Dr. Ioannis stylios is working as an Instructor/Lecturer (Contract) and Author at the University of Athens and the University of the Aegean e-Learning. Also, he is working as a Researcher in the Info-Sec-Lab of the University of the Aegean. He is the author of several books & textbooks (Publishers: University of Athens & University of the Aegean) and refereed papers in international scientific journals and conferences. He has been involved in several national and EU-funded R&D projects in the area of Information and Communication Systems Security.
Education:
Ioannis has received several honors and awards and the most recent are the following:
Research Interests: Data Science, Machine & Deep Learning, Cybersecurity, Biometrics Security, Continuous Authentication, Mobile Security & Privacy, Internet of Things, Blockchain.
Research Interests: Data Science, Machine & Deep Learning, Cybersecurity, Biometrics Security, Continuous Authentication, Mobile Security & Privacy, Internet of Things, Blockchain.
University of Aegean, e-Learning https://elearn-aegean.gr
2. Advanced Python with applications in Machine Learning
5. Digital Transformation: Services and Technologies
Abstract
Smartphone user authentication based on passwords, PINs, and touch patterns raises several security concerns. Behavioral Biometrics Continuous Authentication (BBCA) technologies provide a promising solution which can increase smartphone security and mitigate users’ concerns. Until now, research in BBCA technologies has mainly focused on developing novel behavioral biometrics continuous authentication systems and their technical characteristics, overlooking users’ attitudes towards BBCA. To address this gap, we conducted a study grounded on a model that integrates users’ privacy concerns, trust in technology, and innovativeness with Protection Motivation Theory. A cross-sectional survey among 778 smartphone users was conducted via Amazon Mechanical Turk (MTurk) to explore the factors which can predict users’ intention to use BBCA technologies. Our findings demonstrate that privacy concerns towards intention to use BBCA technology have a significant impact on all components of PMT. Further to this, another important construct we identified that affects the usage intention of BBCA technology is innovativeness. Our findings posit the view that reliability and trustworthiness of security technologies, such as BBCA are important for users. Together, these results highlighted the importance of addressing users’ perceptions regarding BBCA technology.
Copyright Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted or mass reproduced without the explicit permission of the copyright holder.
Abstract
Session authentication schemes establish the identity of the user only at the beginning of the session, so they are vulnerable to attacks that tamper with communications after the establishment of the authenticated session. Moreover, smartphones themselves are used as authentication means, especially in two-factor authentication schemes, which are often required by several services. Whether the smartphone is in the hands of the legitimate user constitutes a great concern, and correspondingly whether the legitimate user is the one who uses the services. In response to these concerns, Behavioral Biometrics (BB) Continuous Authentication (CA) technologies have been proposed on a large corpus of literature. This paper presents a research on the development and validation of a BBCA system (named BioPrivacy), that is based on the user’s keystroke dynamics, using a Multi-Layer Perceptron (MLP). Also, we introduce a new behavioral biometrics collection tool, and we propose a methodology for the selection of an appropriate set of behavioral biometrics. Our system achieved 97.18% Accuracy, 0.02% Equal Error Rate (EER), 97.2% True Acceptance Rate (TAR) and 0.02% False Acceptance Rate (FAR).
Abstract
Information privacy is constantly negotiated when people interact with enterprises and government agencies via the Internet. In this context, all relevant stakeholders take privacy-related decisions. Individuals, either as consumers buying online products and services or citizens using e-government services, face decisions with regard to the use of online services, the disclosure of personal information, and the use of privacy enhancing technologies. Enterprises make decisions regarding their investments on policies and technologies for privacy protection. Governments also decide on privacy regulations, as well as on the development of e-government services that store and process citizens’ personal information. Motivated by the aforementioned issues and challenges, we focus on aspects of privacy decision-making in the digital era and address issues of individuals’ privacy behavior. We further discuss issues of strategic privacy decision-making for online service providers and e-government service providers.
Abstract
Smartphones are the most popular personal electronic devices. They are used for all sorts of purposes, from managing bank accounts to playing games. As smartphone apps and services proliferate, the amount of sensitive data stored on or processed by handheld devices rise as well. This practice entails risks, such as violating users’ privacy, stealing users’ identities, etc. Particularly, stealing an unlocked device grants full access to sensitive data and applications. In this survey, we examine whether users adopt some basic practices to protect their sensitive personal data themselves, or is there a need to further strengthen their protection? Our statistical analysis assesses smartphone users’ security attitudes and practices among different age groups. Finally, we investigate the factors that affect the attitude of users with respect to their practices for the protection of personal data.The results of this study, show that while many smartphone users do take some security precautions, a high percentage (24%) of them still ignores security and privacy risks. In addition, 19,1 % of users do not follow any practices to protect their PINs and Passwords.\r\nKeywords: Mobile Phones, Privacy Risk, Users Attitudes, Survey.
