<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Only For Tech | Site-Wide Activity</title>
	<link>https://onlyfor.tech/activity/</link>
	<atom:link href="https://onlyfor.tech/activity/feed/" rel="self" type="application/rss+xml" />
	<description>Activity feed for the entire site.</description>
	<lastBuildDate>Sat, 16 May 2026 16:23:17 +0000</lastBuildDate>
	<generator>https://buddypress.org/?v=</generator>
	<language>en-US</language>
	<ttl>30</ttl>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>2</sy:updateFrequency>
	
						<item>
				<guid isPermaLink="false">71d7f2509d6e6352888a064c529c5957</guid>
				<title>An authentication bypass security issue has been identified in the cPanel software (including DNSOnly) affecting all versions after 11.40.</title>
				<link>https://onlyfor.tech/activity/p/1375/</link>
				<pubDate>Wed, 29 Apr 2026 20:44:52 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p>An authentication bypass security issue has been identified in the cPanel software (including DNSOnly) affecting all versions after 11.40.</p>
</div>]]></content:encoded>
				
									<slash:comments>1</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">5c7ebf87ba1281d86fcf0900e5438edb</guid>
				<title>Mourad ELGORMA posted an update in the group Network engineers</title>
				<link>https://onlyfor.tech/activity/p/1372/</link>
				<pubDate>Sat, 28 Mar 2026 18:34:58 +0000</pubDate>

				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">2e1c98714fe175a4794d9576b63bb775</guid>
				<title></title>
				<link>https://onlyfor.tech/activity/p/1371/</link>
				<pubDate>Sat, 28 Mar 2026 18:34:32 +0000</pubDate>

