Inside IoT Security (Part 2):Attacks, Threat Models,  and Defense Strategies
Mohamed Eltabakh
Inside IoT Security (Part 2):Attacks, Threat Models, and Defense Strategies
2:43:14
Inside IoT Security (Part 1): Attacks, Threat Models, and Defense Strategies
Mohamed Eltabakh
Inside IoT Security (Part 1): Attacks, Threat Models, and Defense Strategies
2:36:33
When Sensors Start to Understand: AI Driven Decision Making in Connected IoT Systems
Mohamed Eltabakh
When Sensors Start to Understand: AI Driven Decision Making in Connected IoT Systems
1:58:11
Trust in Motion: Blockchain for IoT, AI, and Cyber‑Physical Systems
Mohamed Eltabakh
Trust in Motion: Blockchain for IoT, AI, and Cyber‑Physical Systems
1:38:54
From idea to production (Part 1): The journey of designing and manufacturing an IoT product
Mohamed Eltabakh
From idea to production (Part 1): The journey of designing and manufacturing an IoT product
2:00:03
From Ingredients to Image  Cooking Custom Linux Systems
Mohamed Eltabakh
From Ingredients to Image Cooking Custom Linux Systems
2:08:04
Introduction to Edge AI and TinyML
Mohamed Eltabakh
Introduction to Edge AI and TinyML
1:46:54
From idea to production (Part 2): The journey of designing and manufacturing an IoT product
Mohamed Eltabakh
From idea to production (Part 2): The journey of designing and manufacturing an IoT product
2:02:13