain
V Diamantopoulou, K Angelopoulos, J Flake, A Praitano, JF Ruiz, ...
Annual Privacy Forum, 192-209, 2017
42017
Evaluation of a security and privacy requirements methodology using the physics of notation
V Diamantopoulou, M Pavlidis, H Mouratidis
Computer Security, 210-225, 2017
32017
A holistic approach for privacy protection in E-government
K Angelopoulos, V Diamantopoulou, H Mouratidis, M Pavlidis, M Salnitri, ...
Proceedings of the 12th International Conference on Availability …, 2017
32017
The system can't perform the operation now. Try again later.
Articles 1–20