Skip to main content
About
About Iieta
Policies
Services
Subscription
Fast Track
Language Support
Conference Services
Publication Services
Journals
CONFERENCES
Books
Submission
Search form
Search IIETA Content
-Any-
Article
Basic page
Blog entry
Journal
Event
Feature
Home
Journals
IJSSE
Archive
Archive
2024: Vol. 14
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2023: Vol. 13
No. 6, December
No. 5, October
No. 4, September
No. 3, June
No. 2, April
No. 1, February
2022: Vol. 12
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2021: Vol. 11
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2020: Vol. 10
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2019: Vol. 9
No. 4, November
No. 3, September
No. 2, June
No. 1, January
2018: Vol. 8
No. 4, September
No. 3, July
No. 2, February
No. 1, January
2017: Vol. 7
No. 4, November
No. 3, September
No. 2, June
No. 1, March
2016: Vol. 6
No. 4, December
No. 3, August
No. 2, June
No. 1, March
2015: Vol. 5
No. 4, December
No. 3, September
No. 2, June
No. 1, March
2014: Vol. 4
No. 4, December
No. 3, September
No. 2, June
No. 1, March
2013: Vol. 3
No. 4, December
No. 3, September
No. 2, June
No. 1, March
2012: Vol. 2
No. 4, December
No. 3, November
No. 2, June
No. 1, March
2011: Vol. 1
No. 4, December
No. 3, September
No. 2, June
No. 1, March
Regulatory Policy of the Entrepreneurship Development as a Dominant of Economic Security of the National Economy
Liudmyla Verbivska, Volodymyr Lagodiienko, Svitlana Filyppova, Oleksandr Papaika, Oleksandr Malin, Yurii Neustroiev
https://doi.org/10.18280/ijsse.120501
Page
543-552
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Quasi-Oppositional Spider Money Optimization Based Model in Wireless Sensor Networks
Malathi Mani, Senthil Kumar Angamuthu
https://doi.org/10.18280/ijsse.120502
Page
553-561
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Securing an Information System via the SSL Protocol
Olga Purchina, Anna Poluyan, Dmitry Fugarov
https://doi.org/10.18280/ijsse.120503
Page
563-568
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
A Simulation Study to Suggest an Emergency Exits in Mosul’s Mosques in Case of Emergency
Ahmed A. Alfakhry, Luma Mohammad Yahya
https://doi.org/10.18280/ijsse.120504
Page
569-575
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Network Forensics Against Volumetric-Based Distributed Denial of Service Attacks on Cloud and the Edge Computing
Anton Yudhana, Imam Riadi, Sri Suharti
https://doi.org/10.18280/ijsse.120505
Page
577-588
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Analysis of Human and Cultural Factors Causing Risk of Accidents in Jordanian Drivers
Khair Jadaan, Mohammad Abojaradeh, Ashraf Shaqadan, Dua Abojaradeh, Imad Alshalout
https://doi.org/10.18280/ijsse.120506
Page
589-595
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
The Main Systemic Engineering Problems of Using Computer and Digital Technologies in Legal Activities in the Context of Ensuring Security
Iryna Khomyshyn, Natalia Ortynska, Olha Skochylias-Pavliv, Iryna Andrusiak, Olena Rym
https://doi.org/10.18280/ijsse.120507
Page
597-602
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Development of a Risk-Control Safety Program as an Architectural Contractor Guideline on Flats Project
Rossy Armyn Machfudiyanto, Yusuf Latief, Ratih Fitriani, Amira Syifa
https://doi.org/10.18280/ijsse.120508
Page
603-608
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Relationship Between Occupational Risk and Personal Protective Equipment on the Example of Ferroalloy Production
Sholpan Abikenova, Gulzhan Daumova, Aigul Kurmanbayeva, Zhanat Yesbenbetova, Diana Kazbekova
https://doi.org/10.18280/ijsse.120509
Page
609-614
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Video Violence Detection Using LSTM and Transformer Networks Through Grid Search-Based Hyperparameters Optimization
Moch Arief Soeleman, Catur Supriyanto, Dwi Puji Prabowo, Pulung Nurtantio Andono
https://doi.org/10.18280/ijsse.120510
Page
615-622
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Modeling of the Assessment System of the Main Risks of Investing in Engineering Enterprises in the Conditions of the Development of the Knowledge Economy
Vladimir Panchenko, Mariia Rushchyshyn, Tetiana Nemchenko, Tetiana Shtets, Andrii Kalinin
https://doi.org/10.18280/ijsse.120511
Page
623-629
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Classification of Fake News Using Deep Learning-Based GloVE-LSTM Model
Chandra Bhushana Rao Killi, Narayanan Balakrishnan, Chinta Someswara Rao
https://doi.org/10.18280/ijsse.120512
Page
631-637
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
GUI Implementation of Modified and Secure Image Steganography Using Least Significant Bit Substitution
Surya Prakash Yalla, Archana Uriti, Abhisek Sethy
https://doi.org/10.18280/ijsse.120513
Page
639-643
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS