Addressing privacy requirements in system design: the PriS method C Kalloniatis, E Kavakli, S Gritzalis Requirements Engineering 13 (3), 241-255, 2008 | 306 | 2008 |
A framework to support selection of cloud providers based on security and privacy requirements H Mouratidis, S Islam, C Kalloniatis, S Gritzalis Journal of Systems and Software 86 (9), 2276-2293, 2013 | 157 | 2013 |
Towards the design of secure and privacy-oriented information systems in the cloud: Identifying the major concepts C Kalloniatis, H Mouratidis, M Vassilis, S Islam, S Gritzalis, E Kavakli Computer Standards & Interfaces 36 (4), 759-775, 2014 | 83 | 2014 |
Evaluating cloud deployment scenarios based on security and privacy requirements C Kalloniatis, H Mouratidis, S Islam Requirements Engineering 18 (4), 299-319, 2013 | 81 | 2013 |
A survey on cloud forensics challenges and solutions S Simou, C Kalloniatis, S Gritzalis, H Mouratidis Security and Communication Networks 9 (18), 6285-6314, 2016 | 56 | 2016 |
Cloud forensics: identifying the major issues and challenges S Simou, C Kalloniatis, E Kavakli, S Gritzalis International conference on advanced information systems engineering, 271-284, 2014 | 55 | 2014 |
Intelligent modification for the daltonization process of digitized paintings CN Anagnostopoulos, G Tsekouras, I Anagnostopoulos, C Kalloniatis International Conference on Computer Vision Systems: Proceedings (2007), 2007 | 50 | 2007 |
Assurance of security and privacy requirements for cloud deployment models S Islam, M Ouedraogo, C Kalloniatis, H Mouratidis, S Gritzalis IEEE Transactions on Cloud Computing 6 (2), 387-400, 2015 | 49 | 2015 |
Incorporating privacy requirements into the system design process: the PriS conceptual framework E Kavakli, C Kalloniatis, P Loucopoulos, S Gritzalis Internet research, 2006 | 46 | 2006 |
Machine learning and images for malware detection and classification K Kosmidis, C Kalloniatis Proceedings of the 21st Pan-Hellenic Conference on Informatics, 1-6, 2017 | 38 | 2017 |
Model based process to support security and privacy requirements engineering S Islam, H Mouratidis, C Kalloniatis, A Hudic, L Zechner International Journal of Secure Software Engineering (IJSSE) 3 (3), 1-22, 2012 | 36 | 2012 |
Using privacy process patterns for incorporating privacy requirements into the system design process C Kalloniatis, E Kavakli, S Gritzalis The Second International Conference on Availability, Reliability and …, 2007 | 34 | 2007 |
Pris tool: A case tool for privacy-oriented requirements engineering C Kalloniatis, E Kavakli, E Kontellis | 33 | 2009 |
Fuzzy Clustering of Categorical Attributes and its Use in Analyzing Cultural Data. GE Tsekouras, D Papageorgiou, SB Kotsiantis, C Kalloniatis, PE Pintelas International Conference on Computational Intelligence, 202-206, 2004 | 31 | 2004 |
Supporting the design of privacy-aware business processes via privacy process patterns V Diamantopoulou, N Argyropoulos, C Kalloniatis, S Gritzalis 2017 11th International Conference on Research Challenges in Information …, 2017 | 30 | 2017 |
Methods for designing privacy aware information systems: A review C Kalloniatis, E Kavakli, S Gritzalis 2009 13th Panhellenic Conference on Informatics, 185-194, 2009 | 30 | 2009 |
Security requirements engineering for e-government applications: analysis of current frameworks C Kalloniatis, E Kavakli, S Gritzalis International Conference on Electronic Government, 66-71, 2004 | 29 | 2004 |
Protecting privacy in system design: the electronic voting case E Kavakli, S Gritzalis, K Christos Transforming Government: People, Process and Policy 1 (4), 307-332, 2007 | 28 | 2007 |
Gamification vs. privacy: Identifying and analysing the major concerns AG Mavroeidi, A Kitsiou, C Kalloniatis, S Gritzalis Future Internet 11 (3), 67, 2019 | 27 | 2019 |
Aligning Security and Privacy to Support the Development of Secure Information Systems. H Mouratidis, C Kalloniatis, S Islam, MP Huget, S Gritzalis J. Univers. Comput. Sci. 18 (12), 1608-1627, 2012 | 27 | 2012 |