Εκπαίδευση - Σπουδές

Ο Δρ Ιωάννης Στύλιος εργάζεται ως διδάσκων και συγγραφέας στο Πανεπιστήμιο Αθηνών και στο Πανεπιστήμιο Αιγαίου e-Learning. Επίσης, είναι Ερευνητής στο Info-Sec-Lab του Πανεπιστημίου Αιγαίου. Είναι συγγραφέας αρκετών βιβλίων και διδακτικών συγγραμμάτων (Εκδότες: Πανεπιστήμιο Αθηνών & Πανεπιστήμιο Αιγαίου) και έχει δημοσιεύσει αρκετές εργασίες σε διεθνή και ευρωπαϊκά επιστημονικά συνέδρια με κριτές και σε επιστημονικά περιοδικά υψηλού αντίκτυπου. Έχει συμμετάσχει σε πολλά εθνικά και χρηματοδοτούμενα από την ΕΕ ερευνητικά έργα στον τομέα της Ασφάλειας Πληροφοριακών και Επικοινωνιακών Συστημάτων.

Σπουδές:

  • Διδακτορικό (Yποτροφία Αριστείας ΕΛΙΔΕΚ) σε Κυβερνοασφάλεια και Επιστήμη των Δεδομένων, υπό την επίβλεψη του Καθηγητή Σπύρου Κοκολάκη, στο Τμήμα Μηχανικών Πληροφοριακών και Επικοινωνιακών Συστημάτων (ΜΠΕΣ) του Πανεπιστημίου Αιγαίου. 
  • Μεταπτυχιακό Δίπλωμα στην Ασφάλεια Πληροφοριακών και Επικοινωνιακών Συστημάτων από το Πανεπιστήμιο Αιγαίου, Τμήμα ΜΠΕΣ.
  • Μεταπτυχιακό Δίπλωμα στις Επιστήμες της Αγωγής (Master of Education) στην Διδακτική των θετικών Επιστημών και των ΤΠΕ στην Εκπαίδευση: Διεπιστημονική Προσέγγιση από το Τμήμα Προσχολικής Αγωγής και Εκπαιδευτικού Σχεδιασμού του Πανεπιστημίου Αιγαίου. 
  • Πτυχίο Πληροφορικής από το Πανεπιστήμιο Ιωαννίνων (dit.uoi.gr/alumni).


Ο Ιωάννης έχει λάβει αρκετές διακρίσεις και βραβεία και τα πιο πρόσφατα είναι τα ακόλουθα:

  • 2020: Χρηματοδότηση σχεδίου μεταφοράς τεχνολογίας. Το σχέδιο μεταφοράς τεχνολογίας, από το διδακτορικό του Ιωάννη, διακρίθηκε από το Υπουργείο Εργασίας και την επιτροπή του Οργανισμού Απασχόλησης Εργατικού Δυναμικού. Χρηματοδότηση 12.000€.
  • 2019: Υποτροφία Αριστείας για Έρευνα. Χρηματοδότηση από την πράξη «Υποστήριξη ερευνητών με έμφαση τους νέους ερευνητές-Κύκλος Β» του προγράμματος «Ανάπτυξη Ανθρώπινου Δυναμικού, Εκπαίδευση και Δια Βίου Μάθησης». Επίσης συγχρηματοδοτείται από την Ευρωπαϊκή Ένωση. Ποσό υποτροφίας 15.000€. Συνολική χρηματοδότηση έργου 41.000€. Ο Ιωάννης έγραψε την πρόταση έργου, σε συνεργασία με τον καθηγητή Σπύρο Κοκολάκη, η οποία βασίστηκε στα ευρήματα και τα αποτελέσματα του διδακτορικού του.
  • 2017: Υποτροφία Αριστείας για Διδακτορική Διατριβή. Ο Ιωάννης διακρίθηκε στις υποτροφίες του ΕΛΙΔΕΚ (Ελληνικό Ίδρυμα Έρευνας και Καινοτομίας) μεταξύ 2.144 υποψηφίων διδακτόρων (ποσοστό αποδοχής περίπου 20%, χρηματοδότηση 23.500 €).

My LinkedIn: https://goo.gl/owRjmE
My ResearchGate: https://goo.gl/tpgcct

Ερευνητικά Ενδιαφέροντα

Research Interests: Data Science, Machine & Deep Learning, Cybersecurity, Biometrics Security, Continuous Authentication, Mobile Security & Privacy, Internet of Things, Blockchain.