				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">4d1ed540c8423d692e332e0833468fd8</guid>
				<title>https://doi.org/10.1109/DAT.2017.7889183</title>
				<link>https://onlyfor.tech/activity/p/1370/</link>
				<pubDate>Sat, 28 Mar 2026 18:34:11 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p><a target="_blank" href="https://doi.org/10.1109/DAT.2017.7889183" rel="nofollow ugc">https://doi.org/10.1109/DAT.2017.7889183</a></p>
</div><div class="youzify-post-attachments">
		<a class="youzify-wall-link-content" rel="nofollow" href="https://doi.org/10.1109/DAT.2017.7889183" target="_blank">
			<img loading="lazy" class='lazyload' data-src='https://ieeexplore.ieee.org/assets/img/ieee_logo_smedia_200X200.png' alt="">			<div class="youzify-wall-link-data">
				<div class="youzify-wall-link-title">Embedded BeagleBone based Wi-Fi intrusions detector and vulnerabilities checker</div>				<div class="youzify-wall-link-desc">It is common in any institution to deploy several wireless nodes allowing access to local network resources and the Internet. All deployed wireless access nodes may suffer from vulnerabilities and data integrity. This paper aims to present the development we have done for wireless device based on BeagleBone embedded board, to detect existent nearby malicious use on Wi-Fi wireless networks. Our developed embedded device is able to test the security and integrity level of nearby wireless access points based on the Wi-Fi stack protocols.</div>				<div class="youzify-wall-link-url">doi.org</div>			</div>
		</a>
		</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">48439258aa8aeb1fa7c7533ad2969afd</guid>
				<title>https://doi.org/10.1109/DAT.2017.7889183</title>
				<link>https://onlyfor.tech/activity/p/1369/</link>
				<pubDate>Sat, 28 Mar 2026 18:33:56 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p><a target="_blank" href="https://doi.org/10.1109/DAT.2017.7889183" rel="nofollow ugc">https://doi.org/10.1109/DAT.2017.7889183</a></p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">33e3c050ad8885a3d845864d39d31130</guid>
				<title>https://doi.org/10.1109/ICEEAC61226.2024.10576534</title>
				<link>https://onlyfor.tech/activity/p/1368/</link>
				<pubDate>Sat, 28 Mar 2026 18:33:25 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p><a target="_blank" href="https://doi.org/10.1109/ICEEAC61226.2024.10576534" rel="nofollow ugc">https://doi.org/10.1109/ICEEAC61226.2024.10576534</a></p>
</div><div class="youzify-post-attachments">
		<a class="youzify-wall-link-content" rel="nofollow" href="https://doi.org/10.1109/ICEEAC61226.2024.10576534" target="_blank">
			<img loading="lazy" class='lazyload' data-src='https://ieeexplore.ieee.org/assets/img/ieee_logo_smedia_200X200.png' alt="">			<div class="youzify-wall-link-data">
				<div class="youzify-wall-link-title">A Review of Methods for Detecting and Preventing Drowning Incorporating Various Techniques, Devices and Technologies</div>				<div class="youzify-wall-link-desc">Security and saving humans have been important subjects for humanity for years, and as we know, there are many reasons to die. One of these reasons is drowning. The World Health Organization estimates that 236,000 people die because of drowning every year, and 90% of these incidents are situated in low and middle-income countries. In relation to that, we define earlier technologically assisted methodologies to prevent drowning. In recent years, two kinds of approaches have emerged as solutions to detect previous drowning incidents. The first approach involves the use of video processing technology in conjunction with cameras to identify individuals in distress. The second approach uses Internet of Things (IoT) objects to detect and alert to drowning incidents. In this survey paper, we evaluate the performance and weaknesses of these two methods and provide insights into their potential for improving drowning detection and prevention efforts.</div>				<div class="youzify-wall-link-url">doi.org</div>			</div>
		</a>
		</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">7e418f316e61644810a76e3703cdf66a</guid>
				<title>10.1109/ICEEAC61226.2024.10576534</title>
				<link>https://onlyfor.tech/activity/p/1367/</link>
				<pubDate>Sat, 28 Mar 2026 18:32:21 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p>10.1109/ICEEAC61226.2024.10576534</p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">707518d55843b667aa3a18f6c99b3ac6</guid>
				<title>Mourad ELGORMA: Edge Intelligence: Paving the Last Mile of [&#133;]</title>
				<link>https://onlyfor.tech/activity/p/1365/</link>
				<pubDate>Thu, 26 Mar 2026 17:25:17 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p>    <img loading="lazy" src='https://source.unsplash.com/800x400/?technology,ai,iot' /></p>
<p>    <strong>Edge Intelligence: Paving the Last Mile of Artificial Intelligence With Edge Computing</strong><br />
    &#x1f468;&#x200d;&#x1f52c; Zhi Zhou, Xu Chen, En Li, Liekang Zeng, Ke Luo, Junshan Zhang<br />
    &#x1f4c5; 2019-06-12<br />
    &#x1f4d6; <br />
    &#x1f517; DOI: <a target="_blank" href="https://doi.org/10.1109/jproc.2019.2918951" rel="nofollow ugc">https://doi.org/10.1109/jproc.2019.2918951</a><br />
    &#x1f4ca; Citations: 2062<br />
    &#x1f513; Open Access</p>
<p>    <strong>Abstract:</strong><br />With the breakthroughs in deep learning, the recent&hellip;<span class="activity-read-more" id="activity-read-more-1365"><a target="_blank" href="https://onlyfor.tech/activity/p/1365/" rel="nofollow ugc">Read More</a></span></p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">35e03c91bca8c4f23ef3adcae7a1ac92</guid>
				<title>Mourad ELGORMA: A Survey of AI-Based Anomaly Detection in IoT and [&#133;]</title>
				<link>https://onlyfor.tech/activity/p/1364/</link>
				<pubDate>Thu, 26 Mar 2026 17:25:16 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p>    <img loading="lazy" src='https://source.unsplash.com/800x400/?technology,ai,iot' /></p>
<p>    <strong>A Survey of AI-Based Anomaly Detection in IoT and Sensor Networks</strong><br />
    &#x1f468;&#x200d;&#x1f52c; Kyle DeMedeiros, Abdeltawab Hendawi, Marco Álvarez<br />
    &#x1f4c5; 2023-01-25<br />
    &#x1f4d6; <br />
    &#x1f517; DOI: <a target="_blank" href="https://doi.org/10.3390/s23031352" rel="nofollow ugc">https://doi.org/10.3390/s23031352</a><br />
    &#x1f4ca; Citations: 124<br />
    &#x1f513; Open Access</p>
<p>    <strong>Abstract:</strong><br />Machine learning (ML) and deep learning (DL), in particular, are common tools for anomaly&hellip;<span class="activity-read-more" id="activity-read-more-1364"><a target="_blank" href="https://onlyfor.tech/activity/p/1364/" rel="nofollow ugc">Read More</a></span></p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">520ed774b7624d178728e7f5753cd118</guid>
				<title>Mourad ELGORMA: AI-empowered, blockchain and SDN integrated [&#133;]</title>
				<link>https://onlyfor.tech/activity/p/1363/</link>
				<pubDate>Thu, 26 Mar 2026 17:25:16 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p>    <img loading="lazy" src='https://source.unsplash.com/800x400/?technology,ai,iot' /></p>
<p>    <strong>AI-empowered, blockchain and SDN integrated security architecture for IoT network of cyber physical systems</strong><br />
    &#x1f468;&#x200d;&#x1f52c; Sohaib Latif, Fang B. Xian Wen, Celestine Iwendi, Li-li F. Wang, Syed Muhammad Mohsin, Zhaoyang Han, Shahab S. Band<br />
    &#x1f4c5; 2021-10-12<br />
    &#x1f4d6; <br />
    &#x1f517; DOI: <a target="_blank" href="https://doi.org/10.1016/j.comcom.2021.09.029" rel="nofollow ugc">https://doi.org/10.1016/j.comcom.2021.09.029</a><br />
    &#x1f4ca; Citations: 203<br />
    &#x1f513;&hellip;<span class="activity-read-more" id="activity-read-more-1363"><a target="_blank" href="https://onlyfor.tech/activity/p/1363/" rel="nofollow ugc">Read More</a></span></p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">36d1b2ca9e360597617cb0ba93b02f5d</guid>
				<title>Mourad ELGORMA: Data traffic management in AI-IoT network to reduce [&#133;]</title>
				<link>https://onlyfor.tech/activity/p/1362/</link>
				<pubDate>Thu, 26 Mar 2026 17:25:15 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p>    <img loading="lazy" src='https://source.unsplash.com/800x400/?technology,ai,iot' /></p>
<p>    <strong>Data traffic management in AI-IoT network to reduce congestion</strong><br />
    &#x1f468;&#x200d;&#x1f52c; Muhammad Usama, Ubaid Ullah, Zaid Muhammad, Muhammad Bux, Inam Ullah, Muhammad Rouf, Taminul Islam<br />
    &#x1f4c5; 2024-06-20<br />
    &#x1f4d6; <br />
    &#x1f517; DOI: <a target="_blank" href="https://doi.org/10.1201/9781003496410-10" rel="nofollow ugc">https://doi.org/10.1201/9781003496410-10</a><br />
    &#x1f4ca; Citations: 6<br />
    &#x1f513; Closed</p>
<p>    <strong>Abstract:</strong><br />As the artificial intelligence–internet of t&hellip;<span class="activity-read-more" id="activity-read-more-1362"><a target="_blank" href="https://onlyfor.tech/activity/p/1362/" rel="nofollow ugc">Read More</a></span></p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">b7625678794915a5b6177110a7ab6a88</guid>
				<title>Mourad ELGORMA: AI-Based Two-Stage Intrusion Detection for Software [&#133;]</title>
				<link>https://onlyfor.tech/activity/p/1361/</link>
				<pubDate>Thu, 26 Mar 2026 17:25:15 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p>    <img loading="lazy" src='https://source.unsplash.com/800x400/?technology,ai,iot' /></p>
<p>    <strong>AI-Based Two-Stage Intrusion Detection for Software Defined IoT Networks</strong><br />
    &#x1f468;&#x200d;&#x1f52c; Jiaqi Li, Zhifeng Zhao, Rongpeng Li, Honggang Zhang<br />
    &#x1f4c5; 2018-11-26<br />
    &#x1f4d6; <br />
    &#x1f517; DOI: <a target="_blank" href="https://doi.org/10.1109/jiot.2018.2883344" rel="nofollow ugc">https://doi.org/10.1109/jiot.2018.2883344</a><br />
    &#x1f4ca; Citations: 236<br />
    &#x1f513; Closed</p>
<p>    <strong>Abstract:</strong><br />Software defined Internet of Things (SD-IoT) networks profit from centralized&hellip;<span class="activity-read-more" id="activity-read-more-1361"><a target="_blank" href="https://onlyfor.tech/activity/p/1361/" rel="nofollow ugc">Read More</a></span></p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">546e972155f41dc43762af1bd65acb69</guid>
				<title>Mourad ELGORMA: Edge Intelligence: Paving the Last Mile of [&#133;]</title>
				<link>https://onlyfor.tech/activity/p/1360/</link>
