Skip to main content
About
About Iieta
Policies
Services
Subscription
Fast Track
Language Support
Conference Services
Publication Services
Journals
CONFERENCES
Books
Submission
Search form
Search IIETA Content
-Any-
Article
Basic page
Blog entry
Journal
Event
Feature
Home
Journals
IJSSE
Archive
Archive
2025: Vol. 15
No. 7, July
No. 6, June
No. 5, May
No. 4, April
No. 3, March
No. 2, February
No. 1, January
2024: Vol. 14
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2023: Vol. 13
No. 6, December
No. 5, October
No. 4, September
No. 3, June
No. 2, April
No. 1, February
2022: Vol. 12
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2021: Vol. 11
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2020: Vol. 10
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2019: Vol. 9
No. 4, November
No. 3, September
No. 2, June
No. 1, January
2018: Vol. 8
No. 4, September
No. 3, July
No. 2, February
No. 1, January
2017: Vol. 7
No. 4, November
No. 3, September
No. 2, June
No. 1, March
2016: Vol. 6
No. 4, December
No. 3, August
No. 2, June
No. 1, March
2015: Vol. 5
No. 4, December
No. 3, September
No. 2, June
No. 1, March
2014: Vol. 4
No. 4, December
No. 3, September
No. 2, June
No. 1, March
2013: Vol. 3
No. 4, December
No. 3, September
No. 2, June
No. 1, March
2012: Vol. 2
No. 4, December
No. 3, November
No. 2, June
No. 1, March
2011: Vol. 1
No. 4, December
No. 3, September
No. 2, June
No. 1, March
Modeling the Application of Anti-Crisis Management Business Introduction for the Engineering Sector of the Economy
Borys Pohrishchuk, Tetiana Kolomiiets, Yuliia Chaliuk, Iryna Yaremko, Natalia Hromadska
https://doi.org/10.18280/ijsse.130201
Page
187-194
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Cybersecurity Index to Evaluate the Implementation of the Bi-Level Architecture for Efficient Manufacturing (BLAEM)
Abdelkarim Remli, Amal Khtira, Bouchra El Asri
https://doi.org/10.18280/ijsse.130202
Page
195-204
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
A Review of Deep Learning Algorithms for Anomaly Detection in Videos
Yuvarani Sadatcharam, Dinakaran Muruganadam
https://doi.org/10.18280/ijsse.130203
Page
205-211
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Trust Cyber Physical Systems: Trust Degree Framework and Evaluation
Zina Oudina, Makhlouf Derdour, Rachid Boudour, Ahmed Dib, Mohamed Amine Yakoubi
https://doi.org/10.18280/ijsse.130204
Page
213-225
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Design Characteristics that Achieve the Factor of Safety and Security from Fire Accidents for Users of Administrative Buildings
Ghada Mohammed Taib, Asma Hassan Al-Dabbagh
https://doi.org/10.18280/ijsse.130205
Page
227-236
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
HPO Using Dwarf Mongoose Optimization in the GAN Model for Human Gait Recognition
Ganesh Karthik Muppagowni, Srihari Varma Mantena, Phanikanth Chintamaneni, Srinivasulu Chennupalli, Sudhakar Yadav Naladesi, Ramesh Vatambeti
https://doi.org/10.18280/ijsse.130206
Page
237-244
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Disaster Preparedness in Proximity of Merapi Volcano, Indonesia: Is There Any Relationship in Knowledge and Attitude of Senior High School Students?
Andi Irwan Benardi, Sumarmi, Budijanto, Syamsul Bachri, Atta-Ur-Rahman, Fajar Wulandari
https://doi.org/10.18280/ijsse.130207
Page
245-254
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Safety Leadership, Covid-19 Risk Perception, and Safety Behavior: The Moderator Role of Work Pressure
Ho Y Hiep, Nguyen Ngoc Hien
https://doi.org/10.18280/ijsse.130208
Page
255-266
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Development of the Knowledge Base Information System for Integrated Risk-Based Audit of High-Rise Buildings Through Design-Build Method to Improve Construction Safety Performance
Danang Budi Nugroho, Yusuf Latief, Fatma Lestari, Rossy Armyn Machfudiyanto
https://doi.org/10.18280/ijsse.130209
Page
267-275
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Factors of Leadership and Behaviour Towards Organisational Safety Performance: A Predictive Model for Small and Medium Manufacturing Industry
Syazwan Syah Zulkifly, Nur Syifa Mohamad Zahir, Mokhtar Zamimi Ranjan
https://doi.org/10.18280/ijsse.130210
Page
277-288
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Safety Improvement Model in Small Multipurpose Ports
Santospriadi Santospriadi, Tri Tjahjono, Sunaryo Sunaryo
https://doi.org/10.18280/ijsse.130211
Page
289-299
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Comparison Seepage Performance for Different Drainage Systems of Rainwater Harvesting Dam
Saleh Mohammed Saleh Zakaria, Mohammad Tariq Mahmood
https://doi.org/10.18280/ijsse.130212
Page
301-316
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Formation of Social Leadership in the System of Public Safety and Security Through the Use of Modern Modeling Techniques
Myroslav Kryshtanovych, Volodymyr Kupchak, Oleksandr Voronov, Nataliia Larina
https://doi.org/10.18280/ijsse.130213
Page
317-324
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
SLDEB: Design of a Secure and Lightweight Dynamic Encryption Bio-Inspired Model for IoT Networks
Bhavesh Kataria, Harikrishna B. Jethva, Pushpmala Vijay Shinde, Satish S. Banait, Farhadeeba Shaikh, Samir Ajani
https://doi.org/10.18280/ijsse.130214
Page
325-331
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Special Issue
An Investigation on Vulnerability Analysis of Phishing Attacks and Countermeasures
Ganga Abhirup Kothamasu, Sree Keerthi Angara Venkata, Yamini Pemmasani, Senthilkumar Mathi
https://doi.org/10.18280/ijsse.130215
Page
333-340
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Trust Management System in Internet of Things: A Survey
Meghana Lokhande, Dipti Durgesh Patil, Sonali Kothari, Shital Pawar, Shweta Koparde
https://doi.org/10.18280/ijsse.130216
Page
341-347
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Memristive Physical Unclonable Functions: The State-of-the-Art Technology
Nawras Hussain Al-Khaboori, Israa Badr Al-Mashhadani
https://doi.org/10.18280/ijsse.130217
Page
349-358
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Machine Learning Approach for Material Analytics and Classification – Insights Based on a Criminal Forensic Investigation Data
K. Venkatesh Raja, B. Ayshwarya, D. Mohana Geetha, V. Nagaraj, R. Ramkumar
https://doi.org/10.18280/ijsse.130218
Page
359-364
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Two-Steps Insider Threat Detection Protocol (2S-ITDP) Based on Computer Usage Pattern Analysis
Amnat Sawatnatee, Somchai Prakancharoen
https://doi.org/10.18280/ijsse.130219
Page
365-374
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Emergency Response Plan Modeling Using IDEF0 and BPMN Approaches
Khouloud Mesloub, Fares Innal, Yves Ducq
https://doi.org/10.18280/ijsse.130220
Page
375-384
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS