Essays about: "Användarbeteende"

Showing result 1 - 5 of 33 essays containing the word Användarbeteende.

  1. 1. Investigating the Impact of User Behavior in the Security of Smart Home IoT Devices

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Maha Ghunaim; [2023]
    Keywords : Smart Homes; Smart Home Devices; Home Automation; User Behavior; Internet of Things IoT ; Smarta hem; smarta hemenheter; hemautomation; användarbeteende; internet av Saker IoT ; المنازل الذكية ، أجهزة المنزل الذكي ، أتمتة المنزل ، سلوك المستخدم ، إنترنت أشياء إنترنت الأشياء ;

    Abstract : As technology is growing at a fast pace, IoT-based smart home services are increasingly adopted by people. IoT-based smart homes offer numerous unimaginable benefits, including efficiency, safety, effectiveness, scalability of services, devices, and data, among many others. However, there is another side to this technology: security threats. READ MORE

  2. 2. Unsupervised Clustering of Behavior Data From a Parking Application : A Heuristic and Deep Learning Approach

    University essay from Umeå universitet/Institutionen för matematik och matematisk statistik

    Author : Edvard Magnell; Joakim Nordling; [2023]
    Keywords : ML; Machine learning; clustering; unsupervised learning; deep learning; autoencoder; AI; artificial intelligence;

    Abstract : This report aims to present a project in the field of unsupervised clustering on human behavior in a parking application. With increasing opportunities to collect and store data, the demands to utilize the data in meaningful ways also increase. READ MORE

  3. 3. Evaluating Data Quality for behavioural event data using semiotic theory : Analysing how data roles perceive Data Quality and how it is influenced by Data Quality awareness and experience

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Eleonora Greta Luisa Borzi; [2023]
    Keywords : Data Quality; semiotic framework; big data; data roles; Datakvalitet; semiotiskaramverket; big data; dataroller;

    Abstract : Today companies are handling and producing big data. To maximise the value of the data, companies need to achieve high data quality (DQ), and be able to measure it. This study analyses if semiotic framework is suitable to asses DQ for big data, specifically for behavioural event data. READ MORE

  4. 4. Explainability to enhance creativity : A human-centered approach to prompt engineering and task allocation in text-to-image models for design purposes

    University essay from Luleå tekniska universitet/Institutionen för ekonomi, teknik, konst och samhälle

    Author : Celina Burlin; [2023]
    Keywords : ;

    Abstract : As the power, utility, and prevalence of generative AI technologies continue to grow, the debate on whether and how designers should incorporate text-image models into the design process is gaining momentum. To ensure productivity, creativity, and human values, this project seeks to address design interaction and task allocation between designers, and generative AI models become essential. READ MORE

  5. 5. Towards Realistic Datasets forClassification of VPN Traffic : The Effects of Background Noise on Website Fingerprinting Attacks

    University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)

    Author : Christoffer Sandquist; Jon-Erik Ersson; [2023]
    Keywords : Data collection; Website fingerprinting; dataset; traffic analysis; VPN; encrypted traffic; machine learning; deep learning; network measurements; twitch; Datainsamling; Profilering av hemsidor; dataset; trafikanalys; VPN; krypterad trafik; maskininlärning; djupinlärning; nätverksmätningar; twitch;

    Abstract : Virtual Private Networks (VPNs) is a booming business with significant margins once a solid user base has been established and big VPN providers are putting considerable amounts of money into marketing. However, there exists Website Fingerprinting (WF) attacks that are able to correctly predict which website a user is visiting based on web traffic even though it is going through a VPN tunnel. READ MORE