People

Professor Haris Mouratidis

Director of IADS and Professor (R)
School of Computer Science and Electronic Engineering (CSEE)
Professor Haris Mouratidis
  • Email

  • Telephone

    +44 (0) 1206 872362

  • Location

    IADS OFFICE PARKSIDE 2C COLCHESTER CAMPUS, Colchester Campus

Profile

Appointments

University of Essex

  • Director, Institute for Analytics and Data Science (1/10/2021 - present)

  • Professor, School of Computer Science and Electronic Engineering, University of Essex (1/10/2021 - present)

Research and professional activities

Research interests

Security and Privacy Requirements Engineering

My work in this area is focused on the development and precise definition of modelling languages, methodologies and ontologies to support elicitation, modelling and analysis of security, trust, and privacy requirements. I have developed the Secure Tropos methodology, one of the first methodologies in the literature that implements the idea of security and privacy by design and integrates security, privacy and engineering techniques under one methodological approach.

Open to supervise

Cybersecurity risk prediction and management

Cyber security risk management plays an important role for today’s businesses due to the rapidly changing threat landscape and the existence of evolving sophisticated cyber attacks. I am interested in developing automated techniques and mechanisms that predict potential risks and support decision making and management of those risks.

Cybersecurity Threat Intelligence

Privacy by Design

Data Security and Privacy

Internet of Things (IoT), 5G/6G and Cloud Computing Security

Current research

Cyber hygiene self-assessment maturity tool (CyberSecurityAId)

We are developing a cyber hygiene self-assessment maturity tool targeted at SMEs. Our tool aims to empower small businesses to improve their cyber defence. The project is funded by CyberASAP. CyberASAP is aimed at supporting the development of cybersecurity innovations across the UK. CyberASAP is a highly acclaimed programme that has helped teams turn their cybersecurity ideas into successful businesses.
More information about this project

Publications

Journal articles (80)

Sánchez, LE., Santos-Olmo, A., Rosado, DG., Blanco, C., Serrano, MA., Mouratidis, H. and Fernández-Medina, E., (2025). MARISMA: A modern and context-aware framework for assessing and managing information cybersecurity risks. Computer Standards and Interfaces. 92, 103935-103935

Santos-Olmo, A., Sánchez, LE., Rosado, DG., Serrano, MA., Blanco, C., Mouratidis, H. and Fernández-Medina, E., (2024). Towards an integrated risk analysis security framework according to a systematic analysis of existing proposals. Frontiers of Computer Science. 18 (3)

Fotis, T., Kioskli, K., Sundaralingam, A., Fasihi, A. and Mouratidis, H., (2023). Co-creation in a digital health living lab: A case study.. Frontiers in Public Health. 10, 892930-

Mouratidis, H., Islam, S., Santos-Olmo, A., Sanchez, LE. and Ismail, UM., (2023). Modelling Language for Cyber Security Incident Handling for Critical Infrastructures. Computers and Security. 128, 103139-103139

Kioskli, K., Fotis, T., Nifakos, S. and Mouratidis, H., (2023). The Importance of Conceptualising the Human-Centric Approach in Maintaining and Promoting Cybersecurity-Hygiene in Healthcare 4.0. Applied Sciences. 13 (6), 3410-3410

Selvarajan, S. and Mouratidis, H., (2023). A quantum trust and consultative transaction-based blockchain cybersecurity model for healthcare systems. Scientific Reports. 13 (1), 7107-

Selvarajan, S. and Mouratidis, H., (2023). Author Correction: A quantum trust and consultative transaction-based blockchain cybersecurity model for healthcare systems. Scientific Reports. 13 (1), 9409-

Sánchez, LE., Santos-Olmo, A., Mouratidis, H. and Fernández-Medina, E., (2023). New Frontiers in Security Risk Management. IT Professional. 25 (3), 61-67

Kure, HI., Islam, S. and Mouratidis, H., (2022). An integrated cyber security risk management framework and risk predication for the critical infrastructure protection. Neural Computing and Applications. 34 (18), 15241-15271

Adee, R. and Mouratidis, H., (2022). A Dynamic Four-Step Data Security Model for Data in Cloud Computing Based on Cryptography and Steganography. Sensors. 22 (3), 1109-1109

Rosado, D., Santos Olmo, A., Sanchez, LE., Serrano, M., Blanco, C., Mouratidis, H. and Fernandez-Medina, E., (2022). Managing cybersecurity risks of cyber-physical systems: The MARISMA-CPS pattern. Computers in Industry. 142, 103715-103715

Kioskli, K., Dellagiacoma, D., Fotis, T. and Mouratidis, H., (2022). The supply chain of a Living Lab: Modelling security, privacy, and vulnerability issues alongside with their impact and potential mitigation strategies. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 13 (2), 147-182

Zardari, S., Alam, S., Al Salem, HA., Al Reshan, MS., Shaikh, A., Malik, AFK., Masood ur Rehman, M. and Mouratidis, H., (2022). A Comprehensive Bibliometric Assessment on Software Testing (2016–2021). Electronics. 11 (13), 1984-1984

Islam, S., Abba, A., Ismail, U., Mouratidis, H. and Papastergiou, S., (2022). Vulnerability prediction for secure healthcare supply chain service delivery. Integrated Computer Aided Engineering. 29 (4), 389-409

Alam, S., Zardari, S., Noor, S., Ahmed, S. and Mouratidis, H., (2022). Trust Management in Social Internet of Things (SIoT): A Survey. IEEE Access. 10, 108924-108954

Piras, L., Al-Obeidallah, MG., Pavlidis, M., Mouratidis, H., Tsohou, A., Magkos, E. and Praitano, A., (2021). A Data Scope Management Service to Support Privacy by Design and GDPR Compliance. Journal of Data Intelligence. 2 (2), 136-165

