Education

Dr. Ioannis stylios is working as an Instructor/Lecturer (Contract) and Author at the University of Athens and the University of the Aegean e-Learning. Also, he is working as a Researcher in the Info-Sec-Lab of the University of the Aegean. He is the author of several books & textbooks (Publishers: University of Athens & University of the Aegean) and refereed papers in international scientific journals and conferences. He has been involved in several national and EU-funded R&D projects in the area of Information and Communication Systems Security.

Education:

  • Doctor of Philosophy - PhD (HFRI Excellence Scholarship) in Cybersecurity Data Science, under the supervision of Professor Spyros Kokolakis, at the Department of Information and Communication Systems Engineering (ICSE) of the University of the Aegean.
  • Master's Degree (MSc) in Information & Communication Systems Security from the University of the Aegean, Department of ICSE.
  • Master of Education (MEd) in Didactics of Mathematics, Sciences, and ICT in Education: Interdisciplinary Approach, from the Department of Preschool Education and Educational Planning of the University of the Aegean.
  • Bachelor of Science (BSc) in Informatics from the University of Ioannina (dit.uoi.gr/alumni).

Ioannis has received several honors and awards and the most recent are the following:

  • 2020: Technology Transfer Plan Funding. The Hellenic Ministry of Labour and the Labour Employment Agency (LEA) committee distinguished Ioannis's Ph.D. technology transfer plan. Funding 12.000€.
  • 2019: Scholarship of Excellence for Research. Funding by the act "Supporting researchers with a focus on young researchers-Cycle B" of the "Human Resources Development, Education and Lifelong Learning" program. Also is co-financed by the European Union. Scholarship amount 15,000€. Total project funding 41.000€. Ioannis wrote the project proposal, in collaboration with Professor Spyros Kokolakis, which was based on the findings and results of his Ph.D.
  • 2017: Scholarship of Excellence for Doctoral Dissertation. Ioannis was distinguished in the scholarships of HFRI (Hellenic Foundation for Research and Innovation) among 2.144 Ph.D. candidates (Acceptance rate approx. 20%, funding 23.500€).

Research Interests: Data Science, Machine & Deep Learning, Cybersecurity, Biometrics Security, Continuous Authentication, Mobile Security & Privacy, Internet of Things, Blockchain.

 

Research Interests

Research Interests: Data Science, Machine & Deep Learning, Cybersecurity, Biometrics Security, Continuous Authentication, Mobile Security & Privacy, Internet of Things, Blockchain.

Teaching Activities

University of Aegean, e-Learning https://elearn-aegean.gr 

  • Tutor of five courses and author of five textbooks.

1.       Data Science with R 

2.       Advanced Python with applications in Machine Learning

3.       Blockchain Technology

4.       Programming with Python

5.       Digital Transformation: Services and Technologies

 

Journals


Copyright Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted or mass reproduced without the explicit permission of the copyright holder.


[1]
Ioannis Stylios, A. Skalkos, M. Karyda, S. Kokolakis, BioPrivacy: a behavioral biometrics continuous authentication system based on keystroke dynamics and touch gestures, Information & Computer Security, Vol. 30, No. 5, pp. 687-704, 2022, Emerald Publishing Limited, (to_appear), https://www.emerald.com/insight/content/..., IF =
A. Skalkos, Ioannis Stylios, M. Karyda, S. Kokolakis, Users’ Privacy Attitudes towards the Use of Behavioral Biometrics Continuous Authentication (BBCA) Technologies: A Protection Motivation Theory Approach, Journal of Cybersecurity and Privacy, Vol. 1, No. 4, pp. 24, 2021, MDPI, (to_appear), https://www.mdpi.com/2624-800X/1/4/36, IF =
 

Abstract
Smartphone user authentication based on passwords, PINs, and touch patterns raises several security concerns. Behavioral Biometrics Continuous Authentication (BBCA) technologies provide a promising solution which can increase smartphone security and mitigate users’ concerns. Until now, research in BBCA technologies has mainly focused on developing novel behavioral biometrics continuous authentication systems and their technical characteristics, overlooking users’ attitudes towards BBCA. To address this gap, we conducted a study grounded on a model that integrates users’ privacy concerns, trust in technology, and innovativeness with Protection Motivation Theory. A cross-sectional survey among 778 smartphone users was conducted via Amazon Mechanical Turk (MTurk) to explore the factors which can predict users’ intention to use BBCA technologies. Our findings demonstrate that privacy concerns towards intention to use BBCA technology have a significant impact on all components of PMT. Further to this, another important construct we identified that affects the usage intention of BBCA technology is innovativeness. Our findings posit the view that reliability and trustworthiness of security technologies, such as BBCA are important for users. Together, these results highlighted the importance of addressing users’ perceptions regarding BBCA technology.

[3]
Ioannis Stylios, S. Kokolakis, A. Skalkos, Chatzis, S., BioGames: A new Paradigm and a Behavioral Biometrics Collection Tool for Research Purposes, Information & Computer Security, Vol. 30, No. 2, pp. 243-254, 2021, (to_appear), https://doi.org/10.1108/ICS-12-2020-0196, IF =

Conferences


Copyright Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted or mass reproduced without the explicit permission of the copyright holder.


Ioannis Stylios, A. Skalkos, S. Kokolakis, M. Karyda, BioPrivacy: Development of a Keystroke Dynamics Continuous Authentication System, ESORICS 2021 International Workshops. ESORICS 2021, Katsikas S. et al., (ed), (eds), (to_appear), pp. pp 158-170, Oct, 2021, Darmstadt, Germany, Springer, https://link.springer.com/chapter/10.100...
 

Abstract
Session authentication schemes establish the identity of the user only at the beginning of the session, so they are vulnerable to attacks that tamper with communications after the establishment of the authenticated session. Moreover, smartphones themselves are used as authentication means, especially in two-factor authentication schemes, which are often required by several services. Whether the smartphone is in the hands of the legitimate user constitutes a great concern, and correspondingly whether the legitimate user is the one who uses the services. In response to these concerns, Behavioral Biometrics (BB) Continuous Authentication (CA) technologies have been proposed on a large corpus of literature. This paper presents a research on the development and validation of a BBCA system (named BioPrivacy), that is based on the user’s keystroke dynamics, using a Multi-Layer Perceptron (MLP). Also, we introduce a new behavioral biometrics collection tool, and we propose a methodology for the selection of an appropriate set of behavioral biometrics. Our system achieved 97.18% Accuracy, 0.02% Equal Error Rate (EER), 97.2% True Acceptance Rate (TAR) and 0.02% False Acceptance Rate (FAR).

Ioannis Stylios, S. Kokolakis, P. Andriotis, Privacy decision-making in the digital era: A game theoretic review, International Conference on Human Aspects of Information Security, Privacy, and Trust, Theo Tryfonas, (ed), pp. 589-603, Jul, 2017, Vancouver, Canada, Springer, Cham, https://link.springer.com/chapter/10.100...
 

Abstract
Information privacy is constantly negotiated when people interact with enterprises and government agencies via the Internet. In this context, all relevant stakeholders take privacy-related decisions. Individuals, either as consumers buying online products and services or citizens using e-government services, face decisions with regard to the use of online services, the disclosure of personal information, and the use of privacy enhancing technologies. Enterprises make decisions regarding their investments on policies and technologies for privacy protection. Governments also decide on privacy regulations, as well as on the development of e-government services that store and process citizens’ personal information. Motivated by the aforementioned issues and challenges, we focus on aspects of privacy decision-making in the digital era and address issues of individuals’ privacy behavior. We further discuss issues of strategic privacy decision-making for online service providers and e-government service providers.

