Professor Haris Mouratidis
-
Email
h.mouratidis@essex.ac.uk -
Telephone
+44 (0) 1206 872362
-
Location
IADS OFFICE PARKSIDE 2C COLCHESTER CAMPUS, Colchester Campus
Profile
Appointments
University of Essex
-
Director, Institute for Analytics and Data Science (1/10/2021 - present)
-
Professor, School of Computer Science and Electronic Engineering, University of Essex (1/10/2021 - present)
Research and professional activities
Research interests
Security and Privacy Requirements Engineering
My work in this area is focused on the development and precise definition of modelling languages, methodologies and ontologies to support elicitation, modelling and analysis of security, trust, and privacy requirements. I have developed the Secure Tropos methodology, one of the first methodologies in the literature that implements the idea of security and privacy by design and integrates security, privacy and engineering techniques under one methodological approach.
Cybersecurity risk prediction and management
Cyber security risk management plays an important role for today’s businesses due to the rapidly changing threat landscape and the existence of evolving sophisticated cyber attacks. I am interested in developing automated techniques and mechanisms that predict potential risks and support decision making and management of those risks.
Cybersecurity Threat Intelligence
Privacy by Design
Data Security and Privacy
Internet of Things (IoT), 5G/6G and Cloud Computing Security
Current research
Cyber hygiene self-assessment maturity tool (CyberSecurityAId)
We are developing a cyber hygiene self-assessment maturity tool targeted at SMEs. Our tool aims to empower small businesses to improve their cyber defence.
The project is funded by CyberASAP. CyberASAP is aimed at supporting the development of cybersecurity innovations across the UK. CyberASAP is a highly acclaimed programme that has helped teams turn their cybersecurity ideas into successful businesses.
More information about this project
Teaching and supervision
Current supervision
Publications
Journal articles (80)
Sánchez, LE., Santos-Olmo, A., Rosado, DG., Blanco, C., Serrano, MA., Mouratidis, H. and Fernández-Medina, E., (2025). MARISMA: A modern and context-aware framework for assessing and managing information cybersecurity risks. Computer Standards and Interfaces. 92, 103935-103935
Santos-Olmo, A., Sánchez, LE., Rosado, DG., Serrano, MA., Blanco, C., Mouratidis, H. and Fernández-Medina, E., (2024). Towards an integrated risk analysis security framework according to a systematic analysis of existing proposals. Frontiers of Computer Science. 18 (3)
Fotis, T., Kioskli, K., Sundaralingam, A., Fasihi, A. and Mouratidis, H., (2023). Co-creation in a digital health living lab: A case study.. Frontiers in Public Health. 10, 892930-
Mouratidis, H., Islam, S., Santos-Olmo, A., Sanchez, LE. and Ismail, UM., (2023). Modelling Language for Cyber Security Incident Handling for Critical Infrastructures. Computers and Security. 128, 103139-103139
Kioskli, K., Fotis, T., Nifakos, S. and Mouratidis, H., (2023). The Importance of Conceptualising the Human-Centric Approach in Maintaining and Promoting Cybersecurity-Hygiene in Healthcare 4.0. Applied Sciences. 13 (6), 3410-3410
Selvarajan, S. and Mouratidis, H., (2023). A quantum trust and consultative transaction-based blockchain cybersecurity model for healthcare systems. Scientific Reports. 13 (1), 7107-
Selvarajan, S. and Mouratidis, H., (2023). Author Correction: A quantum trust and consultative transaction-based blockchain cybersecurity model for healthcare systems. Scientific Reports. 13 (1), 9409-
Sánchez, LE., Santos-Olmo, A., Mouratidis, H. and Fernández-Medina, E., (2023). New Frontiers in Security Risk Management. IT Professional. 25 (3), 61-67
Kure, HI., Islam, S. and Mouratidis, H., (2022). An integrated cyber security risk management framework and risk predication for the critical infrastructure protection. Neural Computing and Applications. 34 (18), 15241-15271
Adee, R. and Mouratidis, H., (2022). A Dynamic Four-Step Data Security Model for Data in Cloud Computing Based on Cryptography and Steganography. Sensors. 22 (3), 1109-1109
Rosado, D., Santos Olmo, A., Sanchez, LE., Serrano, M., Blanco, C., Mouratidis, H. and Fernandez-Medina, E., (2022). Managing cybersecurity risks of cyber-physical systems: The MARISMA-CPS pattern. Computers in Industry. 142, 103715-103715
Kioskli, K., Dellagiacoma, D., Fotis, T. and Mouratidis, H., (2022). The supply chain of a Living Lab: Modelling security, privacy, and vulnerability issues alongside with their impact and potential mitigation strategies. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 13 (2), 147-182
Zardari, S., Alam, S., Al Salem, HA., Al Reshan, MS., Shaikh, A., Malik, AFK., Masood ur Rehman, M. and Mouratidis, H., (2022). A Comprehensive Bibliometric Assessment on Software Testing (2016–2021). Electronics. 11 (13), 1984-1984
Islam, S., Abba, A., Ismail, U., Mouratidis, H. and Papastergiou, S., (2022). Vulnerability prediction for secure healthcare supply chain service delivery. Integrated Computer Aided Engineering. 29 (4), 389-409
Alam, S., Zardari, S., Noor, S., Ahmed, S. and Mouratidis, H., (2022). Trust Management in Social Internet of Things (SIoT): A Survey. IEEE Access. 10, 108924-108954
Piras, L., Al-Obeidallah, MG., Pavlidis, M., Mouratidis, H., Tsohou, A., Magkos, E. and Praitano, A., (2021). A Data Scope Management Service to Support Privacy by Design and GDPR Compliance. Journal of Data Intelligence. 2 (2), 136-165
Papastergiou, S., Mouratidis, H. and Kalogeraki, E-M., (2021). Handling of advanced persistent threats and complex incidents in healthcare, transportation and energy ICT infrastructures. Evolving Systems. 12 (1), 91-108
Tsohou, A., Magkos, E., Mouratidis, H., Chrysoloras, G., Piras, L., Pavlidis, M., Debussche, J., Rotoloni, M. and Gallego-Nicasio Crespo, B., (2020). Privacy, security, legal and technology acceptance elicited and consolidated requirements for a GDPR compliance platform. Information & Computer Security. 28 (4), 531-553
Mouratidis, H., Shei, S. and Delaney, A., (2020). A security requirements modelling language for cloud computing environments. Software and Systems Modeling. 19 (2), 271-295
Salnitri, M., Angelopoulos, K., Pavlidis, M., Diamantopoulou, V., Mouratidis, H. and Giorgini, P., (2020). Modelling the interplay of security, privacy and trust in sociotechnical systems: a computer-aided design approach. Software and Systems Modeling. 19 (2), 467-491
Argyropoulos, N., Mouratidis, H. and Fish, A., (2020). Enhancing secure business process design with security process patterns. Software and Systems Modeling. 19 (3), 555-577
Polatidis, N., Pimenidis, E., Pavlidis, M., Papastergiou, S. and Mouratidis, H., (2020). From product recommendation to cyber-attack prediction: generating attack graphs and predicting future attacks. Evolving Systems. 11 (3), 479-490
de Carvalho, RM., Del Prete, C., Martin, YS., Araujo Rivero, RM., Önen, M., Schiavo, FP., Rumín, ÁC., Mouratidis, H., Yelmo, JC. and Koukovini, MN., (2020). Protecting Citizens’ Personal Data and Privacy: Joint Effort from GDPR EU Cluster Research Projects. SN Computer Science. 1 (4)
Diamantopoulou, V. and Mouratidis, H., (2019). Practical evaluation of a reference architecture for the management of privacy level agreements. Information & Computer Security. 27 (5), 711-730
Schauer, S., Polemi, N. and Mouratidis, H., (2019). Correction to: MITIGATE: a dynamic supply chain cyber risk assessment methodology. Journal of Transportation Security. 12 (1-2), 37-37
Schauer, S., Polemi, N. and Mouratidis, H., (2019). MITIGATE: a dynamic supply chain cyber risk assessment methodology. Journal of Transportation Security. 12 (1-2), 1-35
Mavropoulos, O., Mouratidis, H., Fish, A. and Panaousis, E., (2019). Apparatus: A framework for security analysis in internet of things systems. Ad Hoc Networks. 92, 101743-101743
Pimenidis, E., Polatidis, N. and Mouratidis, H., (2019). Mobile recommender systems: Identifying the major concepts. Journal of Information Science. 45 (3), 387-397
Diamantopoulou, V. and Mouratidis, H., (2018). Applying the physics of notation to the evaluation of a security and privacy requirements engineering methodology. Information & Computer Security. 26 (4), 382-400
Argyropoulos, N., Angelopoulos, K., Mouratidis, H. and Fish, A., (2018). Risk-aware decision support with constrained goal models. Information & Computer Security. 26 (4), 472-490
Kalogeraki, E-M., Papastergiou, S., Mouratidis, H. and Polemi, N., (2018). A Novel Risk Assessment Methodology for SCADA Maritime Logistics Environments. Applied Sciences. 8 (9), 1477-1477
Islam, S., Ouedraogo, M., Kalloniatis, C., Mouratidis, H. and Gritzalis, S., (2018). Assurance of Security and Privacy Requirements for Cloud Deployment Models. IEEE Transactions on Cloud Computing. 6 (2), 387-400
Mouratidis, H. and Diamantopoulou, V., (2018). A Security Analysis Method for Industrial Internet of Things. IEEE Transactions on Industrial Informatics. 14 (9), 4093-4100
Polatidis, N., Pavlidis, M. and Mouratidis, H., (2018). Cyber-attack path discovery in a dynamic supply chain maritime risk management system. Computer Standards & Interfaces. 56, 74-82
Mavropoulos, O., Mouratidis, H., Fish, A., Panaousis, E. and Kalloniatis, C., (2017). A conceptual model to support security analysis in the internet of things. Computer Science and Information Systems. 14 (2), 557-578
Georgiadis, CK., Polatidis, N., Mouratidis, H. and Pimenidis, E., (2017). A method for privacy-preserving collaborative filtering recommendations. Journal of Universal Computer Science. 23 (2), 146-166
Polatidis, N., Georgiadis, CK., Pimenidis, E. and Mouratidis, H., (2017). Privacy-preserving collaborative recommendations based on random perturbations. Expert Systems with Applications. 71, 18-25
Simou, S., Kalloniatis, C., Gritzalis, S. and Mouratidis, H., (2016). A survey on cloud forensics challenges and solutions. Security and Communication Networks. 9 (18), 6285-6314
Naskos, A., Gounaris, A., Mouratidis, H. and Katsaros, P., (2016). Online Analysis of Security Risks in Elastic Cloud Applications. IEEE Cloud Computing. 3 (5), 26-33
Márquez, L., G. Rosado, D., Mouratidis, H. and Fernandez Medina, E., (2016). Design Activity in the Process of Migrating Security Features to Cloud. IEEE Latin America Transactions. 14 (6), 2846-2852
Alavi, R., Islam, S. and Mouratidis, H., (2016). An information security risk-driven investment model for analysing human factors. Information & Computer Security. 24 (2), 205-227
Rebollo, O., Mellado, D., Fernández-Medina, E. and Mouratidis, H., (2015). Empirical evaluation of a cloud computing information security governance framework. Information and Software Technology. 58, 44-57
Kavakli, E., Kalloniatis, C., Mouratidis, H. and Gritzalis, S., (2015). Privacy as an Integral Part of the Implementation of Cloud Solutions. The Computer Journal. 58 (10), 2213-2224
Mellado, D., Mouratidis, H. and Fernández-Medina, E., (2014). Secure Tropos framework for software product lines requirements engineering. Computer Standards & Interfaces. 36 (4), 711-722
Kalloniatis, C., Mouratidis, H., Vassilis, M., Islam, S., Gritzalis, S. and Kavakli, E., (2014). Towards the design of secure and privacy-oriented information systems in the cloud: Identifying the major concepts. Computer Standards & Interfaces. 36 (4), 759-775
Islam, S., Mouratidis, H. and Weippl, ER., (2014). An empirical study on the implementation and evaluation of a goal-driven software development risk management model. Information and Software Technology. 56 (2), 117-133
Pavlidis, M., Islam, S., Mouratidis, H. and Kearney, P., (2014). Modeling Trust Relationships for Developing Trustworthy Information Systems. International Journal of Information System Modeling and Design. 5 (1), 25-48
Kalloniatis, C., Mouratidis, H. and Islam, S., (2013). Evaluating cloud deployment scenarios based on security and privacy requirements. Requirements Engineering. 18 (4), 299-319
Ouedraogo, M. and Mouratidis, H., (2013). Selecting a Cloud Service Provider in the age of cybercrime. Computers & Security. 38, 3-13
Mouratidis, H., Islam, S., Kalloniatis, C. and Gritzalis, S., (2013). A framework to support selection of cloud providers based on security and privacy requirements. Journal of Systems and Software. 86 (9), 2276-2293
Ouedraogo, M., Savola, RM., Mouratidis, H., Preston, D., Khadraoui, D. and Dubois, E., (2013). Taxonomy of quality metrics for assessing assurance of security correctness. Software Quality Journal. 21 (1), 67-97
Mouratidis, H., Kalloniatis, C., Islam, S., Huget, MP. and Gritzalis, S., (2012). Aligning security and privacy to support the development of secure information systems. Journal of Universal Computer Science. 18 (12), 1608-1627
Ouedraogo, M., Khadraoui, D., Mouratidis, H. and Dubois, E., (2012). Appraisal and reporting of security assurance at operational systems level. Journal of Systems and Software. 85 (1), 193-208
Mouratidis, H., (2012). Preface. Information Systems. 37 (8), 713-713
Matulevičius, R., Mouratidis, H., Mayer, N., Dubois, E. and Heymans, P., (2012). Syntactic and semantic extensions to Secure Tropos to support security risk management. Journal of Universal Computer Science. 18 (6), 816-844
Mouratidis, H., (2011). Secure Software Systems Engineering: The Secure Tropos Approach (Invited Paper). Journal of Software. 6 (3), 331-339
(2011). Software Engineering for Secure Systems. Software Engineering for Secure Systems: Industrial and Research Perspectives, 1-370
Islam, S., Mouratidis, H. and Jürjens, J., (2011). A framework to support alignment of secure software engineering with legal regulations. Software & Systems Modeling. 10 (3), 369-394
Mouratidis, H., Kolp, M., Giorgini, P. and Faulkner, S., (2010). An architectural description language for secure Multi-Agent Systems. Web Intelligence and Agent Systems: An International Journal. 8 (1), 99-122
Mouratidis, H. and Cofta, P., (2010). Practitioner's challenges in designing trust into online systems. Journal of theoretical and applied electronic commerce research. 5 (3), 65-77
Dubois, E. and Mouratidis, H., (2010). Guest editorial: security requirements engineering: past, present and future. Requirements Engineering. 15 (1), 1-5
Mouratidis, H. and Jurjens, J., (2010). From goal-driven security requirements engineering to secure design. International Journal of Intelligent Systems. 25 (8), 813-840
Low, G., Mouratidis, H. and Henderson-Sellers, B., (2010). Using a Situational Method Engineering Approach to Identify Reusable Method Fragments from the Secure TROPOS Methodology.. The Journal of Object Technology. 9 (4), 93-93
Beydoun, G., Low, G., Henderson-Sellers, B., Mouratidis, H., Gomez-Sanz, JJ., Pavon, J. and Gonzalez-Perez, C., (2009). FAML: A Generic Metamodel for MAS Development. IEEE Transactions on Software Engineering. 35 (6), 841-863
Beydoun, G., Low, G., Mouratidis, H. and Henderson-Sellers, B., (2009). A security-aware metamodel for multi-agent systems (MAS). Information and Software Technology. 51 (5), 832-845
Mouratidis, H., Jahankhani, H. and Nkhoma, MZ., (2008). Management versus security specialists: an empirical study on security related perceptions. Information Management & Computer Security. 16 (2), 187-205
Mouratidis, H. and Giorgini, P., (2007). Security Attack Testing (SAT)—testing the security of information systems at design time. Information Systems. 32 (8), 1166-1183