Papastergiou, S., Mouratidis, H. and Kalogeraki, E-M., (2021). Handling of advanced persistent threats and complex incidents in healthcare, transportation and energy ICT infrastructures. Evolving Systems. 12 (1), 91-108

Tsohou, A., Magkos, E., Mouratidis, H., Chrysoloras, G., Piras, L., Pavlidis, M., Debussche, J., Rotoloni, M. and Gallego-Nicasio Crespo, B., (2020). Privacy, security, legal and technology acceptance elicited and consolidated requirements for a GDPR compliance platform. Information & Computer Security. 28 (4), 531-553

Mouratidis, H., Shei, S. and Delaney, A., (2020). A security requirements modelling language for cloud computing environments. Software and Systems Modeling. 19 (2), 271-295

Salnitri, M., Angelopoulos, K., Pavlidis, M., Diamantopoulou, V., Mouratidis, H. and Giorgini, P., (2020). Modelling the interplay of security, privacy and trust in sociotechnical systems: a computer-aided design approach. Software and Systems Modeling. 19 (2), 467-491

Argyropoulos, N., Mouratidis, H. and Fish, A., (2020). Enhancing secure business process design with security process patterns. Software and Systems Modeling. 19 (3), 555-577

Polatidis, N., Pimenidis, E., Pavlidis, M., Papastergiou, S. and Mouratidis, H., (2020). From product recommendation to cyber-attack prediction: generating attack graphs and predicting future attacks. Evolving Systems. 11 (3), 479-490

de Carvalho, RM., Del Prete, C., Martin, YS., Araujo Rivero, RM., Önen, M., Schiavo, FP., Rumín, ÁC., Mouratidis, H., Yelmo, JC. and Koukovini, MN., (2020). Protecting Citizens’ Personal Data and Privacy: Joint Effort from GDPR EU Cluster Research Projects. SN Computer Science. 1 (4)

Diamantopoulou, V. and Mouratidis, H., (2019). Practical evaluation of a reference architecture for the management of privacy level agreements. Information & Computer Security. 27 (5), 711-730

Schauer, S., Polemi, N. and Mouratidis, H., (2019). Correction to: MITIGATE: a dynamic supply chain cyber risk assessment methodology. Journal of Transportation Security. 12 (1-2), 37-37

Schauer, S., Polemi, N. and Mouratidis, H., (2019). MITIGATE: a dynamic supply chain cyber risk assessment methodology. Journal of Transportation Security. 12 (1-2), 1-35

Mavropoulos, O., Mouratidis, H., Fish, A. and Panaousis, E., (2019). Apparatus: A framework for security analysis in internet of things systems. Ad Hoc Networks. 92, 101743-101743

Pimenidis, E., Polatidis, N. and Mouratidis, H., (2019). Mobile recommender systems: Identifying the major concepts. Journal of Information Science. 45 (3), 387-397

Diamantopoulou, V. and Mouratidis, H., (2018). Applying the physics of notation to the evaluation of a security and privacy requirements engineering methodology. Information & Computer Security. 26 (4), 382-400

Argyropoulos, N., Angelopoulos, K., Mouratidis, H. and Fish, A., (2018). Risk-aware decision support with constrained goal models. Information & Computer Security. 26 (4), 472-490

Kalogeraki, E-M., Papastergiou, S., Mouratidis, H. and Polemi, N., (2018). A Novel Risk Assessment Methodology for SCADA Maritime Logistics Environments. Applied Sciences. 8 (9), 1477-1477

Islam, S., Ouedraogo, M., Kalloniatis, C., Mouratidis, H. and Gritzalis, S., (2018). Assurance of Security and Privacy Requirements for Cloud Deployment Models. IEEE Transactions on Cloud Computing. 6 (2), 387-400

Mouratidis, H. and Diamantopoulou, V., (2018). A Security Analysis Method for Industrial Internet of Things. IEEE Transactions on Industrial Informatics. 14 (9), 4093-4100

Polatidis, N., Pavlidis, M. and Mouratidis, H., (2018). Cyber-attack path discovery in a dynamic supply chain maritime risk management system. Computer Standards & Interfaces. 56, 74-82

Mavropoulos, O., Mouratidis, H., Fish, A., Panaousis, E. and Kalloniatis, C., (2017). A conceptual model to support security analysis in the internet of things. Computer Science and Information Systems. 14 (2), 557-578

Georgiadis, CK., Polatidis, N., Mouratidis, H. and Pimenidis, E., (2017). A method for privacy-preserving collaborative filtering recommendations. Journal of Universal Computer Science. 23 (2), 146-166

Polatidis, N., Georgiadis, CK., Pimenidis, E. and Mouratidis, H., (2017). Privacy-preserving collaborative recommendations based on random perturbations. Expert Systems with Applications. 71, 18-25

Simou, S., Kalloniatis, C., Gritzalis, S. and Mouratidis, H., (2016). A survey on cloud forensics challenges and solutions. Security and Communication Networks. 9 (18), 6285-6314

Naskos, A., Gounaris, A., Mouratidis, H. and Katsaros, P., (2016). Online Analysis of Security Risks in Elastic Cloud Applications. IEEE Cloud Computing. 3 (5), 26-33

Márquez, L., G. Rosado, D., Mouratidis, H. and Fernandez Medina, E., (2016). Design Activity in the Process of Migrating Security Features to Cloud. IEEE Latin America Transactions. 14 (6), 2846-2852

Alavi, R., Islam, S. and Mouratidis, H., (2016). An information security risk-driven investment model for analysing human factors. Information & Computer Security. 24 (2), 205-227

Rebollo, O., Mellado, D., Fernández-Medina, E. and Mouratidis, H., (2015). Empirical evaluation of a cloud computing information security governance framework. Information and Software Technology. 58, 44-57

Kavakli, E., Kalloniatis, C., Mouratidis, H. and Gritzalis, S., (2015). Privacy as an Integral Part of the Implementation of Cloud Solutions. The Computer Journal. 58 (10), 2213-2224

Mellado, D., Mouratidis, H. and Fernández-Medina, E., (2014). Secure Tropos framework for software product lines requirements engineering. Computer Standards & Interfaces. 36 (4), 711-722

Kalloniatis, C., Mouratidis, H., Vassilis, M., Islam, S., Gritzalis, S. and Kavakli, E., (2014). Towards the design of secure and privacy-oriented information systems in the cloud: Identifying the major concepts. Computer Standards & Interfaces. 36 (4), 759-775

Islam, S., Mouratidis, H. and Weippl, ER., (2014). An empirical study on the implementation and evaluation of a goal-driven software development risk management model. Information and Software Technology. 56 (2), 117-133

Pavlidis, M., Islam, S., Mouratidis, H. and Kearney, P., (2014). Modeling Trust Relationships for Developing Trustworthy Information Systems. International Journal of Information System Modeling and Design. 5 (1), 25-48

Kalloniatis, C., Mouratidis, H. and Islam, S., (2013). Evaluating cloud deployment scenarios based on security and privacy requirements. Requirements Engineering. 18 (4), 299-319

Ouedraogo, M. and Mouratidis, H., (2013). Selecting a Cloud Service Provider in the age of cybercrime. Computers & Security. 38, 3-13

Mouratidis, H., Islam, S., Kalloniatis, C. and Gritzalis, S., (2013). A framework to support selection of cloud providers based on security and privacy requirements. Journal of Systems and Software. 86 (9), 2276-2293

Ouedraogo, M., Savola, RM., Mouratidis, H., Preston, D., Khadraoui, D. and Dubois, E., (2013). Taxonomy of quality metrics for assessing assurance of security correctness. Software Quality Journal. 21 (1), 67-97

Mouratidis, H., Kalloniatis, C., Islam, S., Huget, MP. and Gritzalis, S., (2012). Aligning security and privacy to support the development of secure information systems. Journal of Universal Computer Science. 18 (12), 1608-1627

Ouedraogo, M., Khadraoui, D., Mouratidis, H. and Dubois, E., (2012). Appraisal and reporting of security assurance at operational systems level. Journal of Systems and Software. 85 (1), 193-208

Mouratidis, H., (2012). Preface. Information Systems. 37 (8), 713-713

Matulevičius, R., Mouratidis, H., Mayer, N., Dubois, E. and Heymans, P., (2012). Syntactic and semantic extensions to Secure Tropos to support security risk management. Journal of Universal Computer Science. 18 (6), 816-844

Mouratidis, H., (2011). Secure Software Systems Engineering: The Secure Tropos Approach (Invited Paper). Journal of Software. 6 (3), 331-339

(2011). Software Engineering for Secure Systems. Software Engineering for Secure Systems: Industrial and Research Perspectives, 1-370

Islam, S., Mouratidis, H. and Jürjens, J., (2011). A framework to support alignment of secure software engineering with legal regulations. Software & Systems Modeling. 10 (3), 369-394

Mouratidis, H., Kolp, M., Giorgini, P. and Faulkner, S., (2010). An architectural description language for secure Multi-Agent Systems. Web Intelligence and Agent Systems: An International Journal. 8 (1), 99-122

Mouratidis, H. and Cofta, P., (2010). Practitioner's challenges in designing trust into online systems. Journal of theoretical and applied electronic commerce research. 5 (3), 65-77

Dubois, E. and Mouratidis, H., (2010). Guest editorial: security requirements engineering: past, present and future. Requirements Engineering. 15 (1), 1-5

Mouratidis, H. and Jurjens, J., (2010). From goal-driven security requirements engineering to secure design. International Journal of Intelligent Systems. 25 (8), 813-840

Low, G., Mouratidis, H. and Henderson-Sellers, B., (2010). Using a Situational Method Engineering Approach to Identify Reusable Method Fragments from the Secure TROPOS Methodology.. The Journal of Object Technology. 9 (4), 93-93

Beydoun, G., Low, G., Henderson-Sellers, B., Mouratidis, H., Gomez-Sanz, JJ., Pavon, J. and Gonzalez-Perez, C., (2009). FAML: A Generic Metamodel for MAS Development. IEEE Transactions on Software Engineering. 35 (6), 841-863

Beydoun, G., Low, G., Mouratidis, H. and Henderson-Sellers, B., (2009). A security-aware metamodel for multi-agent systems (MAS). Information and Software Technology. 51 (5), 832-845

Mouratidis, H., Jahankhani, H. and Nkhoma, MZ., (2008). Management versus security specialists: an empirical study on security related perceptions. Information Management & Computer Security. 16 (2), 187-205

Mouratidis, H. and Giorgini, P., (2007). Security Attack Testing (SAT)—testing the security of information systems at design time. Information Systems. 32 (8), 1166-1183

MOURATIDIS, H. and GIORGINI, P., (2007). SECURE TROPOS: A SECURITY-ORIENTED EXTENSION OF THE TROPOS METHODOLOGY. International Journal of Software Engineering and Knowledge Engineering. 17 (02), 285-309

Jahankhani, H., Fernando, S., Nkhoma, MZ. and Mouratidis, H., (2007). Information Systems Security. International Journal of Information Security and Privacy. 1 (3), 13-25

Mouratidis, H., (2007). Secure information systems engineering: a manifesto. International Journal of Electronic Security and Digital Forensics. 1 (1), 27-27

MOURATIDIS, H., WEISS, M. and GIORGINI, P., (2006). MODELING SECURE SYSTEMS USING AN AGENT-ORIENTED APPROACH AND SECURITY PATTERNS. International Journal of Software Engineering and Knowledge Engineering. 16 (03), 471-498

Mouratidis, H. and Weiss, M., (2006). Patterns for Modelling Agent Systems with Tropos. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3914 LNCS, 207-223

Mouratidis, H., (2005). Safety and Security in Multiagent Systems: Report on the 2nd SASEMAS workshop (SASEMAS'05). Computers & Security. 24 (8), 614-617

Mouratidis, H., Giorgini, P. and Manson, G., (2005). When security meets software engineering: a case of modelling secure information systems. Information Systems. 30 (8), 609-629

Bresciani, P., Giorgini, P., Mouratidis, H. and Manson, G., (2004). Multi-agent Systems and Security Requirements Analysis. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2940, 35-48

Mouratidis, H., Giorgini, P. and Manson, G., (2003). Integrating Security and Systems Engineering: Towards the Modelling of Secure Information Systems. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2681, 63-78

Poggi, A., Rimassa, G., Turci, P., Odell, J., Mouratidis, H. and Manson, G., (2003). Modeling deployment and mobility issues in multiagent systems using AUML. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2935, 69-84

Mouratidis, H., Manson, G. and Philp, I., (2003). A Novel Agent-Based System to Support the Single Assessment Process of Older People. Health Informatics Journal. 9 (3), 149-162

Mouratidis, H., Manson, G. and Philp, I., (2003). Analysis and Design of the eSAP: An Integrated Health and Social Care Information System. Health Informatics Journal. 9 (2), 89-92

Gani, A., Mouratidis, H., Abouzakhar, NS. and Manson, GA., (2002). Developing an intelligent user manager system for controlling smart school network resources. Malaysian Journal of Computer Science. 15 (2), 56-69

Books (15)

Guizzardi, G., Santoro, F., Mouratidis, H. and Soffer, P., (2024). Preface

Nurcan, S., Opdahl, AL., Mouratidis, H. and Tsohou, A., (2023). Preface

Salnitri, M., Mouratidis, H., Mancini, L. and Giorgini, P., (2020). Preface

Salnitri, M., Jürjens, J., Mouratidis, H., Mancini, L. and Giorgini, P., (2020). Correction to: Visual Privacy Management. Springer International Publishing. 9783030599430

Furnell, S., Mouratidis, H. and Pernul, G., (2018). Preface

Krogstie, J., Mouratidis, H. and Su, J., (2016). Preface

(2014). Advanced Information Systems Engineering Workshops. Springer International Publishing. 9783319078687

(2014). Advanced Information Systems Engineering. Springer International Publishing. 9783319078809

(2013). Advanced Information Systems Engineering Workshops. Springer Berlin Heidelberg. 9783642384899

Lammari, N., Rosado, DG. and Mouratidis, H., (2012). Workshop on Information Systems Security Engineering: WISSE

Rolland, C. and Mouratidis, H., (2011). Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface

Rolland, C. and Mouratidis, H., (2011). Preface

Barley, M., Mouratidis, H., Spears, D. and Unruh, A., (2009). Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface

Kolp, M., Henderson-Sellers, B., Mouratidis, H., Garcia, A., Ghose, A. and Bresciani, P., (2008). Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface

(2007). Integrating Security and Software Engineering. IGI Global. 9781599041476

Book chapters (24)

Gharib, M., Giorgini, P., Salnitri, M., Paja, E., Mouratidis, H., Pavlidis, M. and Ruiz, JF., (2020). A Holistic Approach for Privacy Requirements Analysis: An Industrial Case Study. In: Lecture Notes in Computer Science. Springer International Publishing. 22- 53. 9783030599430

Peldszus, S., Ahmadian, AS., Salnitri, M., Jürjens, J., Pavlidis, M. and Mouratidis, H., (2020). Visual Privacy Management. In: Lecture Notes in Computer Science. Springer International Publishing. 77- 108. 9783030599430

Ahmadian, AS., Peldszus, S., Jürjens, J., Salnitri, M., Giorgini, P., Mouratidis, H. and Ruiz, JF., (2020). The Architecture of VisiOn Privacy Platform. In: Lecture Notes in Computer Science. Springer International Publishing. 54- 76. 9783030599430

Pavlidis, M., Islam, S., Mouratidis, H. and Kearney, P., (2017). Modeling Trust Relationships for Developing Trustworthy Information Systems. In: Computer Systems and Software Engineering. IGI Global. 1632- 1655

Mouratidis, H., Argyropoulos, N. and Shei, S., (2016). Security Requirements Engineering for Cloud Computing: The Secure Tropos Approach. In: Domain-Specific Conceptual Modeling. Springer International Publishing. 357- 380. 9783319394169

Islam, S., Mouratidis, H. and Weippl, ER., (2013). A Goal-Driven Risk Management Approach to Support Security and Privacy Analysis of Cloud-Based System. In: Security Engineering for Cloud Computing. IGI Global. 97- 122

Ouedraogo, M., Mouratidis, H., Dubois, E. and Khadraoui, D., (2013). Security Assurance Evaluation and IT Systems’ Context of Use Security Criticality. In: Mobile and Handheld Computing Solutions for Organizations and End-Users. IGI Global. 70- 91

Nhlabatsi, A., Bandara, A., Hayashi, S., Haley, C., Jurjens, J., Kaiya, H., Kubo, A., Laney, R., Mouratidis, H., Nuseibeh, B., Tun, T., Washizaki, H., Yoshioka, N. and Yu, Y., (2011). Security Patterns. In: Software Engineering for Secure Systems. IGI Global. 75- 111

Ouedraogo, M., Mouratidis, H., Dubois, E. and Khadraoui, D., (2010). Information Systems Security Criticality and Assurance Evaluation. In: Lecture Notes in Computer Science. Springer Berlin Heidelberg. 38- 54. 9783642135767

Nhlabatsi, A., Bandara, A., Hayashi, S., Haley, CB., Jurjens, J., Kaiya, H., Kubo, A., Laney, R., Mouratidis, H., Nuseibeh, B., Tun, TT., Washizaki, H., Yoshioka, N. and Yu, Y., (2010). Security patterns: Comparing modeling approaches. In: Software Engineering for Secure Systems: Industrial and Research Perspectives. 75- 111

Islam, S., Mouratidis, H. and Wagner, S., (2010). Towards a Framework to Elicit and Manage Security and Privacy Requirements from Laws and Regulations. In: Lecture Notes in Computer Science. Springer Berlin Heidelberg. 255- 261. 9783642141911

JAHANKHANI, H., NKHOMA, MZ. and MOURATIDIS, H., (2010). SECURITY RISK MANAGEMENT STRATEGY. In: Handbook of Electronic Security and Digital Forensics. WORLD SCIENTIFIC. 237- 262. 9789812837035

MOURATIDIS, H., (2010). SECURE BY DESIGN: CONSIDERING SECURITY FROM THE EARLY STAGES OF THE INFORMATION SYSTEMS DEVELOPMENT. In: Handbook of Electronic Security and Digital Forensics. WORLD SCIENTIFIC. 115- 132. 9789812837035

Bimrah, KK., Mouratidis, H. and Preston, D., (2009). A Language for Modelling Trust in Information Systems. In: Information Systems Development. Springer US. 599- 608. 9780387848099

Mouratidis, H. and Giorgini, P., (2009). Enhancing Secure Tropos to Effectively Deal with Security Requirements in the Development of Multiagent Systems. In: Lecture Notes in Computer Science. Springer Berlin Heidelberg. 8- 26. 9783642048784

Mouratidis, H., Sunyaev, A. and Jurjens, J., (2009). Secure Information Systems Engineering: Experiences and Lessons Learned from Two Health Care Projects. In: Notes on Numerical Fluid Mechanics and Multidisciplinary Design. Springer International Publishing. 231- 245. 9783319981765

Matulevičius, R., Mayer, N., Mouratidis, H., Dubois, E., Heymans, P. and Genon, N., (2008). Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development. In: Notes on Numerical Fluid Mechanics and Multidisciplinary Design. Springer International Publishing. 541- 555. 9783319981765

Giorgini, P., Mouratidis, H. and Zannone, N., (2007). Modelling Security and Trust with Secure Tropos. In: Integrating Security and Software Engineering. IGI Global. 160- 189

Mouratidis, H. and Giorgini, P., (2007). Integrating Security and Software Engineering. In: Integrating Security and Software Engineering. IGI Global. 1- 15

Mouratidis, H. and Giorgini, P., (2007). Integrating Security and Software Engineering. In: Integrating Security and Software Engineering. IGI Global. 271- 275

Mouratidis, H., Jürjens, J. and Fox, J., (2006). Towards a Comprehensive Framework for Secure Systems Development. In: Notes on Numerical Fluid Mechanics and Multidisciplinary Design. Springer International Publishing. 48- 62. 3-540-34652-X. 9783319981765

Mouratidis, H. and Giorgini, P., (2006). Integrating security and software engineering: Future vision and challenges. In: Integrating Security and Software Engineering: Advances and Future Visions. 271- 275

Mouratidis, H. and Giorgini, P., (2006). Integrating security and software engineering: An introduction. In: Integrating Security and Software Engineering: Advances and Future Visions. 1- 14

Mouratidis, H., Weiss, M. and Giorgini, P., (2005). Security Patterns Meet Agent Oriented Software Engineering: A Complementary Solution for Developing Secure Information Systems. In: Lecture Notes in Computer Science. Springer Berlin Heidelberg. 225- 240. 3-540-29389-2. 9783540293897

Conferences (95)

Khaled, AA., Hasan, MM., Islam, S., Papastergiou, S. and Mouratidis, H., (2024). Synthetic Data Generation and Impact Analysis of Machine Learning Models for Enhanced Credit Card Fraud Detection

Basheer, N., Pranggono, B., Islam, S., Papastergiou, S. and Mouratidis, H., (2024). Enhancing Malware Detection Through Machine Learning Using XAI with SHAP Framework

Heydari, M., Mouratidis, H. and Tafreshi, VHF., (2023). OntoCyrene: Towards Ontology-Enhanced Asset Modelling for Supply Chains in the Context of Cyber Security

Al-Obeidallah, M., Piras, L., Iloanugo, O., Mouratidis, H., Alkubaisy, D. and Dellagiacoma, D., (2023). Goal-Modeling Privacy-by-Design Patterns for Supporting GDPR Compliance

Alkubaisy, D., Piras, L., Al-Obeidallah, MG., Cox, K. and Mouratidis, H., (2022). A Framework for Privacy and Security Requirements Analysis and Conflict Resolution for Supporting GDPR Compliance Through Privacy-by-Design

Kioskli, K., Fotis, T. and Mouratidis, H., (2021). The landscape of cybersecurity vulnerabilities and challenges in healthcare: Security standards and paradigm shift recommendations

Islam, S., Mouratidis, H. and Mahmud, H., (2021). An Automated Tool to Support an Intelligence Learner Management System Using Learning Analytics and Machine Learning

