Search results for "älytalot"

showing 5 items of 5 documents

Artificial Intelligence in Protecting Smart Building’s Cloud Service Infrastructure from Cyberattacks

2020

Gathering and utilizing stored data is gaining popularity and has become a crucial component of smart building infrastructure. The data collected can be stored, for example, into private, public, or hybrid cloud service infrastructure or distributed service by utilizing data platforms. The stored data can be used when implementing services, such as building automation (BAS). Cloud services, IoT sensors, and data platforms can face several kinds of cybersecurity attack vectors such as adversarial, AI-based, DoS/DDoS, insider attacks. If a perpetrator can penetrate the defenses of a data platform, she can cause significant harm to the system. For example, the perpetrator can disrupt a buildin…

Computer scienceDenial-of-service attackCloud computingComputerApplications_COMPUTERSINOTHERSYSTEMStekoälyComputer securitycomputer.software_genreInsiderpilvipalvelutälytalotComponent (UML)cloud servicetietoturvakyberturvallisuusBuilding automationbusiness.industryattack vectorsartificial intelligencePopularityartificial-intelligence-based applicationsHeating systemälytekniikkabusinessdata platformCloud storagecomputerverkkohyökkäykset
researchProduct

Managing sensor data streams in a smart home application

2020

A challenge in developing an ambient activity recognition system for use in elder care is finding a balance between the sophistication of the system and a cost structure that fits within the budgets of public and private sector healthcare organisations. Much activity recognition research in the context of elder care is based on dense networks of sensors and advanced methods, such as supervised machine learning algorithms. This paper presents the data processing aspects of an activity recognition system based on a simpler, knowledge-based unsupervised approach, designed for a sparse network of sensors. By structuring sensor data management as a streaming system, we provide a simple programmi…

Computer sciencesmart homeComputer Networks and CommunicationsData managementsensor data streamskotihoitoContext (language use)sensor data processing02 engineering and technology01 natural sciencesActivity recognitionwireless sensor networkHome automationälytalotpassive infrared sensor0202 electrical engineering electronic engineering information engineeringactivity recognitionanturitElectrical and Electronic EngineeringgeroteknologiaData stream miningbusiness.industry010401 analytical chemistryPublic sectorsensoriverkothealthcare020206 networking & telecommunicationsData sciencesensor data managementWSNsensor data0104 chemical sciencesComputer Science ApplicationsPIRControl and Systems EngineeringProgramming paradigmälytekniikkabusinesshome careWireless sensor networkInternational Journal of Sensor Networks
researchProduct

Security Controls for Smart Buildings with Shared Space

2022

In this paper we consider cyber security requirements of the smart buildings. We identify cyber risks, threats, attack scenarios, security objectives and related security controls. The work was done as a part of a smart building design and construction work. From the controls identified w e concluded security practices for engineering-in smart buildings security. The paper provides an idea toward which system security engineers can strive in the basic design and implementation of the most critical components of the smart buildings. The intent of the concept is to help practitioners to avoid ad hoc approaches in the development of security mechanisms for smart buildings with shared space. pe…

IoTturvallisuussuunnitteluälytalotrakennusautomaatiosmart buildingesineiden internetsecurity riskskyberturvallisuushaavoittuvuussecurity controls2022 6th International Conference on Smart Grid and Smart Cities (ICSGSC)
researchProduct

Digital natives' and immigrants' switching behavior in smart home environment : comparative study

2016

Tämä pro gradu-tutkielma käsitteli diginatiivien ja digi-immigranttien vaihtokäyttäytymistä, kun tarkastellaan kyseisten henkilöryhmien vaihtoa perinteisen asumisen elinympäristöstä ympäristöön, jossa käytetään hyväksi älyteknologiaa. Vaihtokäyttäytymisestä kartoitettiin olemassaolevan teorian pohjalta tekijöitä, jotka vaikuttavat vaihtoinnokkuuteen ja sitä myötä vaihtokäyttäytymiseen vetävästi, työntävästi tai ankkuroivasti. Näiden kahden ryhmän tuloksia verrattiin toisiinsa, jotta saatiin selville eroavaisuuksia vaihtokäyttäytymisessä. Tutkimuksen tavoitteena oli avata keskustelua ja tuoda julki uutta tietoa eri sukupolvien vaihtokäyttäytymisestä tilanteessa, jossa heidän elämäänsä tuodaa…

langaton tiedonsiirtodiginatiivivaihtokäyttäytyminenälykotiälytalotdiginatiivit
researchProduct

IoT -based adversarial attack's effect on cloud data platform services in a smart building context

2020

IoT sensors and sensor networks are widely employed in businesses. The common problem is a remarkable number of IoT device transactions are unencrypted. Lack of correctly implemented and robust defense leaves the organization's IoT devices vulnerable to numerous cyber threats, such as adversarial and man-in-the-middle attacks or malware infections. A perpetrator can utilize adversarial examples when attacking machine learning (ML) models, such as convolutional neural networks (CNN) or deep neural networks (DNN) used, e.g., in DaaS cloud data platform service of smart buildings. DaaS cloud data platform's function in this study is to connect data from multiple IoT sensors, databases, private…

pilvipalvelutadversarial attacksartificial intelligence-based applicationsälytalotälytekniikkaesineiden internetattack vectorscloud servicetekoälytietoturvadata platformverkkohyökkäykset
researchProduct