MOURATIDIS, H. and GIORGINI, P., (2007). SECURE TROPOS: A SECURITY-ORIENTED EXTENSION OF THE TROPOS METHODOLOGY. International Journal of Software Engineering and Knowledge Engineering. 17 (02), 285-309
Jahankhani, H., Fernando, S., Nkhoma, MZ. and Mouratidis, H., (2007). Information Systems Security. International Journal of Information Security and Privacy. 1 (3), 13-25
Mouratidis, H., (2007). Secure information systems engineering: a manifesto. International Journal of Electronic Security and Digital Forensics. 1 (1), 27-27
MOURATIDIS, H., WEISS, M. and GIORGINI, P., (2006). MODELING SECURE SYSTEMS USING AN AGENT-ORIENTED APPROACH AND SECURITY PATTERNS. International Journal of Software Engineering and Knowledge Engineering. 16 (03), 471-498
Mouratidis, H. and Weiss, M., (2006). Patterns for Modelling Agent Systems with Tropos. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3914 LNCS, 207-223
Mouratidis, H., (2005). Safety and Security in Multiagent Systems: Report on the 2nd SASEMAS workshop (SASEMAS'05). Computers & Security. 24 (8), 614-617
Mouratidis, H., Giorgini, P. and Manson, G., (2005). When security meets software engineering: a case of modelling secure information systems. Information Systems. 30 (8), 609-629
Bresciani, P., Giorgini, P., Mouratidis, H. and Manson, G., (2004). Multi-agent Systems and Security Requirements Analysis. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2940, 35-48
Mouratidis, H., Giorgini, P. and Manson, G., (2003). Integrating Security and Systems Engineering: Towards the Modelling of Secure Information Systems. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2681, 63-78
Poggi, A., Rimassa, G., Turci, P., Odell, J., Mouratidis, H. and Manson, G., (2003). Modeling deployment and mobility issues in multiagent systems using AUML. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2935, 69-84
Mouratidis, H., Manson, G. and Philp, I., (2003). A Novel Agent-Based System to Support the Single Assessment Process of Older People. Health Informatics Journal. 9 (3), 149-162
Mouratidis, H., Manson, G. and Philp, I., (2003). Analysis and Design of the eSAP: An Integrated Health and Social Care Information System. Health Informatics Journal. 9 (2), 89-92
Gani, A., Mouratidis, H., Abouzakhar, NS. and Manson, GA., (2002). Developing an intelligent user manager system for controlling smart school network resources. Malaysian Journal of Computer Science. 15 (2), 56-69
Books (15)
Guizzardi, G., Santoro, F., Mouratidis, H. and Soffer, P., (2024). Preface
Nurcan, S., Opdahl, AL., Mouratidis, H. and Tsohou, A., (2023). Preface
Salnitri, M., Mouratidis, H., Mancini, L. and Giorgini, P., (2020). Preface
Salnitri, M., Jürjens, J., Mouratidis, H., Mancini, L. and Giorgini, P., (2020). Correction to: Visual Privacy Management. Springer International Publishing. 9783030599430
Furnell, S., Mouratidis, H. and Pernul, G., (2018). Preface
Krogstie, J., Mouratidis, H. and Su, J., (2016). Preface
(2014). Advanced Information Systems Engineering Workshops. Springer International Publishing. 9783319078687
(2014). Advanced Information Systems Engineering. Springer International Publishing. 9783319078809
(2013). Advanced Information Systems Engineering Workshops. Springer Berlin Heidelberg. 9783642384899
Lammari, N., Rosado, DG. and Mouratidis, H., (2012). Workshop on Information Systems Security Engineering: WISSE
Rolland, C. and Mouratidis, H., (2011). Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface
Rolland, C. and Mouratidis, H., (2011). Preface
Barley, M., Mouratidis, H., Spears, D. and Unruh, A., (2009). Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface
Kolp, M., Henderson-Sellers, B., Mouratidis, H., Garcia, A., Ghose, A. and Bresciani, P., (2008). Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface
(2007). Integrating Security and Software Engineering. IGI Global. 9781599041476
Book chapters (24)
Gharib, M., Giorgini, P., Salnitri, M., Paja, E., Mouratidis, H., Pavlidis, M. and Ruiz, JF., (2020). A Holistic Approach for Privacy Requirements Analysis: An Industrial Case Study. In: Lecture Notes in Computer Science. Springer International Publishing. 22- 53. 9783030599430
Peldszus, S., Ahmadian, AS., Salnitri, M., Jürjens, J., Pavlidis, M. and Mouratidis, H., (2020). Visual Privacy Management. In: Lecture Notes in Computer Science. Springer International Publishing. 77- 108. 9783030599430
Ahmadian, AS., Peldszus, S., Jürjens, J., Salnitri, M., Giorgini, P., Mouratidis, H. and Ruiz, JF., (2020). The Architecture of VisiOn Privacy Platform. In: Lecture Notes in Computer Science. Springer International Publishing. 54- 76. 9783030599430
Pavlidis, M., Islam, S., Mouratidis, H. and Kearney, P., (2017). Modeling Trust Relationships for Developing Trustworthy Information Systems. In: Computer Systems and Software Engineering. IGI Global. 1632- 1655
Mouratidis, H., Argyropoulos, N. and Shei, S., (2016). Security Requirements Engineering for Cloud Computing: The Secure Tropos Approach. In: Domain-Specific Conceptual Modeling. Springer International Publishing. 357- 380. 9783319394169