				<pubDate>Wed, 25 Mar 2026 21:18:31 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p>    <img loading="lazy" src='https://source.unsplash.com/800x400/?technology,ai,iot' /></p>
<p>    <strong>Edge Intelligence: Paving the Last Mile of Artificial Intelligence With Edge Computing</strong><br />
    &#x1f468;&#x200d;&#x1f52c; Zhi Zhou, Xu Chen, En Li, Liekang Zeng, Ke Luo, Junshan Zhang<br />
    &#x1f4c5; 2019-06-12<br />
    &#x1f4d6; <br />
    &#x1f517; DOI: <a target="_blank" href="https://doi.org/10.1109/jproc.2019.2918951" rel="nofollow ugc">https://doi.org/10.1109/jproc.2019.2918951</a><br />
    &#x1f4ca; Citations: 2061<br />
    &#x1f513; Open Access</p>
<p>    <strong>Abstract:</strong><br />With the breakthroughs in deep learning, the recent&hellip;<span class="activity-read-more" id="activity-read-more-1360"><a target="_blank" href="https://onlyfor.tech/activity/p/1360/" rel="nofollow ugc">Read More</a></span></p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">83b6ed5693e42694c7b70c5eb7f3e105</guid>
				<title>Mourad ELGORMA: A Survey of AI-Based Anomaly Detection in IoT and [&#133;]</title>
				<link>https://onlyfor.tech/activity/p/1359/</link>
				<pubDate>Wed, 25 Mar 2026 21:18:31 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p>    <img loading="lazy" src='https://source.unsplash.com/800x400/?technology,ai,iot' /></p>
<p>    <strong>A Survey of AI-Based Anomaly Detection in IoT and Sensor Networks</strong><br />
    &#x1f468;&#x200d;&#x1f52c; Kyle DeMedeiros, Abdeltawab Hendawi, Marco Álvarez<br />
    &#x1f4c5; 2023-01-25<br />
    &#x1f4d6; <br />
    &#x1f517; DOI: <a target="_blank" href="https://doi.org/10.3390/s23031352" rel="nofollow ugc">https://doi.org/10.3390/s23031352</a><br />
    &#x1f4ca; Citations: 123<br />
    &#x1f513; Open Access</p>
<p>    <strong>Abstract:</strong><br />Machine learning (ML) and deep learning (DL), in particular, are common tools for anomaly&hellip;<span class="activity-read-more" id="activity-read-more-1359"><a target="_blank" href="https://onlyfor.tech/activity/p/1359/" rel="nofollow ugc">Read More</a></span></p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">ca36747620846352da7b86cd0d98e008</guid>
				<title>Mourad ELGORMA: AI-empowered, blockchain and SDN integrated [&#133;]</title>
				<link>https://onlyfor.tech/activity/p/1358/</link>
				<pubDate>Wed, 25 Mar 2026 21:18:30 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p>    <img loading="lazy" src='https://source.unsplash.com/800x400/?technology,ai,iot' /></p>
<p>    <strong>AI-empowered, blockchain and SDN integrated security architecture for IoT network of cyber physical systems</strong><br />
    &#x1f468;&#x200d;&#x1f52c; Sohaib Latif, Fang B. Xian Wen, Celestine Iwendi, Li-li F. Wang, Syed Muhammad Mohsin, Zhaoyang Han, Shahab S. Band<br />
    &#x1f4c5; 2021-10-12<br />
    &#x1f4d6; <br />
    &#x1f517; DOI: <a target="_blank" href="https://doi.org/10.1016/j.comcom.2021.09.029" rel="nofollow ugc">https://doi.org/10.1016/j.comcom.2021.09.029</a><br />
    &#x1f4ca; Citations: 203<br />
    &#x1f513;&hellip;<span class="activity-read-more" id="activity-read-more-1358"><a target="_blank" href="https://onlyfor.tech/activity/p/1358/" rel="nofollow ugc">Read More</a></span></p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">5246e5eb80f4ccf12ba13567a6704dbe</guid>
				<title>Mourad ELGORMA: Data traffic management in AI-IoT network to reduce [&#133;]</title>
				<link>https://onlyfor.tech/activity/p/1357/</link>
				<pubDate>Wed, 25 Mar 2026 21:18:30 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p>    <img loading="lazy" src='https://source.unsplash.com/800x400/?technology,ai,iot' /></p>
<p>    <strong>Data traffic management in AI-IoT network to reduce congestion</strong><br />
    &#x1f468;&#x200d;&#x1f52c; Muhammad Usama, Ubaid Ullah, Zaid Muhammad, Muhammad Bux, Inam Ullah, Muhammad Rouf, Taminul Islam<br />
    &#x1f4c5; 2024-06-20<br />
    &#x1f4d6; <br />
    &#x1f517; DOI: <a target="_blank" href="https://doi.org/10.1201/9781003496410-10" rel="nofollow ugc">https://doi.org/10.1201/9781003496410-10</a><br />
    &#x1f4ca; Citations: 6<br />
    &#x1f513; Closed</p>
<p>    <strong>Abstract:</strong><br />As the artificial intelligence–internet of t&hellip;<span class="activity-read-more" id="activity-read-more-1357"><a target="_blank" href="https://onlyfor.tech/activity/p/1357/" rel="nofollow ugc">Read More</a></span></p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">10367a3dbf5cceaaaa49ca97d2f25bf3</guid>
				<title>Mourad ELGORMA: AI-Based Two-Stage Intrusion Detection for Software [&#133;]</title>
				<link>https://onlyfor.tech/activity/p/1356/</link>
				<pubDate>Wed, 25 Mar 2026 21:18:29 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p>    <img loading="lazy" src='https://source.unsplash.com/800x400/?technology,ai,iot' /></p>
<p>    <strong>AI-Based Two-Stage Intrusion Detection for Software Defined IoT Networks</strong><br />
    &#x1f468;&#x200d;&#x1f52c; Jiaqi Li, Zhifeng Zhao, Rongpeng Li, Honggang Zhang<br />
    &#x1f4c5; 2018-11-26<br />
    &#x1f4d6; <br />
    &#x1f517; DOI: <a target="_blank" href="https://doi.org/10.1109/jiot.2018.2883344" rel="nofollow ugc">https://doi.org/10.1109/jiot.2018.2883344</a><br />
    &#x1f4ca; Citations: 236<br />
    &#x1f513; Closed</p>
<p>    <strong>Abstract:</strong><br />Software defined Internet of Things (SD-IoT) networks profit from centralized&hellip;<span class="activity-read-more" id="activity-read-more-1356"><a target="_blank" href="https://onlyfor.tech/activity/p/1356/" rel="nofollow ugc">Read More</a></span></p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">13a2030b6f7774f06e8b07b9adcbfe02</guid>
				<title>Mourad ELGORMA: Edge Intelligence: Paving the Last Mile of [&#133;]</title>
				<link>https://onlyfor.tech/activity/p/1355/</link>
				<pubDate>Wed, 25 Mar 2026 00:58:12 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p>    <img loading="lazy" src='https://source.unsplash.com/800x400/?technology,ai,iot' /></p>
<p>    <strong>Edge Intelligence: Paving the Last Mile of Artificial Intelligence With Edge Computing</strong><br />
    &#x1f468;&#x200d;&#x1f52c; Zhi Zhou, Xu Chen, En Li, Liekang Zeng, Ke Luo, Junshan Zhang<br />
    &#x1f4c5; 2019-06-12<br />
    &#x1f4d6; <br />
    &#x1f517; DOI: <a target="_blank" href="https://doi.org/10.1109/jproc.2019.2918951" rel="nofollow ugc">https://doi.org/10.1109/jproc.2019.2918951</a><br />
    &#x1f4ca; Citations: 2060<br />
    &#x1f513; Open Access</p>
<p>    <strong>Abstract:</strong><br />With the breakthroughs in deep learning, the recent&hellip;<span class="activity-read-more" id="activity-read-more-1355"><a target="_blank" href="https://onlyfor.tech/activity/p/1355/" rel="nofollow ugc">Read More</a></span></p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">f3c0faf5b3ccbaada38f20cf3abb6ac3</guid>
				<title>Mourad ELGORMA: A Survey of AI-Based Anomaly Detection in IoT and [&#133;]</title>
				<link>https://onlyfor.tech/activity/p/1354/</link>
				<pubDate>Wed, 25 Mar 2026 00:58:11 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p>    <img loading="lazy" src='https://source.unsplash.com/800x400/?technology,ai,iot' /></p>
<p>    <strong>A Survey of AI-Based Anomaly Detection in IoT and Sensor Networks</strong><br />
    &#x1f468;&#x200d;&#x1f52c; Kyle DeMedeiros, Abdeltawab Hendawi, Marco Álvarez<br />
    &#x1f4c5; 2023-01-25<br />
    &#x1f4d6; <br />
    &#x1f517; DOI: <a target="_blank" href="https://doi.org/10.3390/s23031352" rel="nofollow ugc">https://doi.org/10.3390/s23031352</a><br />
    &#x1f4ca; Citations: 123<br />
    &#x1f513; Open Access</p>
<p>    <strong>Abstract:</strong><br />Machine learning (ML) and deep learning (DL), in particular, are common tools for anomaly&hellip;<span class="activity-read-more" id="activity-read-more-1354"><a target="_blank" href="https://onlyfor.tech/activity/p/1354/" rel="nofollow ugc">Read More</a></span></p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">ec9de1397b281a4b16d4a5e88d314771</guid>
				<title>Mourad ELGORMA: AI-empowered, blockchain and SDN integrated [&#133;]</title>
				<link>https://onlyfor.tech/activity/p/1353/</link>
				<pubDate>Wed, 25 Mar 2026 00:58:11 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p>    <img loading="lazy" src='https://source.unsplash.com/800x400/?technology,ai,iot' /></p>
<p>    <strong>AI-empowered, blockchain and SDN integrated security architecture for IoT network of cyber physical systems</strong><br />
    &#x1f468;&#x200d;&#x1f52c; Sohaib Latif, Fang B. Xian Wen, Celestine Iwendi, Li-li F. Wang, Syed Muhammad Mohsin, Zhaoyang Han, Shahab S. Band<br />
    &#x1f4c5; 2021-10-12<br />
    &#x1f4d6; <br />
    &#x1f517; DOI: <a target="_blank" href="https://doi.org/10.1016/j.comcom.2021.09.029" rel="nofollow ugc">https://doi.org/10.1016/j.comcom.2021.09.029</a><br />
    &#x1f4ca; Citations: 203<br />
    &#x1f513;&hellip;<span class="activity-read-more" id="activity-read-more-1353"><a target="_blank" href="https://onlyfor.tech/activity/p/1353/" rel="nofollow ugc">Read More</a></span></p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">a0a1044682767781a7dcb951177daf33</guid>
				<title>Mourad ELGORMA: Data traffic management in AI-IoT network to reduce [&#133;]</title>
				<link>https://onlyfor.tech/activity/p/1352/</link>
				<pubDate>Wed, 25 Mar 2026 00:58:10 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p>    <img loading="lazy" src='https://source.unsplash.com/800x400/?technology,ai,iot' /></p>
<p>    <strong>Data traffic management in AI-IoT network to reduce congestion</strong><br />
    &#x1f468;&#x200d;&#x1f52c; Muhammad Usama, Ubaid Ullah, Zaid Muhammad, Muhammad Bux, Inam Ullah, Muhammad Rouf, Taminul Islam<br />
    &#x1f4c5; 2024-06-20<br />
    &#x1f4d6; <br />
    &#x1f517; DOI: <a target="_blank" href="https://doi.org/10.1201/9781003496410-10" rel="nofollow ugc">https://doi.org/10.1201/9781003496410-10</a><br />
    &#x1f4ca; Citations: 6<br />
    &#x1f513; Closed</p>
<p>    <strong>Abstract:</strong><br />As the artificial intelligence–internet of t&hellip;<span class="activity-read-more" id="activity-read-more-1352"><a target="_blank" href="https://onlyfor.tech/activity/p/1352/" rel="nofollow ugc">Read More</a></span></p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">fee6c33eace3657bb7243b512733dbc1</guid>
				<title>Mourad ELGORMA: AI-Based Two-Stage Intrusion Detection for Software [&#133;]</title>
				<link>https://onlyfor.tech/activity/p/1351/</link>
				<pubDate>Wed, 25 Mar 2026 00:58:10 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p>    <img loading="lazy" src='https://source.unsplash.com/800x400/?technology,ai,iot' /></p>
<p>    <strong>AI-Based Two-Stage Intrusion Detection for Software Defined IoT Networks</strong><br />
    &#x1f468;&#x200d;&#x1f52c; Jiaqi Li, Zhifeng Zhao, Rongpeng Li, Honggang Zhang<br />
    &#x1f4c5; 2018-11-26<br />
    &#x1f4d6; <br />
    &#x1f517; DOI: <a target="_blank" href="https://doi.org/10.1109/jiot.2018.2883344" rel="nofollow ugc">https://doi.org/10.1109/jiot.2018.2883344</a><br />
    &#x1f4ca; Citations: 236<br />
    &#x1f513; Closed</p>
<p>    <strong>Abstract:</strong><br />Software defined Internet of Things (SD-IoT) networks profit from centralized&hellip;<span class="activity-read-more" id="activity-read-more-1351"><a target="_blank" href="https://onlyfor.tech/activity/p/1351/" rel="nofollow ugc">Read More</a></span></p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">c9c1c0fc463cc54711c8743b755f2fca</guid>
				<title>Mourad ELGORMA: Edge Intelligence: Paving the Last Mile of [&#133;]</title>
				<link>https://onlyfor.tech/activity/p/1350/</link>
				<pubDate>Wed, 25 Mar 2026 00:57:49 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p>    <img loading="lazy" src='https://source.unsplash.com/800x400/?technology,ai,iot' /></p>
<p>    <strong>Edge Intelligence: Paving the Last Mile of Artificial Intelligence With Edge Computing</strong><br />
    &#x1f468;&#x200d;&#x1f52c; Zhi Zhou, Xu Chen, En Li, Liekang Zeng, Ke Luo, Junshan Zhang<br />
    &#x1f4c5; 2019-06-12<br />
    &#x1f4d6; <br />
    &#x1f517; DOI: <a target="_blank" href="https://doi.org/10.1109/jproc.2019.2918951" rel="nofollow ugc">https://doi.org/10.1109/jproc.2019.2918951</a><br />
    &#x1f4ca; Citations: 2060<br />
    &#x1f513; Open Access</p>
<p>    <strong>Abstract:</strong><br />With the breakthroughs in deep learning, the recent&hellip;<span class="activity-read-more" id="activity-read-more-1350"><a target="_blank" href="https://onlyfor.tech/activity/p/1350/" rel="nofollow ugc">Read More</a></span></p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">99eeb72944700fe9533f7858f4e0e750</guid>
				<title>Mourad ELGORMA: A Survey of AI-Based Anomaly Detection in IoT and [&#133;]</title>
				<link>https://onlyfor.tech/activity/p/1349/</link>
				<pubDate>Wed, 25 Mar 2026 00:57:48 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p>    <img loading="lazy" src='https://source.unsplash.com/800x400/?technology,ai,iot' /></p>
<p>    <strong>A Survey of AI-Based Anomaly Detection in IoT and Sensor Networks</strong><br />
    &#x1f468;&#x200d;&#x1f52c; Kyle DeMedeiros, Abdeltawab Hendawi, Marco Álvarez<br />
    &#x1f4c5; 2023-01-25<br />
    &#x1f4d6; <br />
    &#x1f517; DOI: <a target="_blank" href="https://doi.org/10.3390/s23031352" rel="nofollow ugc">https://doi.org/10.3390/s23031352</a><br />
    &#x1f4ca; Citations: 123<br />
    &#x1f513; Open Access</p>
<p>    <strong>Abstract:</strong><br />Machine learning (ML) and deep learning (DL), in particular, are common tools for anomaly&hellip;<span class="activity-read-more" id="activity-read-more-1349"><a target="_blank" href="https://onlyfor.tech/activity/p/1349/" rel="nofollow ugc">Read More</a></span></p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">eb8b74ed0e1d16e6570e29765f70c3da</guid>
				<title>Mourad ELGORMA: AI-empowered, blockchain and SDN integrated [&#133;]</title>
				<link>https://onlyfor.tech/activity/p/1348/</link>
				<pubDate>Wed, 25 Mar 2026 00:57:47 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p>    <img loading="lazy" src='https://source.unsplash.com/800x400/?technology,ai,iot' /></p>
<p>    <strong>AI-empowered, blockchain and SDN integrated security architecture for IoT network of cyber physical systems</strong><br />
    &#x1f468;&#x200d;&#x1f52c; Sohaib Latif, Fang B. Xian Wen, Celestine Iwendi, Li-li F. Wang, Syed Muhammad Mohsin, Zhaoyang Han, Shahab S. Band<br />
    &#x1f4c5; 2021-10-12<br />
    &#x1f4d6; <br />
    &#x1f517; DOI: <a target="_blank" href="https://doi.org/10.1016/j.comcom.2021.09.029" rel="nofollow ugc">https://doi.org/10.1016/j.comcom.2021.09.029</a><br />
    &#x1f4ca; Citations: 203<br />
    &#x1f513;&hellip;<span class="activity-read-more" id="activity-read-more-1348"><a target="_blank" href="https://onlyfor.tech/activity/p/1348/" rel="nofollow ugc">Read More</a></span></p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">d56f4b821459e0699e001b79f58efd81</guid>
				<title>Mourad ELGORMA: Data traffic management in AI-IoT network to reduce [&#133;]</title>
				<link>https://onlyfor.tech/activity/p/1347/</link>
				<pubDate>Wed, 25 Mar 2026 00:57:47 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p>    <img loading="lazy" src='https://source.unsplash.com/800x400/?technology,ai,iot' /></p>
<p>    <strong>Data traffic management in AI-IoT network to reduce congestion</strong><br />
    &#x1f468;&#x200d;&#x1f52c; Muhammad Usama, Ubaid Ullah, Zaid Muhammad, Muhammad Bux, Inam Ullah, Muhammad Rouf, Taminul Islam<br />
    &#x1f4c5; 2024-06-20<br />
    &#x1f4d6; <br />
    &#x1f517; DOI: <a target="_blank" href="https://doi.org/10.1201/9781003496410-10" rel="nofollow ugc">https://doi.org/10.1201/9781003496410-10</a><br />
    &#x1f4ca; Citations: 6<br />
    &#x1f513; Closed</p>
<p>    <strong>Abstract:</strong><br />As the artificial intelligence–internet of t&hellip;<span class="activity-read-more" id="activity-read-more-1347"><a target="_blank" href="https://onlyfor.tech/activity/p/1347/" rel="nofollow ugc">Read More</a></span></p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">9190a4c3848852d00fa1b1539efe8bc1</guid>
				<title>Mourad ELGORMA: AI-Based Two-Stage Intrusion Detection for Software [&#133;]</title>
				<link>https://onlyfor.tech/activity/p/1346/</link>
				<pubDate>Wed, 25 Mar 2026 00:57:46 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p>    <img loading="lazy" src='https://source.unsplash.com/800x400/?technology,ai,iot' /></p>
<p>    <strong>AI-Based Two-Stage Intrusion Detection for Software Defined IoT Networks</strong><br />
    &#x1f468;&#x200d;&#x1f52c; Jiaqi Li, Zhifeng Zhao, Rongpeng Li, Honggang Zhang<br />
    &#x1f4c5; 2018-11-26<br />
    &#x1f4d6; <br />
    &#x1f517; DOI: <a target="_blank" href="https://doi.org/10.1109/jiot.2018.2883344" rel="nofollow ugc">https://doi.org/10.1109/jiot.2018.2883344</a><br />
    &#x1f4ca; Citations: 236<br />
    &#x1f513; Closed</p>
<p>    <strong>Abstract:</strong><br />Software defined Internet of Things (SD-IoT) networks profit from centralized&hellip;<span class="activity-read-more" id="activity-read-more-1346"><a target="_blank" href="https://onlyfor.tech/activity/p/1346/" rel="nofollow ugc">Read More</a></span></p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">7baab98c935c8bb1aefe9c18f1eda4d6</guid>
				<title>Mourad ELGORMA: Edge Intelligence: Paving the Last Mile of [&#133;]</title>
				<link>https://onlyfor.tech/activity/p/1345/</link>
				<pubDate>Tue, 24 Mar 2026 21:12:47 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p>    <img loading="lazy" src='https://source.unsplash.com/800x400/?technology,ai,iot' /></p>
<p>    <strong>Edge Intelligence: Paving the Last Mile of Artificial Intelligence With Edge Computing</strong><br />
    &#x1f468;&#x200d;&#x1f52c; Zhi Zhou, Xu Chen, En Li, Liekang Zeng, Ke Luo, Junshan Zhang<br />
    &#x1f4c5; 2019-06-12<br />
    &#x1f4d6; <br />
    &#x1f517; DOI: <a target="_blank" href="https://doi.org/10.1109/jproc.2019.2918951" rel="nofollow ugc">https://doi.org/10.1109/jproc.2019.2918951</a><br />
    &#x1f4ca; Citations: 2060<br />
    &#x1f513; Open Access</p>
<p>    <strong>Abstract:</strong><br />With the breakthroughs in deep learning, the recent&hellip;<span class="activity-read-more" id="activity-read-more-1345"><a target="_blank" href="https://onlyfor.tech/activity/p/1345/" rel="nofollow ugc">Read More</a></span></p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">d326da93d23be969fda3b3621f08c5de</guid>
				<title>Mourad ELGORMA: A Survey of AI-Based Anomaly Detection in IoT and [&#133;]</title>
				<link>https://onlyfor.tech/activity/p/1344/</link>
				<pubDate>Tue, 24 Mar 2026 21:12:46 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p>    <img loading="lazy" src='https://source.unsplash.com/800x400/?technology,ai,iot' /></p>
<p>    <strong>A Survey of AI-Based Anomaly Detection in IoT and Sensor Networks</strong><br />
    &#x1f468;&#x200d;&#x1f52c; Kyle DeMedeiros, Abdeltawab Hendawi, Marco Álvarez<br />
    &#x1f4c5; 2023-01-25<br />
    &#x1f4d6; <br />
    &#x1f517; DOI: <a target="_blank" href="https://doi.org/10.3390/s23031352" rel="nofollow ugc">https://doi.org/10.3390/s23031352</a><br />
    &#x1f4ca; Citations: 123<br />
    &#x1f513; Open Access</p>
<p>    <strong>Abstract:</strong><br />Machine learning (ML) and deep learning (DL), in particular, are common tools for anomaly&hellip;<span class="activity-read-more" id="activity-read-more-1344"><a target="_blank" href="https://onlyfor.tech/activity/p/1344/" rel="nofollow ugc">Read More</a></span></p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">b279ec5e6538cc6ba4cad23ace179297</guid>
				<title>Mourad ELGORMA: AI-empowered, blockchain and SDN integrated [&#133;]</title>
				<link>https://onlyfor.tech/activity/p/1343/</link>
				<pubDate>Tue, 24 Mar 2026 21:12:46 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p>    <img loading="lazy" src='https://source.unsplash.com/800x400/?technology,ai,iot' /></p>
<p>    <strong>AI-empowered, blockchain and SDN integrated security architecture for IoT network of cyber physical systems</strong><br />
    &#x1f468;&#x200d;&#x1f52c; Sohaib Latif, Fang B. Xian Wen, Celestine Iwendi, Li-li F. Wang, Syed Muhammad Mohsin, Zhaoyang Han, Shahab S. Band<br />
    &#x1f4c5; 2021-10-12<br />
    &#x1f4d6; <br />
    &#x1f517; DOI: <a target="_blank" href="https://doi.org/10.1016/j.comcom.2021.09.029" rel="nofollow ugc">https://doi.org/10.1016/j.comcom.2021.09.029</a><br />
    &#x1f4ca; Citations: 203<br />
    &#x1f513;&hellip;<span class="activity-read-more" id="activity-read-more-1343"><a target="_blank" href="https://onlyfor.tech/activity/p/1343/" rel="nofollow ugc">Read More</a></span></p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">e89cd008be0256a2d5ad8783cdcb9ba8</guid>