Διδασκαλία

University of Aegean, e-Learning https://elearn-aegean.gr 

  • Tutor of five courses and author of five textbooks.

1.       Data Science with R 

2.       Advanced Python with applications in Machine Learning

3.       Blockchain Technology

4.       Programming with Python

5.       Digital Transformation: Services and Technologies

Δημοσιεύσεις σε Διεθνή Περιοδικά (Journals)


Copyright Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted or mass reproduced without the explicit permission of the copyright holder.


[1]
Ioannis Stylios, A. Skalkos, M. Karyda, S. Kokolakis, BioPrivacy: a behavioral biometrics continuous authentication system based on keystroke dynamics and touch gestures, Information & Computer Security, Vol. 30, No. 5, pp. 687-704, 2022, Emerald Publishing Limited, https://www.emerald.com/insight/content/...
A. Skalkos, Ioannis Stylios, M. Karyda, S. Kokolakis, Users’ Privacy Attitudes towards the Use of Behavioral Biometrics Continuous Authentication (BBCA) Technologies: A Protection Motivation Theory Approach, Journal of Cybersecurity and Privacy, Vol. 1, No. 4, pp. 24, 2021, MDPI, https://www.mdpi.com/2624-800X/1/4/36
 

Abstract
Smartphone user authentication based on passwords, PINs, and touch patterns raises several security concerns. Behavioral Biometrics Continuous Authentication (BBCA) technologies provide a promising solution which can increase smartphone security and mitigate users’ concerns. Until now, research in BBCA technologies has mainly focused on developing novel behavioral biometrics continuous authentication systems and their technical characteristics, overlooking users’ attitudes towards BBCA. To address this gap, we conducted a study grounded on a model that integrates users’ privacy concerns, trust in technology, and innovativeness with Protection Motivation Theory. A cross-sectional survey among 778 smartphone users was conducted via Amazon Mechanical Turk (MTurk) to explore the factors which can predict users’ intention to use BBCA technologies. Our findings demonstrate that privacy concerns towards intention to use BBCA technology have a significant impact on all components of PMT. Further to this, another important construct we identified that affects the usage intention of BBCA technology is innovativeness. Our findings posit the view that reliability and trustworthiness of security technologies, such as BBCA are important for users. Together, these results highlighted the importance of addressing users’ perceptions regarding BBCA technology.

[3]
Ioannis Stylios, S. Kokolakis, A. Skalkos, Chatzis, S., BioGames: A new Paradigm and a Behavioral Biometrics Collection Tool for Research Purposes, Information & Computer Security, Vol. 30, No. 2, pp. 243-254, 2021, https://doi.org/10.1108/ICS-12-2020-0196

Επιστημονικά Συνέδρια (Conferences)


Copyright Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted or mass reproduced without the explicit permission of the copyright holder.


Ioannis Stylios, A. Skalkos, S. Kokolakis, M. Karyda, BioPrivacy: Development of a Keystroke Dynamics Continuous Authentication System, ESORICS 2021 International Workshops. ESORICS 2021, Katsikas S. et al., pp. pp 158-170, Oct, 2021, Darmstadt, Germany, Springer, https://link.springer.com/chapter/10.100...
 

Abstract
Session authentication schemes establish the identity of the user only at the beginning of the session, so they are vulnerable to attacks that tamper with communications after the establishment of the authenticated session. Moreover, smartphones themselves are used as authentication means, especially in two-factor authentication schemes, which are often required by several services. Whether the smartphone is in the hands of the legitimate user constitutes a great concern, and correspondingly whether the legitimate user is the one who uses the services. In response to these concerns, Behavioral Biometrics (BB) Continuous Authentication (CA) technologies have been proposed on a large corpus of literature. This paper presents a research on the development and validation of a BBCA system (named BioPrivacy), that is based on the user’s keystroke dynamics, using a Multi-Layer Perceptron (MLP). Also, we introduce a new behavioral biometrics collection tool, and we propose a methodology for the selection of an appropriate set of behavioral biometrics. Our system achieved 97.18% Accuracy, 0.02% Equal Error Rate (EER), 97.2% True Acceptance Rate (TAR) and 0.02% False Acceptance Rate (FAR).

Ioannis Stylios, S. Kokolakis, P. Andriotis, Privacy decision-making in the digital era: A game theoretic review, International Conference on Human Aspects of Information Security, Privacy, and Trust, Theo Tryfonas, (ed), pp. 589-603, Jul, 2017, Vancouver, Canada, Springer, Cham, https://link.springer.com/chapter/10.100...
 

Abstract
Information privacy is constantly negotiated when people interact with enterprises and government agencies via the Internet. In this context, all relevant stakeholders take privacy-related decisions. Individuals, either as consumers buying online products and services or citizens using e-government services, face decisions with regard to the use of online services, the disclosure of personal information, and the use of privacy enhancing technologies. Enterprises make decisions regarding their investments on policies and technologies for privacy protection. Governments also decide on privacy regulations, as well as on the development of e-government services that store and process citizens’ personal information. Motivated by the aforementioned issues and challenges, we focus on aspects of privacy decision-making in the digital era and address issues of individuals’ privacy behavior. We further discuss issues of strategic privacy decision-making for online service providers and e-government service providers.

Ioannis Stylios, S. Kokolakis, Thanou, O., Chatzis, S., User's Attitudes on Mobile Devices: Can Users' Practices Protect Their Sensitive Data?, 10th Mediterranean Conference on Information Systems (MCIS) 2016, Sep, 2016, https://www.researchgate.net/publication...
 

Abstract
Smartphones are the most popular personal electronic devices. They are used for all sorts of purposes, from managing bank accounts to playing games. As smartphone apps and services proliferate, the amount of sensitive data stored on or processed by handheld devices rise as well. This practice entails risks, such as violating users’ privacy, stealing users’ identities, etc. Particularly, stealing an unlocked device grants full access to sensitive data and applications. In this survey, we examine whether users adopt some basic practices to protect their sensitive personal data themselves, or is there a need to further strengthen their protection? Our statistical analysis assesses smartphone users’ security attitudes and practices among different age groups. Finally, we investigate the factors that affect the attitude of users with respect to their practices for the protection of personal data.The results of this study, show that while many smartphone users do take some security precautions, a high percentage (24%) of them still ignores security and privacy risks. In addition, 19,1 % of users do not follow any practices to protect their PINs and Passwords.\r\nKeywords: Mobile Phones, Privacy Risk, Users Attitudes, Survey.

Ioannis Stylios, Thanou, O., Iosif Androulidakis, Elena Zaitseva, A Review of Continuous Authentication Using Behavioral Biometrics, ACM SEEDA-CECNSM 2016, Sep, 2016, ACM, https://www.researchgate.net/publication...
 

Abstract
Abstract —The present study carries out a literature review on the topic of Continuous Authentication (CA) using behavioral biometrics. CA systems have been proposed in order to solve the shortcomings of other user authentication methods. CA processes are considered to raise systems security and reliability, and biometric technologies have increasingly become part of security architectures. Since some of uni-biometrics' vulnerabilities have already been revealed, they have been replaced or enhanced by multi-biometrics where behavioral biometrics are gaining ground as a new way of establishing the identity of a user. We therefore present a collection of selected published sources relevant to this topic accompanied by annotation, critical analysis of contents and, in some cases apposition of the main conclusions of each work. This work can help new researchers, scientists and the industry develop new systems and technologies by providing them a ready to use literature base with theoretical and practical aspects on Continuous Authentication using behavioral biometrics. Keywords — Literature Review Mobile Phones, Privacy Risk, Behavioral Biometrics, Continuous Authentication.

Ioannis Stylios, Thanou, O., Iosif Androulidakis, Elena Zaitseva, Communication Security & Cyberbullying: A Review of the Legal Issues, ACM SEEDA-CECNSM 2016, Sep, 2016, ACM, https://www.researchgate.net/publication...
 

Abstract
Abstract — The research of legal issues concerning the cyberspace is complex because it requires not only legal but also technical knowledge. The present paper examines the challenges and answers stemming from three main research questions: a) are there gaps in legislation concerning cyberbullying? b) Does the penal legislator consider security in cyberspace as a legal asset? c) How is cyberbullying treated in the legal system? By taking into account the existing legal and social dimensions of the issue, and triggered by those three research questions, we conclude that the creation of a global framework of internet behavior rules, internet legislation and communication security policies is absolutely necessary. Keywords — Cyberbullying, Legislation, Communication Security.

Ioannis Stylios, Chatzis, S., Thanou, O., S. Kokolakis, Mobile Phones & Behavioral Modalities: Surveying users’ practices, TELFOR 2015 International IEEE Conference, Nov, 2015, IEEE, https://www.researchgate.net/publication...
 