Islam, S., Mouratidis, H. and Weippl, ER., (2013). A Goal-Driven Risk Management Approach to Support Security and Privacy Analysis of Cloud-Based System. In: Security Engineering for Cloud Computing. IGI Global. 97- 122
Ouedraogo, M., Mouratidis, H., Dubois, E. and Khadraoui, D., (2013). Security Assurance Evaluation and IT Systems’ Context of Use Security Criticality. In: Mobile and Handheld Computing Solutions for Organizations and End-Users. IGI Global. 70- 91
Nhlabatsi, A., Bandara, A., Hayashi, S., Haley, C., Jurjens, J., Kaiya, H., Kubo, A., Laney, R., Mouratidis, H., Nuseibeh, B., Tun, T., Washizaki, H., Yoshioka, N. and Yu, Y., (2011). Security Patterns. In: Software Engineering for Secure Systems. IGI Global. 75- 111
Ouedraogo, M., Mouratidis, H., Dubois, E. and Khadraoui, D., (2010). Information Systems Security Criticality and Assurance Evaluation. In: Lecture Notes in Computer Science. Springer Berlin Heidelberg. 38- 54. 9783642135767
Nhlabatsi, A., Bandara, A., Hayashi, S., Haley, CB., Jurjens, J., Kaiya, H., Kubo, A., Laney, R., Mouratidis, H., Nuseibeh, B., Tun, TT., Washizaki, H., Yoshioka, N. and Yu, Y., (2010). Security patterns: Comparing modeling approaches. In: Software Engineering for Secure Systems: Industrial and Research Perspectives. 75- 111
Islam, S., Mouratidis, H. and Wagner, S., (2010). Towards a Framework to Elicit and Manage Security and Privacy Requirements from Laws and Regulations. In: Lecture Notes in Computer Science. Springer Berlin Heidelberg. 255- 261. 9783642141911
JAHANKHANI, H., NKHOMA, MZ. and MOURATIDIS, H., (2010). SECURITY RISK MANAGEMENT STRATEGY. In: Handbook of Electronic Security and Digital Forensics. WORLD SCIENTIFIC. 237- 262. 9789812837035
MOURATIDIS, H., (2010). SECURE BY DESIGN: CONSIDERING SECURITY FROM THE EARLY STAGES OF THE INFORMATION SYSTEMS DEVELOPMENT. In: Handbook of Electronic Security and Digital Forensics. WORLD SCIENTIFIC. 115- 132. 9789812837035
Bimrah, KK., Mouratidis, H. and Preston, D., (2009). A Language for Modelling Trust in Information Systems. In: Information Systems Development. Springer US. 599- 608. 9780387848099
Mouratidis, H. and Giorgini, P., (2009). Enhancing Secure Tropos to Effectively Deal with Security Requirements in the Development of Multiagent Systems. In: Lecture Notes in Computer Science. Springer Berlin Heidelberg. 8- 26. 9783642048784
Mouratidis, H., Sunyaev, A. and Jurjens, J., (2009). Secure Information Systems Engineering: Experiences and Lessons Learned from Two Health Care Projects. In: Notes on Numerical Fluid Mechanics and Multidisciplinary Design. Springer International Publishing. 231- 245. 9783319981765
Matulevičius, R., Mayer, N., Mouratidis, H., Dubois, E., Heymans, P. and Genon, N., (2008). Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development. In: Notes on Numerical Fluid Mechanics and Multidisciplinary Design. Springer International Publishing. 541- 555. 9783319981765
Giorgini, P., Mouratidis, H. and Zannone, N., (2007). Modelling Security and Trust with Secure Tropos. In: Integrating Security and Software Engineering. IGI Global. 160- 189
Mouratidis, H. and Giorgini, P., (2007). Integrating Security and Software Engineering. In: Integrating Security and Software Engineering. IGI Global. 1- 15
Mouratidis, H. and Giorgini, P., (2007). Integrating Security and Software Engineering. In: Integrating Security and Software Engineering. IGI Global. 271- 275
Mouratidis, H., Jürjens, J. and Fox, J., (2006). Towards a Comprehensive Framework for Secure Systems Development. In: Notes on Numerical Fluid Mechanics and Multidisciplinary Design. Springer International Publishing. 48- 62. 3-540-34652-X. 9783319981765
Mouratidis, H. and Giorgini, P., (2006). Integrating security and software engineering: Future vision and challenges. In: Integrating Security and Software Engineering: Advances and Future Visions. 271- 275
Mouratidis, H. and Giorgini, P., (2006). Integrating security and software engineering: An introduction. In: Integrating Security and Software Engineering: Advances and Future Visions. 1- 14
Mouratidis, H., Weiss, M. and Giorgini, P., (2005). Security Patterns Meet Agent Oriented Software Engineering: A Complementary Solution for Developing Secure Information Systems. In: Lecture Notes in Computer Science. Springer Berlin Heidelberg. 225- 240. 3-540-29389-2. 9783540293897
Conferences (95)
Khaled, AA., Hasan, MM., Islam, S., Papastergiou, S. and Mouratidis, H., (2024). Synthetic Data Generation and Impact Analysis of Machine Learning Models for Enhanced Credit Card Fraud Detection
Basheer, N., Pranggono, B., Islam, S., Papastergiou, S. and Mouratidis, H., (2024). Enhancing Malware Detection Through Machine Learning Using XAI with SHAP Framework
Heydari, M., Mouratidis, H. and Tafreshi, VHF., (2023). OntoCyrene: Towards Ontology-Enhanced Asset Modelling for Supply Chains in the Context of Cyber Security
Al-Obeidallah, M., Piras, L., Iloanugo, O., Mouratidis, H., Alkubaisy, D. and Dellagiacoma, D., (2023). Goal-Modeling Privacy-by-Design Patterns for Supporting GDPR Compliance
Alkubaisy, D., Piras, L., Al-Obeidallah, MG., Cox, K. and Mouratidis, H., (2022). A Framework for Privacy and Security Requirements Analysis and Conflict Resolution for Supporting GDPR Compliance Through Privacy-by-Design
Kioskli, K., Fotis, T. and Mouratidis, H., (2021). The landscape of cybersecurity vulnerabilities and challenges in healthcare: Security standards and paradigm shift recommendations
Islam, S., Mouratidis, H. and Mahmud, H., (2021). An Automated Tool to Support an Intelligence Learner Management System Using Learning Analytics and Machine Learning
Yeboah-Ofori, A., Mouratidis, H., Ismai, U., Islam, S. and Papastergiou, S., (2021). Cyber Supply Chain Threat Analysis and Prediction Using Machine Learning and Ontology
Islam, S., Papastergiou, S. and Mouratidis, H., (2021). A Dynamic Cyber Security Situational Awareness Framework for Healthcare ICT Infrastructures
Alkubaisy, D., Piras, L., Al-Obeidallah, MG., Cox, K. and Mouratidis, H., (2021). ConfIs: A Tool for Privacy and Security Analysis and Conflict Resolution for Supporting GDPR Compliance through Privacy-by-Design
Skrbic, S., Sakellari, G. and Mouratidis, H., (2021). Welcome Message from the SecRS Workshop Organizers
Mouratidis, H., Zdravkovic, J. and Stirna, J., (2020). Cyber Security Resilience in Business Informatics: An Exploratory Paper
Piras, L., Al-Obeidallah, MG., Pavlidis, M., Mouratidis, H., Tsohou, A., Magkos, E., Praitano, A., Iodice, A. and Crespo, BG-N., (2020). DEFeND DSM: A Data Scope Management Service for Model-Based Privacy by Design GDPR Compliance
Athinaiou, M., Mouratidis, H., Fotis, T. and Pavlidis, M., (2020). A Conceptual Redesign of a Modelling Language for Cyber Resiliency of Healthcare Systems
Tsohou, A., Magkos, M., Mouratidis, H., Chrysoloras, G., Piras, L., Pavlidis, M., Debussche, J., Rotoloni, M. and Crespo, BG-N., (2020). Privacy, Security, Legal and Technology Acceptance Requirements for a GDPR Compliance Platform
Naik, N., Jenkins, P., Gillett, J., Mouratidis, H., Naik, K. and Song, J., (2019). Lockout-Tagout Ransomware: A Detection Method for Ransomware using Fuzzy Hashing and Clustering
Abubakar, BA. and Mouratidis, H., (2019). Multi-Tenancy Cloud-Enabled Small Cell Security
Piras, L., Al-Obeidallah, MG., Praitano, A., Tsohou, A., Mouratidis, H., Gallego-Nicasio Crespo, B., Bernard, JB., Fiorani, M., Magkos, E., Sanz, AC., Pavlidis, M., D’Addario, R. and Zorzino, GG., (2019). DEFeND Architecture: A Privacy by Design Platform for GDPR Compliance
Alkubaisy, D., Cox, K. and Mouratidis, H., (2019). Towards Detecting and Mitigating Conflicts for Privacy and Security Requirements
Papastergiou, S., Mouratidis, H. and Kalogeraki, E-M., (2019). Cyber Security Incident Handling, Warning and Response System for the European Critical Information Infrastructures (CyberSANE)
Athinaiou, M., Mouratidis, H., Fotis, T., Pavlidis, M. and Panaousis, E., (2018). Towards the Definition of a Security Incident Response Modelling Language
Diamantopoulou, V., Pavlidis, M. and Mouratidis, H., (2018). Evaluation of a Security and Privacy Requirements Methodology Using the Physics of Notation
Argyropoulos, N., Angelopoulos, K., Mouratidis, H. and Fish, A., (2018). Decision-Making in Security Requirements Engineering with Constrained Goal Models
Diamantopoulou, V., Angelopoulos, K., Pavlidis, M. and Mouratidis, H., (2017). A metamodel for GDPR-based privacy level agreements
Diamantopoulou, V., Angelopoulos, K., Flake, J., Praitano, A., Ruiz, JF., Jürjens, J., Pavlidis, M., Bonutto, D., Sanz, AC., Mouratidis, H., Robles, JG. and Tozzi, AE., (2017). Privacy Data Management and Awareness for Public Administrations: A Case Study from the Healthcare Domain
Naskos, A., Gounaris, A., Mouratidis, H. and Katsaros, P., (2017). Security-aware elasticity for NoSQL databases in multi-cloud environments
Angelopoulos, K., Diamantopoulou, V., Mouratidis, H., Pavlidis, M., Salnitri, M., Giorgini, P. and Ruiz, JF., (2017). A Holistic Approach for Privacy Protection in E-Government
Argyropoulos, N., Mouratidis, H. and Fish, A., (2017). Attribute-Based Security Verification of Business Process Models
Vassilakis, VG., Mouratidis, H., Panaousis, E., Moscholios, ID. and Logothetis, MD., (2017). Security requirements modelling for virtualized 5G small cell networks
Pavlidis, M., Mouratidis, H., Panaousis, E. and Argyropoulos, N., (2017). Selecting Security Mechanisms in Secure Tropos
Neokosmidis, I., Rokkas, T., Chochliouros, IP., Goratti, L., Mouratidis, H., Nasr, KM., Vahid, S., Moessner, K., Albanese, A., Crosta, PS. and Paglierani, P., (2017). Are Small Cells and Network Intelligence at the Edge the Drivers for 5G Market Adoption? The SESAME Case
Mavropoulos, O., Mouratidis, H., Fish, A. and Panaousis, E., (2017). ASTo: A tool for security analysis of IoT systems
Polatidis, N., Pimenidis, E., Pavlidis, M. and Mouratidis, H., (2017). Recommender Systems Meeting Security: From Product Recommendation to Cyber-Attack Prediction
(2017). [Front cover]
Shei, S., Mouratidis, H. and Delaney, A., (2017). A Security Requirements Modelling Language to Secure Cloud Computing Environments
Argyropoulos, N., Mouratidis, H. and Fish, A., (2017). Supporting Secure Business Process Design via Security Process Patterns