Yeboah-Ofori, A., Mouratidis, H., Ismai, U., Islam, S. and Papastergiou, S., (2021). Cyber Supply Chain Threat Analysis and Prediction Using Machine Learning and Ontology

Islam, S., Papastergiou, S. and Mouratidis, H., (2021). A Dynamic Cyber Security Situational Awareness Framework for Healthcare ICT Infrastructures

Alkubaisy, D., Piras, L., Al-Obeidallah, MG., Cox, K. and Mouratidis, H., (2021). ConfIs: A Tool for Privacy and Security Analysis and Conflict Resolution for Supporting GDPR Compliance through Privacy-by-Design

Skrbic, S., Sakellari, G. and Mouratidis, H., (2021). Welcome Message from the SecRS Workshop Organizers

Mouratidis, H., Zdravkovic, J. and Stirna, J., (2020). Cyber Security Resilience in Business Informatics: An Exploratory Paper

Piras, L., Al-Obeidallah, MG., Pavlidis, M., Mouratidis, H., Tsohou, A., Magkos, E., Praitano, A., Iodice, A. and Crespo, BG-N., (2020). DEFeND DSM: A Data Scope Management Service for Model-Based Privacy by Design GDPR Compliance

Athinaiou, M., Mouratidis, H., Fotis, T. and Pavlidis, M., (2020). A Conceptual Redesign of a Modelling Language for Cyber Resiliency of Healthcare Systems

Tsohou, A., Magkos, M., Mouratidis, H., Chrysoloras, G., Piras, L., Pavlidis, M., Debussche, J., Rotoloni, M. and Crespo, BG-N., (2020). Privacy, Security, Legal and Technology Acceptance Requirements for a GDPR Compliance Platform

Naik, N., Jenkins, P., Gillett, J., Mouratidis, H., Naik, K. and Song, J., (2019). Lockout-Tagout Ransomware: A Detection Method for Ransomware using Fuzzy Hashing and Clustering

Abubakar, BA. and Mouratidis, H., (2019). Multi-Tenancy Cloud-Enabled Small Cell Security

Piras, L., Al-Obeidallah, MG., Praitano, A., Tsohou, A., Mouratidis, H., Gallego-Nicasio Crespo, B., Bernard, JB., Fiorani, M., Magkos, E., Sanz, AC., Pavlidis, M., D’Addario, R. and Zorzino, GG., (2019). DEFeND Architecture: A Privacy by Design Platform for GDPR Compliance

Alkubaisy, D., Cox, K. and Mouratidis, H., (2019). Towards Detecting and Mitigating Conflicts for Privacy and Security Requirements

Papastergiou, S., Mouratidis, H. and Kalogeraki, E-M., (2019). Cyber Security Incident Handling, Warning and Response System for the European Critical Information Infrastructures (CyberSANE)

Athinaiou, M., Mouratidis, H., Fotis, T., Pavlidis, M. and Panaousis, E., (2018). Towards the Definition of a Security Incident Response Modelling Language

Diamantopoulou, V., Pavlidis, M. and Mouratidis, H., (2018). Evaluation of a Security and Privacy Requirements Methodology Using the Physics of Notation

Argyropoulos, N., Angelopoulos, K., Mouratidis, H. and Fish, A., (2018). Decision-Making in Security Requirements Engineering with Constrained Goal Models

Diamantopoulou, V., Angelopoulos, K., Pavlidis, M. and Mouratidis, H., (2017). A metamodel for GDPR-based privacy level agreements

Diamantopoulou, V., Angelopoulos, K., Flake, J., Praitano, A., Ruiz, JF., Jürjens, J., Pavlidis, M., Bonutto, D., Sanz, AC., Mouratidis, H., Robles, JG. and Tozzi, AE., (2017). Privacy Data Management and Awareness for Public Administrations: A Case Study from the Healthcare Domain

Naskos, A., Gounaris, A., Mouratidis, H. and Katsaros, P., (2017). Security-aware elasticity for NoSQL databases in multi-cloud environments

Angelopoulos, K., Diamantopoulou, V., Mouratidis, H., Pavlidis, M., Salnitri, M., Giorgini, P. and Ruiz, JF., (2017). A Holistic Approach for Privacy Protection in E-Government

Argyropoulos, N., Mouratidis, H. and Fish, A., (2017). Attribute-Based Security Verification of Business Process Models

Vassilakis, VG., Mouratidis, H., Panaousis, E., Moscholios, ID. and Logothetis, MD., (2017). Security requirements modelling for virtualized 5G small cell networks

Pavlidis, M., Mouratidis, H., Panaousis, E. and Argyropoulos, N., (2017). Selecting Security Mechanisms in Secure Tropos

Neokosmidis, I., Rokkas, T., Chochliouros, IP., Goratti, L., Mouratidis, H., Nasr, KM., Vahid, S., Moessner, K., Albanese, A., Crosta, PS. and Paglierani, P., (2017). Are Small Cells and Network Intelligence at the Edge the Drivers for 5G Market Adoption? The SESAME Case

Mavropoulos, O., Mouratidis, H., Fish, A. and Panaousis, E., (2017). ASTo: A tool for security analysis of IoT systems

Polatidis, N., Pimenidis, E., Pavlidis, M. and Mouratidis, H., (2017). Recommender Systems Meeting Security: From Product Recommendation to Cyber-Attack Prediction

(2017). [Front cover]

Shei, S., Mouratidis, H. and Delaney, A., (2017). A Security Requirements Modelling Language to Secure Cloud Computing Environments

Argyropoulos, N., Mouratidis, H. and Fish, A., (2017). Supporting Secure Business Process Design via Security Process Patterns

Argyropoulos, N., Shei, S., Kalloniatis, C., Mouratidis, H., Delaney, A., Fish, A. and Gritzalis, S., (2017). A semi-automatic approach for eliciting cloud security and privacy requirements

Diamantopoulou, V., Pavlidis, M. and Mouratidis, H., (2017). Privacy level agreements for public administration information systems

Diamantopoulou, V., Kalloniatis, C., Gritzalis, S. and Mouratidis, H., (2017). Supporting Privacy by Design Using Privacy Process Patterns

Sprovieri, D., Argyropoulos, N., Souveyet, C., Mazo, R., Mouratidis, H. and Fish, A., (2016). Security Alignment Analysis of Software Product Lines

Gharib, M., Salnitri, M., Paja, E., Giorgini, P., Mouratidis, H., Pavlidis, M., Ruiz, JF., Fernandez, S. and Siria, AD., (2016). Privacy Requirements: Findings and Lessons Learned in Developing a Privacy Platform

Vassilakis, V., Panaousis, E. and Mouratidis, H., (2016). Security Challenges of Small Cell as a Service in Virtualized Mobile Edge Computing Environments

Argyropoulos, N., Kalloniatis, C., Mouratidis, H. and Fish, A., (2016). Incorporating privacy patterns into semi-automatic business process derivation

Simou, S., Kalloniatis, C., Mouratidis, H. and Gritzalis, S., (2016). Towards a Model-Based Framework for Forensic-Enabled Cloud Information Systems

Shei, S., Kalloniatis, C., Mouratidis, H. and Delaney, A., (2016). Modelling Secure Cloud Computing Systems from a Security Requirements Perspective

Giannoulakis, I., Xylouris, G., Kafetzakis, E., Kourtis, A., Fajardo, JO., Khodashenas, PS., Albanese, A., Mouratidis, H. and Vassilakis, V., (2016). System architecture and deployment scenarios for SESAME: Small cEllS coodinAtion for Multi-tenancy and Edge services

Mavropoulos, O., Mouratidis, H., Fish, A., Panaousis, E. and Kalloniatis, C., (2016). Apparatus: Reasoning About Security Requirements in the Internet of Things

Pavlidis, M., Mouratidis, H., Gonzalez-Perez, C. and Kalloniatis, C., (2016). Addressing Privacy and Trust Issues in Cultural Heritage Modelling

Simou, S., Kalloniatis, C., Mouratidis, H. and Gritzalis, S., (2016). A Meta-model for Assisting a Cloud Forensics Process

Alavi, R., Islam, S., Mouratidis, H. and Lee, S., (2015). Managing social engineering attacks-Considering human factors and security investment

Shei, S., Delaney, A., Kapetanakis, S. and Mouratidis, H., (2015). Visually Mapping Requirements Models to Cloud Services

Ismail, UM., Islam, S. and Mouratidis, H., (2015). Cloud Security Audit for Migration and Continuous Monitoring

Shei, S., Alcaniz, LM., Mouratidis, H., Delaney, A., Rosado, DG. and Fernandez-Medina, E., (2015). Modelling secure cloud systems based on system requirements

Argyropoulos, N., Márquez Alcañiz, L., Mouratidis, H., Fish, A., Rosado, DG., de Guzmán, IG-R. and Fernández-Medina, E., (2015). Eliciting Security Requirements for Business Processes of Legacy Systems

Argyropoulos, N., Mouratidis, H. and Fish, A., (2015). Towards the Derivation of Secure Business Process Designs

Naskos, A., Gounaris, A., Mouratidis, H. and Katsaros, P., (2015). Security-Aware Elasticity for NoSQL Databases

Ganji, D., Mouratidis, H., Gheytassi, SM. and Petridis, M., (2015). Conflicts Between Security and Privacy Measures in Software Requirements Engineering

Ismail, UM., Islam, S. and Mouratidis, H., (2015). A Framework for Cloud Security Audit

Alavi, R., Islam, S. and Mouratidis, H., (2015). Human Factors of Social Engineering Attacks (SEAs) in Hybrid Cloud Environment: Threats and Risks

Simou, S., Kalloniatis, C., Mouratidis, H. and Gritzalis, S., (2015). Towards the Development of a Cloud Forensics Methodology: A Conceptual Model

Márquez, L., Rosado, DG., Mouratidis, H., Mellado, D. and Fernández-Medina, E., (2015). A Framework for Secure Migration Processes of Legacy Systems to the Cloud

Alavi, R., Islam, S. and Mouratidis, H., (2014). A Conceptual Framework to Analyze Human Factors of Information Security Management System (ISMS) in Organizations

Kalloniatis, C., Manousakis, V., Mouratidis, H. and Gritzalis, S., (2013). Migrating into the Cloud: Identifying the Major Security and Privacy Concerns

Souag, A., Salinesi, C., Wattiau, I. and Mouratidis, H., (2013). Using Security and Domain Ontologies for Security Requirements Analysis

Pavlidis, M., Mouratidis, H., Kalloniatis, C., Islam, S. and Gritzalis, S., (2013). Trustworthy Selection of Cloud Providers Based on Security and Privacy Requirements: Justifying Trust Assumptions

Pavlidis, M., Kavakli, E., Bantimaroudis, P., Mouratidis, H., Kalloniatis, C. and Gritzalis, S., (2013). The role of trust in the development and adoption of cultural internet-based systems

Ahmed, N., Matulevičius, R. and Mouratidis, H., (2012). A model transformation from misuse cases to secure tropos

Zarrabi, F., Pavlidis, M., Mouratidis, H., Islam, S. and Preston, D., (2012). A Meta-model for Legal Compliance and Trustworthiness of Information Systems

Pavlidis, M., Islam, S. and Mouratidis, H., (2012). A CASE Tool to Support Automated Modelling and Analysis of Security Requirements, Based on Secure Tropos

Pavlidis, M., Mouratidis, H., Islam, S. and Kearney, P., (2012). Dealing with trust and control: A meta-model for trustworthy information systems development

Mellado, D. and Mouratidis, H., (2012). Towards the extension of Secure Tropos language to support Software Product Lines development

Jorshari, FZ., Mouratidis, H. and Islam, S., (2012). Extracting security requirements from relevant laws and regulations

Ouedraogo, M., Mouratidis, H., Hecker, A., Bonhomme, C., Khadraoui, D., Dubois, E. and Preston, D., (2011). A new approach to evaluating security assurance

Komoto, T., Taguchi, K., Mouratidis, H., Yoshioka, N. and Futatsugi, K., (2011). A Modelling Framework to Support Internal Control

Zarrabi, F., Mouratidis, H., Preston, D. and Islam, S., (2011). To comply software and IT system development with related laws

Ouedraogo, M., Mouratidis, H., Khadraoui, D. and Dubois, E., (2010). An Agent-Based System to Support Assurance of Security Requirements

Ouedraogo, M., Mouratidis, H., Khadraoui, D. and Dubois, E., (2009). A Risk Based Approach for Security Assurance Evaluation of IT Systems

Ouedraogo, M., Mouratidis, H., Khadraoui, D. and Dubois, E., (2009). Security Assurance Metrics and Aggregation Techniques for IT Systems

Weiss, M. and Mouratidis, H., (2008). Selecting Security Patterns that Fulfill Security Requirements

Ouedraogo, M., Khadraoui, D., De Remont, B., Dubois, E. and Mouratidis, H., (2008). Deployment of a Security Assurance Monitoring Framework for Telecommunication Service Infrastructures on a VoIP Service

Bimrah, KK., Mouratidis, H. and Preston, D., (2008). Modelling Trust Requirements by Means of a Visualization Language

Mouratidis, H., (2008). Curriculum for modelling security: Experiences and lessons learned

Al-Zakwani, A., Brimicombe, A. and Mouratidis, H., (2007). An Agent-Based System to Support Geo-Information Analysis

Beydoun, G., Low, G., Mouratidis, H. and Henderson-Sellers, B., (2007). Modelling MAS-specific security features

Bimrah, KK., Mouratidis, H. and Preston, D., (2007). Information Systems Development: A Trust Ontology

Dehousse, S., Faulkner, S., Mouratidis, H., Kolp, M. and Giorgini, P., (2007). Reasoning About Willingness in Networks of Agents

Al-Zakwani, A., Mouratidis, H. and Brimicombe, A., (2007). A dynamic binding technology for agent-based geo-information systems

Dehousse, S., Liu, L., Faulkner, S., Kolp, M. and Mouratidis, H., (2006). Modeling Delegation through an i*-based Approach

Dehousse, S., Faulkner, S., Mouratidis, H., Giorgini, P. and Kolp, M., (2006). Reasoning about willingness in networks of agents

Faulkner, S., Dehousse, S., Kolp, M., Mouratidis, H. and Giorgini, P., (2005). Delegation Mechanisms for Agent Architectural Design

Mouratidis, H., Kolp, M., Giorgini, P. and Faulkner, S., (2005). A secure architectural description language for agent systems

Mouratidis, H., Giorgini, P. and Manson, G., (2004). Using security attack scenarios to analyse security during information systems design

Mouratidis, H., Manson, G., Gani, A. and Giorgini, P., (2003). Analysing security requirements of information systems using tropos

Mouratidis, H., Giorgini, P. and Manson, G., (2003). An Ontology for Modelling Security: The Tropos Approach

Mouratidis, H., Giorgini, P. and Manson, G., (2003). Modelling secure multiagent systems

Grants and funding

2024

Addressing Hallucinations in Generative AI for customer service applications

Innovate UK (formerly Technology Strategy Board)

PALLETS - Proactive AI-powered soLutions for Logistics Efficiency, Transparency and Safety

Innovate UK (formerly Technology Strategy Board)

2023

Cyber security academic startup accelerator programme (CyberASAP) 2023, year 7: phase 1

Innovate UK (formerly Technology Strategy Board)

Cyber hygiene self-assessment maturity tool

Innovate UK (formerly Technology Strategy Board)

To develop a best-in-class digital portal which enables a secure, seamless self-service experience for Attwells' clients.

Innovate UK (formerly Technology Strategy Board)

To develop the next generation of an existing software package into a highlyinnovative, AI-enabled platform suitable for a first widescale commercialisation.

Innovate UK (formerly Technology Strategy Board)

CyberSecurityAId - A Self-assessment maturity tool for cyber hygiene for small businesses in the agriculture and farming sector

University of Essex

CyberSecurityAId: Empowering Small Businesses with Cyber Hygiene

Innovate UK (formerly Technology Strategy Board)

CyberASAP Phase 2 - AI Privacy Orchestrator

Innovate UK (formerly Technology Strategy Board)

Multilingual and Cross-cultural interactions for context-aware, and bias-controlled dialogue systems for safety-critical applications

European Commission

To embed novel federated learning and micromodel technology into a real-time insights platform.

Innovate UK (formerly Technology Strategy Board)

2022

Cyber Security Incident Handling, Warning and Response System for the European Critical Infrastructures

European Commission

2021

A Dynamic and Self-Organized Artificial Swarm Intelligence Solution for Security and Privacy Threats in Healthcare ICT Infrastructures

European Commission

Contact

h.mouratidis@essex.ac.uk
+44 (0) 1206 872362

Location:

IADS OFFICE PARKSIDE 2C COLCHESTER CAMPUS, Colchester Campus

More about me