Search results for "älytalot"
showing 5 items of 5 documents
Artificial Intelligence in Protecting Smart Building’s Cloud Service Infrastructure from Cyberattacks
2020
Gathering and utilizing stored data is gaining popularity and has become a crucial component of smart building infrastructure. The data collected can be stored, for example, into private, public, or hybrid cloud service infrastructure or distributed service by utilizing data platforms. The stored data can be used when implementing services, such as building automation (BAS). Cloud services, IoT sensors, and data platforms can face several kinds of cybersecurity attack vectors such as adversarial, AI-based, DoS/DDoS, insider attacks. If a perpetrator can penetrate the defenses of a data platform, she can cause significant harm to the system. For example, the perpetrator can disrupt a buildin…
Managing sensor data streams in a smart home application
2020
A challenge in developing an ambient activity recognition system for use in elder care is finding a balance between the sophistication of the system and a cost structure that fits within the budgets of public and private sector healthcare organisations. Much activity recognition research in the context of elder care is based on dense networks of sensors and advanced methods, such as supervised machine learning algorithms. This paper presents the data processing aspects of an activity recognition system based on a simpler, knowledge-based unsupervised approach, designed for a sparse network of sensors. By structuring sensor data management as a streaming system, we provide a simple programmi…
Security Controls for Smart Buildings with Shared Space
2022
In this paper we consider cyber security requirements of the smart buildings. We identify cyber risks, threats, attack scenarios, security objectives and related security controls. The work was done as a part of a smart building design and construction work. From the controls identified w e concluded security practices for engineering-in smart buildings security. The paper provides an idea toward which system security engineers can strive in the basic design and implementation of the most critical components of the smart buildings. The intent of the concept is to help practitioners to avoid ad hoc approaches in the development of security mechanisms for smart buildings with shared space. pe…
Digital natives' and immigrants' switching behavior in smart home environment : comparative study
2016
Tämä pro gradu-tutkielma käsitteli diginatiivien ja digi-immigranttien vaihtokäyttäytymistä, kun tarkastellaan kyseisten henkilöryhmien vaihtoa perinteisen asumisen elinympäristöstä ympäristöön, jossa käytetään hyväksi älyteknologiaa. Vaihtokäyttäytymisestä kartoitettiin olemassaolevan teorian pohjalta tekijöitä, jotka vaikuttavat vaihtoinnokkuuteen ja sitä myötä vaihtokäyttäytymiseen vetävästi, työntävästi tai ankkuroivasti. Näiden kahden ryhmän tuloksia verrattiin toisiinsa, jotta saatiin selville eroavaisuuksia vaihtokäyttäytymisessä. Tutkimuksen tavoitteena oli avata keskustelua ja tuoda julki uutta tietoa eri sukupolvien vaihtokäyttäytymisestä tilanteessa, jossa heidän elämäänsä tuodaa…
IoT -based adversarial attack's effect on cloud data platform services in a smart building context
2020
IoT sensors and sensor networks are widely employed in businesses. The common problem is a remarkable number of IoT device transactions are unencrypted. Lack of correctly implemented and robust defense leaves the organization's IoT devices vulnerable to numerous cyber threats, such as adversarial and man-in-the-middle attacks or malware infections. A perpetrator can utilize adversarial examples when attacking machine learning (ML) models, such as convolutional neural networks (CNN) or deep neural networks (DNN) used, e.g., in DaaS cloud data platform service of smart buildings. DaaS cloud data platform's function in this study is to connect data from multiple IoT sensors, databases, private…