Argyropoulos, N., Shei, S., Kalloniatis, C., Mouratidis, H., Delaney, A., Fish, A. and Gritzalis, S., (2017). A semi-automatic approach for eliciting cloud security and privacy requirements
Diamantopoulou, V., Pavlidis, M. and Mouratidis, H., (2017). Privacy level agreements for public administration information systems
Diamantopoulou, V., Kalloniatis, C., Gritzalis, S. and Mouratidis, H., (2017). Supporting Privacy by Design Using Privacy Process Patterns
Sprovieri, D., Argyropoulos, N., Souveyet, C., Mazo, R., Mouratidis, H. and Fish, A., (2016). Security Alignment Analysis of Software Product Lines
Gharib, M., Salnitri, M., Paja, E., Giorgini, P., Mouratidis, H., Pavlidis, M., Ruiz, JF., Fernandez, S. and Siria, AD., (2016). Privacy Requirements: Findings and Lessons Learned in Developing a Privacy Platform
Vassilakis, V., Panaousis, E. and Mouratidis, H., (2016). Security Challenges of Small Cell as a Service in Virtualized Mobile Edge Computing Environments
Argyropoulos, N., Kalloniatis, C., Mouratidis, H. and Fish, A., (2016). Incorporating privacy patterns into semi-automatic business process derivation
Simou, S., Kalloniatis, C., Mouratidis, H. and Gritzalis, S., (2016). Towards a Model-Based Framework for Forensic-Enabled Cloud Information Systems
Shei, S., Kalloniatis, C., Mouratidis, H. and Delaney, A., (2016). Modelling Secure Cloud Computing Systems from a Security Requirements Perspective
Giannoulakis, I., Xylouris, G., Kafetzakis, E., Kourtis, A., Fajardo, JO., Khodashenas, PS., Albanese, A., Mouratidis, H. and Vassilakis, V., (2016). System architecture and deployment scenarios for SESAME: Small cEllS coodinAtion for Multi-tenancy and Edge services
Mavropoulos, O., Mouratidis, H., Fish, A., Panaousis, E. and Kalloniatis, C., (2016). Apparatus: Reasoning About Security Requirements in the Internet of Things
Pavlidis, M., Mouratidis, H., Gonzalez-Perez, C. and Kalloniatis, C., (2016). Addressing Privacy and Trust Issues in Cultural Heritage Modelling
Simou, S., Kalloniatis, C., Mouratidis, H. and Gritzalis, S., (2016). A Meta-model for Assisting a Cloud Forensics Process
Alavi, R., Islam, S., Mouratidis, H. and Lee, S., (2015). Managing social engineering attacks-Considering human factors and security investment
Shei, S., Delaney, A., Kapetanakis, S. and Mouratidis, H., (2015). Visually Mapping Requirements Models to Cloud Services
Ismail, UM., Islam, S. and Mouratidis, H., (2015). Cloud Security Audit for Migration and Continuous Monitoring
Shei, S., Alcaniz, LM., Mouratidis, H., Delaney, A., Rosado, DG. and Fernandez-Medina, E., (2015). Modelling secure cloud systems based on system requirements
Argyropoulos, N., Márquez Alcañiz, L., Mouratidis, H., Fish, A., Rosado, DG., de Guzmán, IG-R. and Fernández-Medina, E., (2015). Eliciting Security Requirements for Business Processes of Legacy Systems
Argyropoulos, N., Mouratidis, H. and Fish, A., (2015). Towards the Derivation of Secure Business Process Designs
Naskos, A., Gounaris, A., Mouratidis, H. and Katsaros, P., (2015). Security-Aware Elasticity for NoSQL Databases
Ganji, D., Mouratidis, H., Gheytassi, SM. and Petridis, M., (2015). Conflicts Between Security and Privacy Measures in Software Requirements Engineering
Ismail, UM., Islam, S. and Mouratidis, H., (2015). A Framework for Cloud Security Audit
Alavi, R., Islam, S. and Mouratidis, H., (2015). Human Factors of Social Engineering Attacks (SEAs) in Hybrid Cloud Environment: Threats and Risks
Simou, S., Kalloniatis, C., Mouratidis, H. and Gritzalis, S., (2015). Towards the Development of a Cloud Forensics Methodology: A Conceptual Model
Márquez, L., Rosado, DG., Mouratidis, H., Mellado, D. and Fernández-Medina, E., (2015). A Framework for Secure Migration Processes of Legacy Systems to the Cloud
Alavi, R., Islam, S. and Mouratidis, H., (2014). A Conceptual Framework to Analyze Human Factors of Information Security Management System (ISMS) in Organizations
Kalloniatis, C., Manousakis, V., Mouratidis, H. and Gritzalis, S., (2013). Migrating into the Cloud: Identifying the Major Security and Privacy Concerns
Souag, A., Salinesi, C., Wattiau, I. and Mouratidis, H., (2013). Using Security and Domain Ontologies for Security Requirements Analysis
Pavlidis, M., Mouratidis, H., Kalloniatis, C., Islam, S. and Gritzalis, S., (2013). Trustworthy Selection of Cloud Providers Based on Security and Privacy Requirements: Justifying Trust Assumptions
Pavlidis, M., Kavakli, E., Bantimaroudis, P., Mouratidis, H., Kalloniatis, C. and Gritzalis, S., (2013). The role of trust in the development and adoption of cultural internet-based systems
Ahmed, N., Matulevičius, R. and Mouratidis, H., (2012). A model transformation from misuse cases to secure tropos
Zarrabi, F., Pavlidis, M., Mouratidis, H., Islam, S. and Preston, D., (2012). A Meta-model for Legal Compliance and Trustworthiness of Information Systems
Pavlidis, M., Islam, S. and Mouratidis, H., (2012). A CASE Tool to Support Automated Modelling and Analysis of Security Requirements, Based on Secure Tropos
Pavlidis, M., Mouratidis, H., Islam, S. and Kearney, P., (2012). Dealing with trust and control: A meta-model for trustworthy information systems development