Abstract
Abstract —The present study carries out a literature review on the topic of Continuous Authentication (CA) using behavioral biometrics. CA systems have been proposed in order to solve the shortcomings of other user authentication methods. CA processes are considered to raise systems security and reliability, and biometric technologies have increasingly become part of security architectures. Since some of uni-biometrics' vulnerabilities have already been revealed, they have been replaced or enhanced by multi-biometrics where behavioral biometrics are gaining ground as a new way of establishing the identity of a user. We therefore present a collection of selected published sources relevant to this topic accompanied by annotation, critical analysis of contents and, in some cases apposition of the main conclusions of each work. This work can help new researchers, scientists and the industry develop new systems and technologies by providing them a ready to use literature base with theoretical and practical aspects on Continuous Authentication using behavioral biometrics.
Keywords — Literature Review Mobile Phones, Privacy Risk, Behavioral Biometrics, Continuous Authentication.
Abstract
Abstract — The research of legal issues concerning the cyberspace is complex because it requires not only legal but also technical knowledge. The present paper examines the challenges and answers stemming from three main research questions: a) are there gaps in legislation concerning cyberbullying? b) Does the penal legislator consider security in cyberspace as a legal asset? c) How is cyberbullying treated in the legal system? By taking into account the existing legal and social dimensions of the issue, and triggered by those three research questions, we conclude that the creation of a global framework of internet behavior rules, internet legislation and communication security policies is absolutely necessary.
Keywords — Cyberbullying, Legislation, Communication Security.
Abstract
Abstract — Mobile phones are one of the most popular means of access to the internet. Users, via the telephone, connect to different services such as: Google, social networks, work accounts, banks accounts, etc. Those services, are many times, left open in their device. This enables risks, such as, loss or/and the violation of their personal data. In addition, in case of device theft after login, full access to sensitive data and applications may be fully granted. The purpose of this research is to analyze the most salient patterns characterizing user practices regarding certain behavioral modalities including: the way of using the various applications, power consumption, touch gestures and guest users’ habits. To this end, we used an original questionnaire, created for the needs of the specific survey, to examine whether we can find some trends among the users. This can give us a qualitative information, for the different behaviors / “characters” of users, in order to be used in further research regarding User’s Continuous Authentication.
Keywords — Mobile Phones, Behavioral Modalities, Continuous Authentication, Survey.
Abstract
Οι δασικές πυρκαγιές αποτελούν έναν από τους σημαντικότερους κινδύνους του
φυσικού και ανθρωπογενούς περιβάλλοντος που καλείται να αντιμετωπίσει η
Ελλάδα κατά τους θερινούς μήνες. Τα τελευταία χρόνια γίνεται μία προσπάθεια για
διεπιστημονική προσέγγιση των φυσικών κινδύνων που αντλεί τεχνικές και
εργαλεία από μία μεγάλη γκάμα επιστημών (γεωλογία, δασολογία, γεωγραφία,
επιστήμες μηχανικού, πληροφορική κ.α.).
Σκοπός του άρθρου είναι η παρουσίαση της μελέτης και της εκτίμησης των
περιβαλλοντικών επιπτώσεων από την πυρκαγιά και η εξαγωγή ποσοτικών και
ποιοτικών δεδομένων για τις χρήσεις γης με χρήση σύγχρονων τεχνικών
τηλεπισκόπησης και η περιβαλλοντική αποτύπωση της πυρκαγιάς με
Σύστηματα Γεωγραφικών Πληροφοριών (ΣΓΠ), γνωστά ευρέως και ως G.I.S.
Geographic Information Systems. Η παρούσα μελέτη αναδεικνύει τον κομβικό ρόλο
των ΣΓΠ και των τεχνικών Τηλεπισκόπισης σε θέματα πρόληψης και διαχείρισης
φυσικών καταστροφών.
Abstract
Abstract — The objective of the present paper is to demonstrate the potential of Computational Intelligence in applications pertaining to the automatic identification – categorisation of Cardiotocograms using Machine Learning Algorithms and Artificial Neural Networks whose purpose is to distinguish between healthy or pathological cases leading to mortality during birth or fetal cerebral palsy. Interest is also placed on the performance of the Machine learning algorithms and the comparison of the classifiers’ results.
Abstract
Abstract: Despite the fact that mobile phone’s security measures have been increased during the last
years, users don’t take the necessary measures to avoid a possible unauthorized access and/or
sensitive data retrieval from their mobile phone. In order to investigate this issue, in this paper, we
present the results of a survey conducted in the University of Ioannina, Greece according to which
282 participants were asked about quite many key factors concerning their mobile phone security. The
results are very interesting and can be considered as a potential guide by various mobile operators for their future technological investments and their customer’s briefing about mobile’s phone security.
Copyright Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted or mass reproduced without the explicit permission of the copyright holder.
Copyright Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted or mass reproduced without the explicit permission of the copyright holder.
Copyright Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted or mass reproduced without the explicit permission of the copyright holder.