Ioannis Stylios, S. Kokolakis, Thanou, O., Chatzis, S., User's Attitudes on Mobile Devices: Can Users' Practices Protect Their Sensitive Data?, 10th Mediterranean Conference on Information Systems (MCIS) 2016, Sep, 2016, https://www.researchgate.net/publication...
 

Abstract
Smartphones are the most popular personal electronic devices. They are used for all sorts of purposes, from managing bank accounts to playing games. As smartphone apps and services proliferate, the amount of sensitive data stored on or processed by handheld devices rise as well. This practice entails risks, such as violating users’ privacy, stealing users’ identities, etc. Particularly, stealing an unlocked device grants full access to sensitive data and applications. In this survey, we examine whether users adopt some basic practices to protect their sensitive personal data themselves, or is there a need to further strengthen their protection? Our statistical analysis assesses smartphone users’ security attitudes and practices among different age groups. Finally, we investigate the factors that affect the attitude of users with respect to their practices for the protection of personal data.The results of this study, show that while many smartphone users do take some security precautions, a high percentage (24%) of them still ignores security and privacy risks. In addition, 19,1 % of users do not follow any practices to protect their PINs and Passwords.\r\nKeywords: Mobile Phones, Privacy Risk, Users Attitudes, Survey.

Ioannis Stylios, Thanou, O., Iosif Androulidakis, Elena Zaitseva, A Review of Continuous Authentication Using Behavioral Biometrics, ACM SEEDA-CECNSM 2016, Sep, 2016, ACM, https://www.researchgate.net/publication...
 

Abstract
Abstract —The present study carries out a literature review on the topic of Continuous Authentication (CA) using behavioral biometrics. CA systems have been proposed in order to solve the shortcomings of other user authentication methods. CA processes are considered to raise systems security and reliability, and biometric technologies have increasingly become part of security architectures. Since some of uni-biometrics' vulnerabilities have already been revealed, they have been replaced or enhanced by multi-biometrics where behavioral biometrics are gaining ground as a new way of establishing the identity of a user. We therefore present a collection of selected published sources relevant to this topic accompanied by annotation, critical analysis of contents and, in some cases apposition of the main conclusions of each work. This work can help new researchers, scientists and the industry develop new systems and technologies by providing them a ready to use literature base with theoretical and practical aspects on Continuous Authentication using behavioral biometrics. Keywords — Literature Review Mobile Phones, Privacy Risk, Behavioral Biometrics, Continuous Authentication.

Ioannis Stylios, Thanou, O., Iosif Androulidakis, Elena Zaitseva, Communication Security & Cyberbullying: A Review of the Legal Issues, ACM SEEDA-CECNSM 2016, Sep, 2016, ACM, https://www.researchgate.net/publication...
 

Abstract
Abstract — The research of legal issues concerning the cyberspace is complex because it requires not only legal but also technical knowledge. The present paper examines the challenges and answers stemming from three main research questions: a) are there gaps in legislation concerning cyberbullying? b) Does the penal legislator consider security in cyberspace as a legal asset? c) How is cyberbullying treated in the legal system? By taking into account the existing legal and social dimensions of the issue, and triggered by those three research questions, we conclude that the creation of a global framework of internet behavior rules, internet legislation and communication security policies is absolutely necessary. Keywords — Cyberbullying, Legislation, Communication Security.

Ioannis Stylios, Chatzis, S., Thanou, O., S. Kokolakis, Mobile Phones & Behavioral Modalities: Surveying users’ practices, TELFOR 2015 International IEEE Conference, Nov, 2015, IEEE, https://www.researchgate.net/publication...
 

Abstract
Abstract — Mobile phones are one of the most popular means of access to the internet. Users, via the telephone, connect to different services such as: Google, social networks, work accounts, banks accounts, etc. Those services, are many times, left open in their device. This enables risks, such as, loss or/and the violation of their personal data. In addition, in case of device theft after login, full access to sensitive data and applications may be fully granted. The purpose of this research is to analyze the most salient patterns characterizing user practices regarding certain behavioral modalities including: the way of using the various applications, power consumption, touch gestures and guest users’ habits. To this end, we used an original questionnaire, created for the needs of the specific survey, to examine whether we can find some trends among the users. This can give us a qualitative information, for the different behaviors / “characters” of users, in order to be used in further research regarding User’s Continuous Authentication. Keywords — Mobile Phones, Behavioral Modalities, Continuous Authentication, Survey.

