The following publications are possibly variants of this publication:
- Secure Tropos: a Security-Oriented Extension of the Tropos MethodologyHaralambos Mouratidis, Paolo Giorgini. ijseke, 17(2):285-309, 2007. [doi]
- Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems DevelopmentRaimundas Matulevicius, Nicolas Mayer, Haralambos Mouratidis, Eric Dubois, Patrick Heymans, Nicolas Genon. caise 2008: 541-555 [doi]
- Secure Tropos: Extending /* and Tropos to Model Security Throughout the Development ProcessHaralambos Mouratidis, Paolo Ciorgini. In Eric S. K. Yu, Paolo Giorgini, Neil A. M. Maiden, John Mylopoulos, editors, Social Modeling for Requirements Engineering. Cooperative information systems, pages 363-402, MIT Press, 2011.
- Analysing Security Requirements of Information Systems Using TroposHaralambos Mouratidis, Gordon A. Manson, Abdullah Gani, Paolo Giorgini. ICEIS 2003: 623-626
- Security Requirements Engineering for Cloud Computing: The Secure Tropos ApproachHaralambos Mouratidis, Nikolaos Argyropoulos, Shaun Shei. In Dimitris Karagiannis, Heinrich C. Mayr, John Mylopoulos, editors, Domain-Specific Conceptual Modeling, Concepts, Methods and Tools. pages 357-380, Springer, 2016. [doi]
- Enhancing Secure Tropos to Effectively Deal with Security Requirements in the Development of Multiagent SystemsHaralambos Mouratidis, Paolo Giorgini. In Mike Barley, Haralambos Mouratidis, Amy Unruh, Diana F. Spears, Paul Scerri, Fabio Massacci, editors, Safety and Security in Multiagent Systems - Research Results from 2004-2006. Volume 4324 of Lecture Notes in Computer Science, pages 8-26, Springer, 2009. [doi]