Abstract
Abstract — Mobile phones are one of the most popular means of access to the internet. Users, via the telephone, connect to different services such as: Google, social networks, work accounts, banks accounts, etc. Those services, are many times, left open in their device. This enables risks, such as, loss or/and the violation of their personal data. In addition, in case of device theft after login, full access to sensitive data and applications may be fully granted. The purpose of this research is to analyze the most salient patterns characterizing user practices regarding certain behavioral modalities including: the way of using the various applications, power consumption, touch gestures and guest users’ habits. To this end, we used an original questionnaire, created for the needs of the specific survey, to examine whether we can find some trends among the users. This can give us a qualitative information, for the different behaviors / “characters” of users, in order to be used in further research regarding User’s Continuous Authentication. Keywords — Mobile Phones, Behavioral Modalities, Continuous Authentication, Survey.

G. Tzelepis, T. Skentos, Ioannis Stylios, Study and environmental surveying on the Fire of Parnitha with Geographic Information Systems (GIS) for similar natural risk management in the future, 8th Hellenic Conference HellasGIs, Dec, 2014, HellasGIs, https://www.researchgate.net/publication...
 

Abstract
Οι δασικές πυρκαγιές αποτελούν έναν από τους σημαντικότερους κινδύνους του φυσικού και ανθρωπογενούς περιβάλλοντος που καλείται να αντιμετωπίσει η Ελλάδα κατά τους θερινούς μήνες. Τα τελευταία χρόνια γίνεται μία προσπάθεια για διεπιστημονική προσέγγιση των φυσικών κινδύνων που αντλεί τεχνικές και εργαλεία από μία μεγάλη γκάμα επιστημών (γεωλογία, δασολογία, γεωγραφία, επιστήμες μηχανικού, πληροφορική κ.α.). Σκοπός του άρθρου είναι η παρουσίαση της μελέτης και της εκτίμησης των περιβαλλοντικών επιπτώσεων από την πυρκαγιά και η εξαγωγή ποσοτικών και ποιοτικών δεδομένων για τις χρήσεις γης με χρήση σύγχρονων τεχνικών τηλεπισκόπησης και η περιβαλλοντική αποτύπωση της πυρκαγιάς με Σύστηματα Γεωγραφικών Πληροφοριών (ΣΓΠ), γνωστά ευρέως και ως G.I.S. Geographic Information Systems. Η παρούσα μελέτη αναδεικνύει τον κομβικό ρόλο των ΣΓΠ και των τεχνικών Τηλεπισκόπισης σε θέματα πρόληψης και διαχείρισης φυσικών καταστροφών.

Ioannis Stylios, V. Vlachos, Iosif Androulidakis, Performance Comparison of Machine Learning Algorithms for Diagnosis of Cardiotocograms with Class Inequality, TELFOR 2014 International IEEE Conference, Nov, 2014, IEEE, https://www.researchgate.net/publication...
 

Abstract
Abstract — The objective of the present paper is to demonstrate the potential of Computational Intelligence in applications pertaining to the automatic identification – categorisation of Cardiotocograms using Machine Learning Algorithms and Artificial Neural Networks whose purpose is to distinguish between healthy or pathological cases leading to mortality during birth or fetal cerebral palsy. Interest is also placed on the performance of the Machine learning algorithms and the comparison of the classifiers’ results.

Iosif Androulidakis, V. Christou, N. Bardis, Ioannis Stylios, Surveying user’s practices regarding mobile phone’s security features, 3rd WSEAS International Conference, Jun, 2009, https://www.researchgate.net/publication...
 

Abstract
Abstract: Despite the fact that mobile phone’s security measures have been increased during the last years, users don’t take the necessary measures to avoid a possible unauthorized access and/or sensitive data retrieval from their mobile phone. In order to investigate this issue, in this paper, we present the results of a survey conducted in the University of Ioannina, Greece according to which 282 participants were asked about quite many key factors concerning their mobile phone security. The results are very interesting and can be considered as a potential guide by various mobile operators for their future technological investments and their customer’s briefing about mobile’s phone security.

Βιβλία


Copyright Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted or mass reproduced without the explicit permission of the copyright holder.


Κεφάλαια σε Βιβλία


Copyright Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted or mass reproduced without the explicit permission of the copyright holder.


Επιμέλεια Πρακτικών Διεθνών Συνεδρίων


Copyright Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted or mass reproduced without the explicit permission of the copyright holder.