				<title>Mourad ELGORMA: Data traffic management in AI-IoT network to reduce [&#133;]</title>
				<link>https://onlyfor.tech/activity/p/1342/</link>
				<pubDate>Tue, 24 Mar 2026 21:12:45 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p>    <img loading="lazy" src='https://source.unsplash.com/800x400/?technology,ai,iot' /></p>
<p>    <strong>Data traffic management in AI-IoT network to reduce congestion</strong><br />
    &#x1f468;&#x200d;&#x1f52c; Muhammad Usama, Ubaid Ullah, Zaid Muhammad, Muhammad Bux, Inam Ullah, Muhammad Rouf, Taminul Islam<br />
    &#x1f4c5; 2024-06-20<br />
    &#x1f4d6; <br />
    &#x1f517; DOI: <a target="_blank" href="https://doi.org/10.1201/9781003496410-10" rel="nofollow ugc">https://doi.org/10.1201/9781003496410-10</a><br />
    &#x1f4ca; Citations: 6<br />
    &#x1f513; Closed</p>
<p>    <strong>Abstract:</strong><br />As the artificial intelligence–internet of t&hellip;<span class="activity-read-more" id="activity-read-more-1342"><a target="_blank" href="https://onlyfor.tech/activity/p/1342/" rel="nofollow ugc">Read More</a></span></p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">f38936e710ad5223f010617fd44a54a0</guid>
				<title>Mourad ELGORMA: AI-Based Two-Stage Intrusion Detection for Software [&#133;]</title>
				<link>https://onlyfor.tech/activity/p/1341/</link>
				<pubDate>Tue, 24 Mar 2026 21:12:45 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p>    <img loading="lazy" src='https://source.unsplash.com/800x400/?technology,ai,iot' /></p>
<p>    <strong>AI-Based Two-Stage Intrusion Detection for Software Defined IoT Networks</strong><br />
    &#x1f468;&#x200d;&#x1f52c; Jiaqi Li, Zhifeng Zhao, Rongpeng Li, Honggang Zhang<br />
    &#x1f4c5; 2018-11-26<br />
    &#x1f4d6; <br />
    &#x1f517; DOI: <a target="_blank" href="https://doi.org/10.1109/jiot.2018.2883344" rel="nofollow ugc">https://doi.org/10.1109/jiot.2018.2883344</a><br />
    &#x1f4ca; Citations: 236<br />
    &#x1f513; Closed</p>
<p>    <strong>Abstract:</strong><br />Software defined Internet of Things (SD-IoT) networks profit from centralized&hellip;<span class="activity-read-more" id="activity-read-more-1341"><a target="_blank" href="https://onlyfor.tech/activity/p/1341/" rel="nofollow ugc">Read More</a></span></p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">fa23d640ca3c6b233a1d0873e9c53583</guid>
				<title>Mourad ELGORMA: Edge Intelligence: Paving the Last Mile of Artificial [&#133;]</title>
				<link>https://onlyfor.tech/activity/p/1340/</link>
				<pubDate>Tue, 24 Mar 2026 20:58:01 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p><strong>Edge Intelligence: Paving the Last Mile of Artificial Intelligence With Edge Computing</strong><br />
    &#x1f4c5; 2019-06-12<br />
    &#x1f4d6; <br />
    &#x1f517; DOI: <a target="_blank" href="https://doi.org/10.1109/jproc.2019.2918951" rel="nofollow ugc">https://doi.org/10.1109/jproc.2019.2918951</a><br />
    &#x1f4ca; Citations: 2060<br />
    &#x1f513; Open Access</p>
<p>    Edge Intelligence: Paving the Last Mile of Artificial Intelligence With Edge Computing</p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">0c2562b1941e26cfefba7fdb91ecba56</guid>
				<title>Mourad ELGORMA: A Survey of AI-Based Anomaly Detection in IoT and Sensor [&#133;]</title>
				<link>https://onlyfor.tech/activity/p/1339/</link>
				<pubDate>Tue, 24 Mar 2026 20:58:01 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p><strong>A Survey of AI-Based Anomaly Detection in IoT and Sensor Networks</strong><br />
    &#x1f4c5; 2023-01-25<br />
    &#x1f4d6; <br />
    &#x1f517; DOI: <a target="_blank" href="https://doi.org/10.3390/s23031352" rel="nofollow ugc">https://doi.org/10.3390/s23031352</a><br />
    &#x1f4ca; Citations: 123<br />
    &#x1f513; Open Access</p>
<p>    A Survey of AI-Based Anomaly Detection in IoT and Sensor Networks</p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">3ad2f9c85ec740ee42b74127ae3daf49</guid>
				<title>Mourad ELGORMA: AI-empowered, blockchain and SDN integrated security [&#133;]</title>
				<link>https://onlyfor.tech/activity/p/1338/</link>
				<pubDate>Tue, 24 Mar 2026 20:58:01 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p><strong>AI-empowered, blockchain and SDN integrated security architecture for IoT network of cyber physical systems</strong><br />
    &#x1f4c5; 2021-10-12<br />
    &#x1f4d6; <br />
    &#x1f517; DOI: <a target="_blank" href="https://doi.org/10.1016/j.comcom.2021.09.029" rel="nofollow ugc">https://doi.org/10.1016/j.comcom.2021.09.029</a><br />
    &#x1f4ca; Citations: 203<br />
    &#x1f513; Closed</p>
<p>    AI-empowered, blockchain and SDN integrated security architecture for IoT network of cyber physical&hellip;</p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">8ee69cb4624d1848e5f8ee3df4102229</guid>
				<title>Mourad ELGORMA: Data traffic management in AI-IoT network to reduce [&#133;]</title>
				<link>https://onlyfor.tech/activity/p/1337/</link>
				<pubDate>Tue, 24 Mar 2026 20:58:01 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p><strong>Data traffic management in AI-IoT network to reduce congestion</strong><br />
    &#x1f4c5; 2024-06-20<br />
    &#x1f4d6; <br />
    &#x1f517; DOI: <a target="_blank" href="https://doi.org/10.1201/9781003496410-10" rel="nofollow ugc">https://doi.org/10.1201/9781003496410-10</a><br />
    &#x1f4ca; Citations: 6<br />
    &#x1f513; Closed</p>
<p>    Data traffic management in AI-IoT network to reduce congestion</p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">43300d7f1a53cbcdcbb62c8dba7acd77</guid>
				<title>Mourad ELGORMA: AI-Based Two-Stage Intrusion Detection for Software Defined [&#133;]</title>
				<link>https://onlyfor.tech/activity/p/1336/</link>
				<pubDate>Tue, 24 Mar 2026 20:58:01 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p><strong>AI-Based Two-Stage Intrusion Detection for Software Defined IoT Networks</strong><br />
    &#x1f4c5; 2018-11-26<br />
    &#x1f4d6; <br />
    &#x1f517; DOI: <a target="_blank" href="https://doi.org/10.1109/jiot.2018.2883344" rel="nofollow ugc">https://doi.org/10.1109/jiot.2018.2883344</a><br />
    &#x1f4ca; Citations: 236<br />
    &#x1f513; Closed</p>
<p>    AI-Based Two-Stage Intrusion Detection for Software Defined IoT Networks</p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">ed4325529e6f895fc48fdf66f4d4dad1</guid>
				<title>Mourad ELGORMA: Edge Intelligence: Paving the Last Mile of Artificial [&#133;]</title>
				<link>https://onlyfor.tech/activity/p/1335/</link>
				<pubDate>Tue, 24 Mar 2026 20:57:45 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p><strong>Edge Intelligence: Paving the Last Mile of Artificial Intelligence With Edge Computing</strong><br />
    &#x1f4c5; 2019-06-12<br />
    &#x1f4d6; <br />
    &#x1f517; DOI: <a target="_blank" href="https://doi.org/10.1109/jproc.2019.2918951" rel="nofollow ugc">https://doi.org/10.1109/jproc.2019.2918951</a><br />
    &#x1f4ca; Citations: 2060<br />
    &#x1f513; Open Access</p>
<p>    Edge Intelligence: Paving the Last Mile of Artificial Intelligence With Edge Computing</p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">502b11442361427c67f49a6fd8f0577d</guid>
				<title>Mourad ELGORMA: A Survey of AI-Based Anomaly Detection in IoT and Sensor [&#133;]</title>
				<link>https://onlyfor.tech/activity/p/1334/</link>
				<pubDate>Tue, 24 Mar 2026 20:57:45 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p><strong>A Survey of AI-Based Anomaly Detection in IoT and Sensor Networks</strong><br />
    &#x1f4c5; 2023-01-25<br />
    &#x1f4d6; <br />
    &#x1f517; DOI: <a target="_blank" href="https://doi.org/10.3390/s23031352" rel="nofollow ugc">https://doi.org/10.3390/s23031352</a><br />
    &#x1f4ca; Citations: 123<br />
    &#x1f513; Open Access</p>
<p>    A Survey of AI-Based Anomaly Detection in IoT and Sensor Networks</p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">7edf30d87a6560eb1b0516332784db5f</guid>
				<title>Mourad ELGORMA: AI-empowered, blockchain and SDN integrated security [&#133;]</title>
				<link>https://onlyfor.tech/activity/p/1333/</link>
				<pubDate>Tue, 24 Mar 2026 20:57:45 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p><strong>AI-empowered, blockchain and SDN integrated security architecture for IoT network of cyber physical systems</strong><br />
    &#x1f4c5; 2021-10-12<br />
    &#x1f4d6; <br />
    &#x1f517; DOI: <a target="_blank" href="https://doi.org/10.1016/j.comcom.2021.09.029" rel="nofollow ugc">https://doi.org/10.1016/j.comcom.2021.09.029</a><br />
    &#x1f4ca; Citations: 203<br />
    &#x1f513; Closed</p>
<p>    AI-empowered, blockchain and SDN integrated security architecture for IoT network of cyber physical&hellip;</p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">f33557bb49aac748f51227cb17f91c72</guid>
				<title>Mourad ELGORMA: Data traffic management in AI-IoT network to reduce [&#133;]</title>
				<link>https://onlyfor.tech/activity/p/1332/</link>
				<pubDate>Tue, 24 Mar 2026 20:57:45 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p><strong>Data traffic management in AI-IoT network to reduce congestion</strong><br />
    &#x1f4c5; 2024-06-20<br />
    &#x1f4d6; <br />
    &#x1f517; DOI: <a target="_blank" href="https://doi.org/10.1201/9781003496410-10" rel="nofollow ugc">https://doi.org/10.1201/9781003496410-10</a><br />
    &#x1f4ca; Citations: 6<br />
    &#x1f513; Closed</p>
<p>    Data traffic management in AI-IoT network to reduce congestion</p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">7dc9f90fb81c66e9855b8636d0cdb009</guid>
				<title>Mourad ELGORMA: AI-Based Two-Stage Intrusion Detection for Software Defined [&#133;]</title>
				<link>https://onlyfor.tech/activity/p/1331/</link>
				<pubDate>Tue, 24 Mar 2026 20:57:45 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p><strong>AI-Based Two-Stage Intrusion Detection for Software Defined IoT Networks</strong><br />
    &#x1f4c5; 2018-11-26<br />
    &#x1f4d6; <br />
    &#x1f517; DOI: <a target="_blank" href="https://doi.org/10.1109/jiot.2018.2883344" rel="nofollow ugc">https://doi.org/10.1109/jiot.2018.2883344</a><br />
    &#x1f4ca; Citations: 236<br />
    &#x1f513; Closed</p>
<p>    AI-Based Two-Stage Intrusion Detection for Software Defined IoT Networks</p>
</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">ed791836b445e6a6d17c5ec176fe3eb6</guid>
				<title></title>
				<link>https://onlyfor.tech/activity/p/1310/</link>
				<pubDate>Tue, 20 Jan 2026 14:07:00 +0000</pubDate>

				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">9a3f8820657741dc2fa195375dbe806a</guid>
				<title></title>
				<link>https://onlyfor.tech/activity/p/1309/</link>
				<pubDate>Tue, 20 Jan 2026 14:04:53 +0000</pubDate>

				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">dccb55bd6209dd8db20e7ec69318affa</guid>
				<title>The evolution of broadcast technology has shifted live video contribution from satellite and dedicated fiber links to flexible, software-driven IP networks. One of the most representative systems of this transformation is TVU One, a portable live video transmitter designed for reliable, low-latency broadcasting over heterogeneous and unstable networks.

https://onlyfor.tech/tvu-one-technology-explained-live-ip-video-broadcasting-over-bonded-cellular-networks/</title>
				<link>https://onlyfor.tech/activity/p/1308/</link>
				<pubDate>Tue, 20 Jan 2026 14:03:08 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p>The evolution of broadcast technology has shifted live video contribution from satellite and dedicated fiber links to flexible, software-driven IP networks. One of the most representative systems of this transformation is TVU One, a portable live video transmitter designed for reliable, low-latency broadcasting over heterogeneous and unstable&hellip;<span class="activity-read-more" id="activity-read-more-1308"><a target="_blank" href="https://onlyfor.tech/activity/p/1308/" rel="nofollow ugc">Read More</a></span></p>
</div><div class="youzify-post-attachments">
		<a class="youzify-wall-link-content" rel="nofollow" href="https://onlyfor.tech/tvu-one-technology-explained-live-ip-video-broadcasting-over-bonded-cellular-networks/" target="_blank">
			<img loading="lazy" class='lazyload' data-src='https://onlyfor.tech/wp-content/uploads/2025/02/cropped-cropped-cropped-onlyfor.etch_.png' alt="">			<div class="youzify-wall-link-data">
				<div class="youzify-wall-link-title">TVU One Technology Explained: Live IP Video Broadcasting Over Bonded Cellular Networks – Only For Tech</div>				<div class="youzify-wall-link-desc">In-depth technical explanation of TVU One technology, including architecture, OSI model mapping, protocols, bonded cellular networking, and low-latency live IP video broadcasting.</div>				<div class="youzify-wall-link-url">onlyfor.tech</div>			</div>
		</a>
		</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">b22d9a89c8fe4d85ca0f72652273d8e6</guid>
				<title></title>
				<link>https://onlyfor.tech/activity/p/1237/</link>
				<pubDate>Tue, 16 Sep 2025 17:58:43 +0000</pubDate>

				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">08769415745bda1886340ca9d388c0e7</guid>
				<title>installation scheme for parabolic antenna + UHF/VHF antenna combined into one TV distribution network.</title>
				<link>https://onlyfor.tech/activity/p/1236/</link>
				<pubDate>Tue, 16 Sep 2025 11:49:13 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p>installation scheme for parabolic antenna + UHF/VHF antenna combined into one TV distribution network.</p>
</div><div class="youzify-post-attachments">
			<a href="https://onlyfor.tech/wp-content/uploads/youzify/members/1/2025/09/FB_IMG_1758023327963.jpg" rel="nofollow" class="youzify-img-with-padding" data-youzify-lightbox="youzify-post-1236"><img loading="lazy" class='lazyload' data-src='https://onlyfor.tech/wp-content/uploads/youzify/members/1/2025/09/FB_IMG_1758023327963.jpg' alt=""></a>

			</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">56a3b45f1ebfb857e26e8405975660e5</guid>
				<title>Electrical engineer Eldo C. Koenig operating an AC network analyzer¹ analog computer² he designed at the Electrical Department of the Allis-Chalmers Manufacturing Company 1951.
From 1929 to the late 1960s, large alternating current power systems³ were modelled and studied on AC network analyzers or transient network analyzers. They were also called alternating current network calculators or AC calculating boards. These special-purpose analog computers were an outgrowth of the DC calculating boards used in the very earliest power system analysis. Using resistors and capacitors, AC network analyzers were much used for power-flow studies, short circuit calculations, and system stability studies, but were ultimately replaced by numerical solutions⁴ running on digital computers.
Eventually powerful digital computers replaced analog network analyzers for practical calculations, but analog physical models for studying electrical transients⁵ are still in use.
https://en.wikipedia.org/wiki/Network_analyzer_(AC_power)
https://en.wikipedia.org/wiki/Analog_computer
https://en.wikipedia.org/wiki/Electric_power_system
https://en.wikipedia.org/wiki/Numerical_analysis
https://en.wikipedia.org/wiki/Voltage_spike</title>
				<link>https://onlyfor.tech/activity/p/1235/</link>
				<pubDate>Tue, 16 Sep 2025 11:47:20 +0000</pubDate>

									<content:encoded><![CDATA[<div class="activity-inner"><p>Electrical engineer Eldo C. Koenig operating an AC network analyzer¹ analog computer² he designed at the Electrical Department of the Allis-Chalmers Manufacturing Company 1951.<br />
From 1929 to the late 1960s, large alternating current power systems³ were modelled and studied on AC network analyzers or transient network analyzers. They were also ca&hellip;<span class="activity-read-more" id="activity-read-more-1235"><a target="_blank" href="https://onlyfor.tech/activity/p/1235/" rel="nofollow ugc">Read More</a></span></p>
</div><div class="youzify-post-attachments">
			<a href="https://onlyfor.tech/wp-content/uploads/youzify/members/1/2025/09/FB_IMG_1758023185257.jpg" rel="nofollow" class="youzify-img-with-padding" data-youzify-lightbox="youzify-post-1235"><img loading="lazy" class='lazyload' data-src='https://onlyfor.tech/wp-content/uploads/youzify/members/1/2025/09/FB_IMG_1758023185257.jpg' alt=""></a>

			</div>]]></content:encoded>
				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">cf80789750310b89c1d88b07e429f422</guid>
				<title></title>
				<link>https://onlyfor.tech/activity/p/1234/</link>
				<pubDate>Mon, 15 Sep 2025 21:15:14 +0000</pubDate>

				
									<slash:comments>0</slash:comments>
				
							</item>
					<item>
				<guid isPermaLink="false">24a7c5c0ddaa189271ce1d0c833c90df</guid>
				<title></title>
				<link>https://onlyfor.tech/activity/p/1233/</link>
				<pubDate>Mon, 15 Sep 2025 18:10:14 +0000</pubDate>

				
									<slash:comments>0</slash:comments>
				
							</item>
		
	</channel>
</rss>