G. Tzelepis, T. Skentos, Ioannis Stylios, Study and environmental surveying on the Fire of Parnitha with Geographic Information Systems (GIS) for similar natural risk management in the future, 8th Hellenic Conference HellasGIs, Dec, 2014, HellasGIs, https://www.researchgate.net/publication...
 

Abstract
Οι δασικές πυρκαγιές αποτελούν έναν από τους σημαντικότερους κινδύνους του φυσικού και ανθρωπογενούς περιβάλλοντος που καλείται να αντιμετωπίσει η Ελλάδα κατά τους θερινούς μήνες. Τα τελευταία χρόνια γίνεται μία προσπάθεια για διεπιστημονική προσέγγιση των φυσικών κινδύνων που αντλεί τεχνικές και εργαλεία από μία μεγάλη γκάμα επιστημών (γεωλογία, δασολογία, γεωγραφία, επιστήμες μηχανικού, πληροφορική κ.α.). Σκοπός του άρθρου είναι η παρουσίαση της μελέτης και της εκτίμησης των περιβαλλοντικών επιπτώσεων από την πυρκαγιά και η εξαγωγή ποσοτικών και ποιοτικών δεδομένων για τις χρήσεις γης με χρήση σύγχρονων τεχνικών τηλεπισκόπησης και η περιβαλλοντική αποτύπωση της πυρκαγιάς με Σύστηματα Γεωγραφικών Πληροφοριών (ΣΓΠ), γνωστά ευρέως και ως G.I.S. Geographic Information Systems. Η παρούσα μελέτη αναδεικνύει τον κομβικό ρόλο των ΣΓΠ και των τεχνικών Τηλεπισκόπισης σε θέματα πρόληψης και διαχείρισης φυσικών καταστροφών.

Ioannis Stylios, V. Vlachos, Iosif Androulidakis, Performance Comparison of Machine Learning Algorithms for Diagnosis of Cardiotocograms with Class Inequality, TELFOR 2014 International IEEE Conference, Nov, 2014, IEEE, https://www.researchgate.net/publication...
 

Abstract
Abstract — The objective of the present paper is to demonstrate the potential of Computational Intelligence in applications pertaining to the automatic identification – categorisation of Cardiotocograms using Machine Learning Algorithms and Artificial Neural Networks whose purpose is to distinguish between healthy or pathological cases leading to mortality during birth or fetal cerebral palsy. Interest is also placed on the performance of the Machine learning algorithms and the comparison of the classifiers’ results.

Iosif Androulidakis, V. Christou, N. Bardis, Ioannis Stylios, Surveying user’s practices regarding mobile phone’s security features, 3rd WSEAS International Conference, Jun, 2009, https://www.researchgate.net/publication...
 

Abstract
Abstract: Despite the fact that mobile phone’s security measures have been increased during the last years, users don’t take the necessary measures to avoid a possible unauthorized access and/or sensitive data retrieval from their mobile phone. In order to investigate this issue, in this paper, we present the results of a survey conducted in the University of Ioannina, Greece according to which 282 participants were asked about quite many key factors concerning their mobile phone security. The results are very interesting and can be considered as a potential guide by various mobile operators for their future technological investments and their customer’s briefing about mobile’s phone security.

Books


Copyright Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted or mass reproduced without the explicit permission of the copyright holder.


Chapters in Books


Copyright Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted or mass reproduced without the explicit permission of the copyright holder.


Conferences Proceedings Editor


Copyright Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted or mass reproduced without the explicit permission of the copyright holder.