Skip to main content
About
About Iieta
Policies
Services
Subscription
Fast Track
Language Support
Conference Services
Publication Services
Journals
CONFERENCES
Books
Submission
Search form
Search IIETA Content
-Any-
Article
Basic page
Blog entry
Journal
Event
Feature
Home
Journals
IJSSE
Archive
Archive
2025: Vol. 15
No. 7, July
No. 6, June
No. 5, May
No. 4, April
No. 3, March
No. 2, February
No. 1, January
2024: Vol. 14
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2023: Vol. 13
No. 6, December
No. 5, October
No. 4, September
No. 3, June
No. 2, April
No. 1, February
2022: Vol. 12
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2021: Vol. 11
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2020: Vol. 10
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2019: Vol. 9
No. 4, November
No. 3, September
No. 2, June
No. 1, January
2018: Vol. 8
No. 4, September
No. 3, July
No. 2, February
No. 1, January
2017: Vol. 7
No. 4, November
No. 3, September
No. 2, June
No. 1, March
2016: Vol. 6
No. 4, December
No. 3, August
No. 2, June
No. 1, March
2015: Vol. 5
No. 4, December
No. 3, September
No. 2, June
No. 1, March
2014: Vol. 4
No. 4, December
No. 3, September
No. 2, June
No. 1, March
2013: Vol. 3
No. 4, December
No. 3, September
No. 2, June
No. 1, March
2012: Vol. 2
No. 4, December
No. 3, November
No. 2, June
No. 1, March
2011: Vol. 1
No. 4, December
No. 3, September
No. 2, June
No. 1, March
Cost Effective Analysis of the Design of Safety Instrumented Systems Using Manta-Ray Foraging Optimization Algorithm
Fateh Berrah, Mourad Chebila, Fares Innal, Adel Got
https://doi.org/10.18280/ijsse.130601
Page
975-986
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Roadmap and Information System to Implement Information Technology Risk Management
Hasnaa Berrada, Jaouad Boutahar, Souhail El Ghazi El Houssaini
https://doi.org/10.18280/ijsse.130602
Page
987-1000
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Advancing Public Health Monitoring through Secure and Efficient Wearable Technology
Sahar L. Qaddoori, Ina’am Fathi, Modhar A. Hammoudy, Qutaiba I. Ali
https://doi.org/10.18280/ijsse.130603
Page
1001-1014
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
A Lightweight Blockchain to Secure Data Communication in IoT Network on Healthcare System
Janardhana Dasarigatta Rangappa, A.P. Manu, Shivanna Kariyappa, Suhas Kamshetty Chinnababu, Gururaj Harinahalli Lokesh, Francesco Flammini
https://doi.org/10.18280/ijsse.130604
Page
1015-1024
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Qualitative Risk Assessment in Water Bottling Production: A Case Study of Maan Nestlé Pure Life Factory
Diana Rbeht, Mohammed S. El-Ali Al-Waqfi, Jawdat Al-Jarrah
https://doi.org/10.18280/ijsse.130605
Page
1025-1038
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Development of a Method for Determining the List of Key Threats to Information Security of Computer Networks
Abas Lampezhev, Vladimir Kuklin, Leonid Chervyakov, Aslan Tatarkanov
https://doi.org/10.18280/ijsse.130606
Page
1039-1047
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Statistical Monitoring of OSH: Analysis of Deviations and Recommendations for Optimization
Sholpan Abikenova, Shynar Aitimova, Gulzhan Daumova, Andrey Koval, Inara Sarybayeva
https://doi.org/10.18280/ijsse.130607
Page
1049-1059
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Analysis of the Environmental Impact of Radiation Doses on Dental and Oral Diseases (K03.6, K05.1, and K05.3) in Workers in the Indonesian National Nuclear Energy Agency
Elanda Fikri, Tantin Retno Dwidjartini, Evan Puspitasari, Enny Chalimah, Maria Evalisa, Yura Witsqa Firmansyah
https://doi.org/10.18280/ijsse.130608
Page
1061-1068
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Development of an Affordable Real-Time IoT-Based Surveillance System Using ESP32 and TWILIO API
Kennedy Okokpujie, Imhade P. Okokpujie, Fortune T. Young, Roselyn E. Subair
https://doi.org/10.18280/ijsse.130609
Page
1069-1075
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Simple Hash Based Symmetric Encryption Mechanism for Dynamic Groups
Redamalla Rekha, Medi Sandhya Rani, Kura Shailaja, Nagaraju Krishna Chythanya
https://doi.org/10.18280/ijsse.130610
Page
1077-1082
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Health Risk Assessment Due to Indoor Air Pollution in Air Conditioning Manufacturing Plants
Ahmed A. Hussien, Kamel K. Alzboon, Walaa Matalqa, Abdullah H.M. AlEssa
https://doi.org/10.18280/ijsse.130611
Page
1083-1090
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Effects of Insecurity, Terrorism and Political Instability on Foreign Direct Investment Inflows in Nigeria
Cordelia Onyinyechi Omodero
https://doi.org/10.18280/ijsse.130612
Page
1091-1098
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Digital Incontrovertible Multi Level Key Set Based Node Authentication Model for Malicious Node Detection for Secure Data Transmission in WSN
Doma Murli Krishna Reddy, Rajendran Sathya, Veeravatnam V.A.S. Lakshmi
https://doi.org/10.18280/ijsse.130613
Page
1099-1108
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
A Review of Cybersecurity Management Standards Applied in Higher Education Institutions
Agalit Mohamed Amine, El Mostapha Chakir, Taqafi Issam, Youness Idrissi Khamlichi
https://doi.org/10.18280/ijsse.130614
Page
1109-1116
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Chaotic Map Based Raster Data Encryption for Geospatial Data
Prajakta Bhangale, Shubhangi Vaikole
https://doi.org/10.18280/ijsse.130615
Page
1117-1125
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Enhancing Key Exchange Security: Leveraging RSA Protocol in Encryption Algorithm Based on Hyperchaotic System
Hadeel J. Shnaen, Sadiq A. Mehdi
https://doi.org/10.18280/ijsse.130616
Page
1127-1134
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Intelligent Intrusion Detection Based on Multi-Model Federated Learning for Software Defined Network
Asraa A. Abd Al-Ameer, Wesam Sameer Bhaya
https://doi.org/10.18280/ijsse.130617
Page
1135-1141
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
A Robust Multi Descriptor Fusion with One-Class CNN for Detecting Anomalies in Video Surveillance
K. Chidananda, A.P. Siva Kumar
https://doi.org/10.18280/ijsse.130618
Page
1143-1151
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Enhancing Safety and Security: Facilities for Wheelchair Users in Marine Tourism Area
Sunardi, Ali Muntaha, Daduk Setyohadi, Andik Isdianto
https://doi.org/10.18280/ijsse.130619
Page
1153-1161
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Designing a Model for Hiding Images in RGB Cover Image Based Scrambling and Encryption Methods
Sheimaa A. Hadi, Asraa Abdullah Hussein, Rafeef M. Al Baity
https://doi.org/10.18280/ijsse.130620
Page
1163-1168
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS