Dimitrios Zissis
University of the Aegean
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Dimitrios Zissis.
Future Generation Computer Systems | 2012
Dimitrios Zissis; Dimitrios Lekkas
The recent emergence of cloud computing has drastically altered everyones perception of infrastructure architectures, software delivery and development models. Projecting as an evolutionary step, following the transition from mainframe computers to client/server deployment models, cloud computing encompasses elements from grid computing, utility computing and autonomic computing, into an innovative deployment architecture. This rapid transition towards the clouds, has fuelled concerns on a critical issue for the success of information systems, communication and information security. From a security perspective, a number of unchartered risks and challenges have been introduced from this relocation to the clouds, deteriorating much of the effectiveness of traditional protection mechanisms. As a result the aim of this paper is twofold; firstly to evaluate cloud security by identifying unique security requirements and secondly to attempt to present a viable solution that eliminates these potential threats. This paper proposes introducing a Trusted Third Party, tasked with assuring specific security characteristics within a cloud environment. The proposed solution calls upon cryptography, specifically Public Key Infrastructure operating in concert with SSO and LDAP, to ensure the authentication, integrity and confidentiality of involved data and communications. The solution, presents a horizontal level of service, available to all implicated entities, that realizes a security mesh, within which essential trust is maintained.
Government Information Quarterly | 2011
Dimitrios Zissis; Dimitrios Lekkas
Abstract The idea, the concept, and the term, that is cloud computing, has recently passed into common currency and the academic lexicon in an ambiguous manner, as cloud dust is being sprinkled on an excess of emerging products. Exorcising complexity and protecting against the caprice of the moment, this paper explores the notion behind the hype of cloud computing and evaluates its relevance to electronic government and electronic voting information systems. This paper explores increasing participation and sophistication of electronic government services, through implementing a cloud computing architecture. From an Information and Communication Security perspective, a structured analysis is adopted to identify vulnerabilities, involved in the digitalization of government transactions and the electoral process, exploring the notion of trust and transparency within this context. In turn, adopting a cloud computing approach for electronic government and electronic voting solutions is investigated, reviewing the architecture within the previously described context. Taking a step further, this paper proposes a high level electronic governance and electronic voting solution, supported by cloud computing architecture and cryptographic technologies, additionally identifying issues that require further research.
Procedia Computer Science | 2014
Roxani Skiada; Eva Soroniati; Anna Gardeli; Dimitrios Zissis
Abstract Dyslexia is one of the most common learning disabilities experienced by children and adults. A large amount of research is currently being conducted in exploring the benefits of using Information & Communication Technologies as a learning platform for individuals and especially children with such learning difficulties. Given the potential benefits, we focused on developing a mobile application which could foster learning and help children improve some of their fundamental skills, such as reading comprehension, orthographic coding, short-term memory and mathematical problem solving. We attempted to design a stimulating and interactive experience for children, which could encourage the learning process. Our main focus was to assess the usability of the technology, evaluate how it affects the learning experience, its consequences and the benefits it offers to each user. In this paper we present the methodology, environment setup, design choices, implementation and the results of our preliminary evaluation and assessment of “EasyLexia”, a mobile application for children with learning difficulties. Preliminary results show the promising prospects mobile learning holds in such contexts.
Applied Soft Computing | 2015
Dimitrios Zissis; Elias K. Xidias; Dimitrios Lekkas
We train an Artificial Neural Network (ANN) to predict future vessels behavior.We study if an ANN is capable of inferring the unique behaviour of a vessel.We design, train and implement a proof of concept ANN as a cloud based web app.The derived ANN has the ability to predict short and long term vessel behaviour. Progressively huge amounts of data, tracking vessels during their voyages across the seas, are becoming available, mostly due to the automatic identification system (AIS) that vessels of specific categories are required to carry. These datasets provide detailed insights into the patterns vessels follow, while safely navigating across the globe, under various conditions. In this paper, we develop an Artificial Neural Network (ANN) capable of predicting a vessels future behaviour (position, speed and course), based on events that occur in a predictable pattern, across large map areas. The main concept of this study is to determine if an ANN is capable of inferring the unique behavioural patterns that each vessel follows and successively use this as a means for predicting multiple vessel behaviour into a future point in time. We design, train and implement a proof of concept ANN, as a cloud based web application, with the ability of overlaying predicted short and long term vessel behaviour on an interactive map. Our proposed approach could potentially assist in busy port scheduling, vessel route planning, anomaly detection and increasing overall Maritime Domain Awareness.
