Internet of Things Dersi Koleksiyonu
Recent Submissions
-
AI/ML for IoT Security Anomaly Detection, Threat Intelligence, and Adversarial Risks
(2025)Week 14 : AI/ML for IoT Security Anomaly Detection, Threat Intelligence, and Adversarial Risks -
Cryptography & Authentication in IoT Securing Devices, Data, and Communications
(2025)Week 13 : Cryptography & Authentication in IoT Securing Devices, Data, and Communications -
Common IoT Vulnerabilities & Attack Vectors Weak Authentication, Firmware Exploits, and Beyond
(2025)Week 12 : Common IoT Vulnerabilities & Attack Vectors Weak Authentication, Firmware Exploits, and Beyond -
Introduction to IoT Security Challenges Heterogeneity, Constraints, and Attack Surfaces
(2025)Week 11 : Introduction to IoT Security Challenges Heterogeneity, Constraints, and Attack Surfaces -
RFID in IoT Systems Components, Applications, and Integration
(2025)Week 10 : RFID in IoT Systems Components, Applications, and Integration -
Wireless Sensor Devices & WSNs Key Components, Topologies, and IoT Applications
(2025)Week 9 : Wireless Sensor Devices & WSNs Key Components, Topologies, and IoT Applications -
IoT Stack vs. Web Stack Key Architectural Differences
(2025)Week 8 : IoT Stack vs. Web Stack Key Architectural Differences -
Understanding TCP and Client-Server Communication in IoT
(2025)Week 7 : Understanding TCP and Client-Server Communication in IoT -
Unlocking Potential: IoT Platforms to Kickstart Your Project
(2025)Week 3 : Unlocking Potential: IoT Platforms to Kickstart Your Project -
ESP-IDF Hello World Example Getting Started with ESP32-S3 and VS Code
(2025)Week 2 : ESP-IDF Hello World Example Getting Started with ESP32-S3 and VS Code -
Introduction to IoT and ESP32-S3 ESP-IDF Development Environment
(2025)Week 1: Introduction to IoT and ESP32-S3 ESP-IDF Development Environment