Εκπαίδευση - Σπουδές

Δίπλωμα Μηχανικού Πληροφορικής
Μεταπτυχιακό Ασφάλειας Πληροφοριακών και Επικοινωνιακών Συστημάτων

Ερευνητικά Ενδιαφέροντα

Ασφάλεια Πληροφοριακών Συστημάτων και Δικτύων
Μηχανική μάθηση
Τεχνολογία λογισμικού


 

 

Διδασκαλία

  • Εργαστήριο Αντικειμενοστρεφής Προγραμματισμός Ι, 2ο εξάμηνο, (Ακ. έτος 2009-10 έως σήμερα)
  • Εργαστήριο Αντικειμενοστρεφής Προγραμματισμός IΙ, 3ο εξάμηνο, (Ακ. έτος 2010-11 έως σήμερα)
  • Εργαστήριο Δομές Δεδομένων, 3ο εξάμηνο, (Ακ. έτος 2011-12 έως σήμερα)
  • Εργαστήριο Κατανεμημένα Συστήματα, 6ο εξάμηνο (Ακ. έτος 2012-13 έως σήμερα)
  • Εργαστήριο Ασφάλεια Πληροφοριακών και Επικοινωνιακών Συστημάτων, 6ο εξάμηνο, (Ακ. έτος 2009-10 έως σήμερα)

 

Δημοσιεύσεις σε Διεθνή Περιοδικά (Journals)


Copyright Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted or mass reproduced without the explicit permission of the copyright holder.


M. Vasileiou, N. Manos, N. Vasilopoulos, A. Douma, E. Kavallieratou, Kalypso Autonomous Underwater Vehicle: A 3D-Printed Underwater Vehicle for Inspection at Fisheries, Journal of Mechanisms and Robotics, Vol. 16, No. 4, pp. 041003, 2024, ASME, https://doi.org/10.1115/1.4062355, indexed in SCI-E, IF = 2.6
 

Abstract
In fish farms a major issue is the net cage wear, resulting in fish escapes and negative impact of fish quality, due to holes and biofouling of the nets. To minimize fish losses, fisheries utilize divers to inspect net cages on a weekly basis. Aquaculture companies are looking for ways to maximize profit and reduce maintenance costs is one of them. Kefalonia Fisheries spend 250 thousand euros yearly on diver expenses for net cages maintenance. This work is about the design, fabrication, and control of an inexpensive autonomous underwater vehicle intended for inspection in net cages at Kefalonia Fisheries S.A. in Greece. Its main body is 3D-printed, and its eight-thruster configuration grants it six degrees of freedom. The main objective of the vehicle is to limit maintenance costs by increasing inspection frequency. The design, fabrication as well as the electronics and software architecture of the vehicle are presented. In addition, the forces affecting Kalypso, mobility realization, navigation, and modeling are quoted along with a flow simulation and the experimental results. The proposed design is adaptable and durable while remaining cost effective, and it can be used for both manual and automatic operations.

G. Kambourakis, E. Konstantinou, A. Douma, M. Anagnostopoulos, G. Fotiadis, Efficient Certification Path Discovery for MANET, EURASIP Journal on Wireless Communications and Networking, Vol. 2010, pp. 1-16, 2010, Hindawi Publishing Corporation, http://jwcn.eurasipjournals.com/, indexed in SCI-E, IF = 0.815
 

Abstract
A Mobile Ad Hoc Network (MANET) is characterized by the lack of any infrastructure, absence of any kind of centralized administration, frequent mobility of nodes, network partitioning, and wireless connections. These properties make traditional wireline security solutions not straightforwardly applicable in MANETs, and of course, constitute the establishment of a Public Key Infrastructure (PKI) in such networks a cumbersome task. After surveying related work, we propose a novel public key management scheme using the well-known web-of-trust or trust graph model. Our scheme is based on a binary tree formation of the network’s nodes. The binary tree structure is proved very effective for building certificate chains between communicating nodes that are multihops away and the cumbersome problem of certificate chain discovery is avoided.We compare our scheme with related work and show that it presents several advantages, especially when a fair balancing between security and performance is desirable. Simulations of the proposed scheme under different scenarios demonstrate that it is effective in terms of tree formation, join and leave occurrences, and certificate chain establishment.

[3]
A. Douma, Mavroudakis Konstantinos, S. K. Katsikas, D. Gritzalis, Design of a neural network for recognition and classification of computer viruses, Computers & Security, Vol. 14, No. 5, pp. 435-448, 1995

Επιστημονικά Συνέδρια (Conferences)


Copyright Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted or mass reproduced without the explicit permission of the copyright holder.


[1]
Ch. Tsagaris, A. Douma, T. Spyrou, J. Darzentas, Simulation of the University of the Aegean Network, 12th Operations Research National Conference on "Business and New Technologies", Sep, 1998, Samos, Greece,
[2]
T. Spyrou, E. Sutinen, A. Douma, H. Putkonen, I. Darzentas, Applying SICS: A technique for software modules Communication, 5th Greek National Conference on IS, pp. 165-176, Dec, 1995,

Βιβλία


Copyright Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted or mass reproduced without the explicit permission of the copyright holder.


Κεφάλαια σε Βιβλία


Copyright Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted or mass reproduced without the explicit permission of the copyright holder.


[1]
M. Anagnostopoulos, A. Douma, G. Kambourakis, Network Security, chapter in: Information and System Security in the Cyberspace, S. Katsikas, S. Gritzalis, C Lambrinoudakis, (eds), 2021, Athens, NewTech Pub (in Greek), https://newtech-pub.com/βιβλία/πληροφορι...

Επιμέλεια Πρακτικών Διεθνών Συνεδρίων


Copyright Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted or mass reproduced without the explicit permission of the copyright holder.