Evolving Systems | 2016
Dimitrios Zissis; Elias K. Xidias; Dimitrios Lekkas
Abstract Vessel traffic management systems (VTMS) and vessel traffic monitoring information systems (VTMIS) have been available for a number of years now. These systems have significantly contributed to increasing the efficiency and safety of operations at sea. However, nowadays, risks at sea are once again on the rise, thus demanding an evolution in VTMS and VTMIS, such that they can support a human operator’s better understanding of the complex reality at sea and enhance his or her decision-making in light of danger. A critical requirement of such systems, is that they exhibit the ability to for-see unfolding cautious and potentially hazardous situations, so as to propose measures of danger avoidance. In this study, we employ machine learning, and specifically artificial neural networks, as a tool to add predictive capacity to VTMIS. The main objective of this study is to implement a publicly accessible, web-based system capable of real time learning and accurately predicting any vessels future behavior in low computational time. This work describes our approach, design choices, implementation and evaluation details, while we present a proof of concept prototype system. Our proposal can potentially be used as the predictive foundation for various intelligent systems, including vessel collision prevention, vessel route planning, operation efficiency estimation and even anomaly detection systems.
Journal of Systems and Software | 2017
Angelos Valsamis; Konstantinos Tserpes; Dimitrios Zissis; Dimosthenis Anagnostopoulos; Theodora A. Varvarigou
A real-time trajectory prediction application is proposed.Performance vs. accuracy between big-data tailored solutions and traditional methods.Ignoring time element in time-series data can help in generalization of model. In this paper, we model the trajectory of sea vessels and provide a service that predicts in near-real time the position of any given vessel in 4, 10, 20 and 40 time intervals. We explore the necessary tradeoffs between accuracy, performance and resource utilization is explored given the large volume and update rates of input data. We start with building models based on well-established machine learning algorithms using static datasets and multi-scan training approaches and identify the best candidate to be used in implementing a single-pass predictive approach, under real-time constraints. The results are measured in terms of accuracy and performance and are compared against the baseline kinematic equations. Results show that it is possible to efficiently model the trajectory of multiple vessels using a single model, which is trained and evaluated using an adequately large, static dataset, thus achieving a significant gain in terms of resource usage while not compromising accuracy.
Archive | 2014
Dimitrios Zissis; Dimitrios Lekkas
This book analyzes current research on the integration of modern technologies with traditional democratic systems, providing a framework for designing and deploying electronic voting systems in any context or society--
MobiWIS 2013 Proceedings of the 10th International Conference on Mobile Web Information Systems - Volume 8093 | 2013
Dimitrios Zissis; Dimitrios Lekkas; Panayiotis Koutsabasis
The development of real-time, geospatial mobile applications poses particular challenges regarding their interaction design and technical implementation. In this paper, we present insights into the design and development of the mobile version of MarineTraffic marinetraffic.com, which is an open, community-based project that provides real-time geospatial information about vessel movements and port traffic. During the technical development and deployment of MarineTraffic mobile, we identified a number of 8 principles and 25 guidelines that had to be followed in order to improve the user experience and tackle technical issues. We discuss these guidelines with respect to implementation examples and experiences from the specific mobile applications and we suggest that these guidelines have to be kept in mind for the design and development of similar mobile applications.
ICGS3/e-Democracy | 2011
Dimitrios Zissis; Dimitrios Lekkas; Panayiotis Koutsabasis
In this paper we identify and define cryptographic dysfunctionality and within this context we perform a study to evaluate user perceptions of public key cryptography concepts. The study makes use of user testing, questionnaires and wrap-up interviews with 121 young, but experienced Internet users during their interactions with selected secure Internet locations. The results show that the vast majority of users are not familiar with fundamental concepts of cryptography, and that they are not capable of efficiently managing digital certificates. This case study serves as first evidence supporting our hypothesis that user interface design is deteriorating cryptographic solutions effectiveness due to usability issues.
Computers & Security | 2011
Argyris Arnellos; Dimitrios Lekkas; Dimitrios Zissis; Thomas Spyrou; John Darzentas
The exchange of digitally signed data inherits all the problems related to the indeterminacy of human communication, which are further intensified by the legal implications of signing. One of the fundamental intrinsic weaknesses of digital signatures is that the signer creates a signature on a series of bits, which may be differently transformed and perceived by the verifier (or relying party), due to the inevitable differences in the intention and the purpose of the two agents. As a result, syntactic and semantic distance is introduced between a signer and a relying party. In this paper we suggest a framework that models the process of digital signing, using several virtual and interrelated levels of communication, thereby promoting the analytic and synthetic exploration of the entities and the transformations involved. Based on this exploration, it is possible to indicate the favorable conditions for mutual understanding between the signer and the relying party. We focus on the syntactic and presentation levels of the communication process and we introduce the notion of structural reliability of a syntactic component, as a measure of how securely and accurately a signed document can be used. It is argued that structural reliability depends on a quantitative metric, such as the structural informativeness along with other qualitative characteristics of the syntactic component. The structural reliability of several document representation protocols is evaluated and it is concluded that the higher the informativeness of the protocol, the less the semantic distance produced, provided that the communicating parties have the capacity to handle this protocol.