Mellado, D. and Mouratidis, H., (2012). Towards the extension of Secure Tropos language to support Software Product Lines development
Jorshari, FZ., Mouratidis, H. and Islam, S., (2012). Extracting security requirements from relevant laws and regulations
Ouedraogo, M., Mouratidis, H., Hecker, A., Bonhomme, C., Khadraoui, D., Dubois, E. and Preston, D., (2011). A new approach to evaluating security assurance
Komoto, T., Taguchi, K., Mouratidis, H., Yoshioka, N. and Futatsugi, K., (2011). A Modelling Framework to Support Internal Control
Zarrabi, F., Mouratidis, H., Preston, D. and Islam, S., (2011). To comply software and IT system development with related laws
Ouedraogo, M., Mouratidis, H., Khadraoui, D. and Dubois, E., (2010). An Agent-Based System to Support Assurance of Security Requirements
Ouedraogo, M., Mouratidis, H., Khadraoui, D. and Dubois, E., (2009). A Risk Based Approach for Security Assurance Evaluation of IT Systems
Ouedraogo, M., Mouratidis, H., Khadraoui, D. and Dubois, E., (2009). Security Assurance Metrics and Aggregation Techniques for IT Systems
Weiss, M. and Mouratidis, H., (2008). Selecting Security Patterns that Fulfill Security Requirements
Ouedraogo, M., Khadraoui, D., De Remont, B., Dubois, E. and Mouratidis, H., (2008). Deployment of a Security Assurance Monitoring Framework for Telecommunication Service Infrastructures on a VoIP Service
Bimrah, KK., Mouratidis, H. and Preston, D., (2008). Modelling Trust Requirements by Means of a Visualization Language
Mouratidis, H., (2008). Curriculum for modelling security: Experiences and lessons learned
Al-Zakwani, A., Brimicombe, A. and Mouratidis, H., (2007). An Agent-Based System to Support Geo-Information Analysis
Beydoun, G., Low, G., Mouratidis, H. and Henderson-Sellers, B., (2007). Modelling MAS-specific security features
Bimrah, KK., Mouratidis, H. and Preston, D., (2007). Information Systems Development: A Trust Ontology
Dehousse, S., Faulkner, S., Mouratidis, H., Kolp, M. and Giorgini, P., (2007). Reasoning About Willingness in Networks of Agents
Al-Zakwani, A., Mouratidis, H. and Brimicombe, A., (2007). A dynamic binding technology for agent-based geo-information systems
Dehousse, S., Liu, L., Faulkner, S., Kolp, M. and Mouratidis, H., (2006). Modeling Delegation through an i*-based Approach
Dehousse, S., Faulkner, S., Mouratidis, H., Giorgini, P. and Kolp, M., (2006). Reasoning about willingness in networks of agents
Faulkner, S., Dehousse, S., Kolp, M., Mouratidis, H. and Giorgini, P., (2005). Delegation Mechanisms for Agent Architectural Design
Mouratidis, H., Kolp, M., Giorgini, P. and Faulkner, S., (2005). A secure architectural description language for agent systems
Mouratidis, H., Giorgini, P. and Manson, G., (2004). Using security attack scenarios to analyse security during information systems design
Mouratidis, H., Manson, G., Gani, A. and Giorgini, P., (2003). Analysing security requirements of information systems using tropos
Mouratidis, H., Giorgini, P. and Manson, G., (2003). An Ontology for Modelling Security: The Tropos Approach
Mouratidis, H., Giorgini, P. and Manson, G., (2003). Modelling secure multiagent systems
Grants and funding
2024
Addressing Hallucinations in Generative AI for customer service applications
Innovate UK (formerly Technology Strategy Board)
PALLETS - Proactive AI-powered soLutions for Logistics Efficiency, Transparency and Safety
Innovate UK (formerly Technology Strategy Board)
2023
Cyber security academic startup accelerator programme (CyberASAP) 2023, year 7: phase 1
Innovate UK (formerly Technology Strategy Board)
Cyber hygiene self-assessment maturity tool
Innovate UK (formerly Technology Strategy Board)
To develop a best-in-class digital portal which enables a secure, seamless self-service experience for Attwells' clients.
Innovate UK (formerly Technology Strategy Board)
To develop the next generation of an existing software package into a highlyinnovative, AI-enabled platform suitable for a first widescale commercialisation.
Innovate UK (formerly Technology Strategy Board)
CyberSecurityAId - A Self-assessment maturity tool for cyber hygiene for small businesses in the agriculture and farming sector
University of Essex
CyberSecurityAId: Empowering Small Businesses with Cyber Hygiene
Innovate UK (formerly Technology Strategy Board)
CyberASAP Phase 2 - AI Privacy Orchestrator
Innovate UK (formerly Technology Strategy Board)
Multilingual and Cross-cultural interactions for context-aware, and bias-controlled dialogue systems for safety-critical applications
European Commission
To embed novel federated learning and micromodel technology into a real-time insights platform.
Innovate UK (formerly Technology Strategy Board)
2022
Cyber Security Incident Handling, Warning and Response System for the European Critical Infrastructures
European Commission
2021
A Dynamic and Self-Organized Artificial Swarm Intelligence Solution for Security and Privacy Threats in Healthcare ICT Infrastructures
European Commission
Contact
h.mouratidis@essex.ac.uk
+44 (0) 1206 872362
Location:
IADS OFFICE PARKSIDE 2C COLCHESTER CAMPUS, Colchester Campus