Skip to main content
About
About Iieta
Policies
Services
Subscription
Fast Track
Language Support
Conference Services
Publication Services
Journals
CONFERENCES
Books
Submission
Search form
Search IIETA Content
-Any-
Article
Basic page
Blog entry
Journal
Event
Feature
Home
Journals
IJSSE
Archive
Archive
2025: Vol. 15
No. 11, November
No. 10, October
No. 9, September
No. 8, August
No. 7, July
No. 6, June
No. 5, May
No. 4, April
No. 3, March
No. 2, February
No. 1, January
2024: Vol. 14
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2023: Vol. 13
No. 6, December
No. 5, October
No. 4, September
No. 3, June
No. 2, April
No. 1, February
2022: Vol. 12
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2021: Vol. 11
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2020: Vol. 10
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2019: Vol. 9
No. 4, November
No. 3, September
No. 2, June
No. 1, January
2018: Vol. 8
No. 4, September
No. 3, July
No. 2, February
No. 1, January
2017: Vol. 7
No. 4, November
No. 3, September
No. 2, June
No. 1, March
2016: Vol. 6
No. 4, December
No. 3, August
No. 2, June
No. 1, March
2015: Vol. 5
No. 4, December
No. 3, September
No. 2, June
No. 1, March
2014: Vol. 4
No. 4, December
No. 3, September
No. 2, June
No. 1, March
2013: Vol. 3
No. 4, December
No. 3, September
No. 2, June
No. 1, March
2012: Vol. 2
No. 4, December
No. 3, November
No. 2, June
No. 1, March
2011: Vol. 1
No. 4, December
No. 3, September
No. 2, June
No. 1, March
Evaluating the Impact of Critical Success Factors of Incident Prevention Programs on Construction Project Success
Didik Ali Imron, Ahmad Choiruddin
https://doi.org/10.18280/ijsse.151001
Page
1983-1993
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
A Hybrid Deep Learning Framework for Multimodal DeepFake Detection
Srushti Chikkanna, Chaitra Mrutyunjaya, Rajanishree Manjappa, Chayadevi Mysore Lakshmanagowda, Rohini Thimmapura Venkatesh, Sridevi Gereen Murthy
https://doi.org/10.18280/ijsse.151002
Page
1995-2004
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
A Hybrid Intrusion Detection System with Quantum Epigenetic Optimization and Autoencoder Feature Reduction
Nadia Mahmood Hussien, Methaq Talib Gaata
https://doi.org/10.18280/ijsse.151003
Page
2005-2012
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Optimizing HMAC for Enhanced Security in CAN Systems of Autonomous Vehicles
Mohamed Alhyan, Mariya Ouaissa, Mariyam Ouaissa, Zineb Nadifi, Ali Kartit
https://doi.org/10.18280/ijsse.151004
Page
2013-2023
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Risk Management and Mitigation Strategies for Project Delays in EPCC Contracts
Munawir, Muhammad Asad Abdurrahman, Rosmariani Arifuddin
https://doi.org/10.18280/ijsse.151005
Page
2025-2031
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
BiGRU-Based Intrusion Detection Framework for Enhancing Security in Cyber-Physical Systems
Ponugoti Kalpana, Sunitha Tappari, Sushma Polasi, L Smitha, Sahithi Godavarthi, Meeniga Vijayalakshmi, Gona Jagadesh
https://doi.org/10.18280/ijsse.151006
Page
2033-2041
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Toward Reliable Key Distribution in Wireless Ad Hoc Networks: A Software-Based Comparative Analysis of Key Management Schemes
Ahlem Nasri, Abdelhabib Bourouis, Mohammed El Amine Fekair, Kenza Gasmi, Asma Saighi
https://doi.org/10.18280/ijsse.151007
Page
2043-2054
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Pulsed Nd:YAG Laser Ablation: Environmentally Friendly Synthesis of ZnO/TiO₂ Nanocomposites for Wastewater Treatment Applications
Mohammed J. Jader, Mohammed H.K. Al-Mamoori, Saif M. Alshrefi, Zahraa F. Abd Al-Sada, Zainab F. Abd Al-Sada, Sajjad Abbas Hadi Nukhailawi
https://doi.org/10.18280/ijsse.151008
Page
2055-2060
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Evaluating the SUFREE Framework for Ethical Digital Forensics in Indonesia
Arizona Firdonsyah, Purwanto Purwanto, Imam Riadi
https://doi.org/10.18280/ijsse.151009
Page
2061-2068
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
An IoT-Driven Intelligent Street Lighting System with Integrated Severity-Based Fault Classification
Sreelatha R, Shubha Rao V, Mahalakshmi B S, Sindhu K
https://doi.org/10.18280/ijsse.151010
Page
2069-2079
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Design and Implementation of a Smart Dual-Stage Fire Crisis Management System Using Raspberry Pi for Safety and Security Applications
Irianto, Jamil Abedalrahim Jamil Alsayaydeh, Adam Wong Yoon Khang, Mazen Farid, Safarudin Gazali Herawan
https://doi.org/10.18280/ijsse.151011
Page
2081-2091
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Framework for Enhanced Privacy-Preserving Consensus System for Distributed SDN: Redefining Security for the East-West Interface
Wed Kadhim Oleiwi, Ahmed Mohammed Hussein, Hadeel Q. Gheni, Ali Kadhum M. Al-Qurabat
https://doi.org/10.18280/ijsse.151012
Page
2093-2102
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Safety Risk Evaluation by Vessel Type and Accident Category in an Archipelagic State: An Empirical Data Analysis from Indonesia
Sunardi, Aleik Nurwahyudi, Eko Sulkhany, Arief Setyanto, Heri Supomo, Sapto P Kertorahardjo
https://doi.org/10.18280/ijsse.151013
Page
2103-2109
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
An Optimization-Driven Framework for Risk-Aware and Resilient Customer Churn Prediction in Telecom Systems
Venkata Pullareddy Malikireddy, Madhavi Kasa
https://doi.org/10.18280/ijsse.151014
Page
2111-2120
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Enhancing Security Service Efficiency Through Risk Management: Analyzing the Impact of Employee Leave Patterns at King Saud bin Abdulaziz University for Health Sciences
Khaled Mili, Shaykhah Abdullah Aldossari
https://doi.org/10.18280/ijsse.151015
Page
2121-2134
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Integrating Wavelet Feature Decomposition and 3D CNNs for Accurate Blind Steganalysis
Natiq M. Abdali, Salah Al-Obaidi, Hiba Al-Khafaji, Hawraa Al-Janabi
https://doi.org/10.18280/ijsse.151016
Page
2135-2142
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
A Comprehensive Survey of Transformer-Based Models for Video Anomaly Detection in Surveillance Systems
Sayali B. Sabale, Vijayshri N. Khedkar
https://doi.org/10.18280/ijsse.151017
Page
2143-2154
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Secure Data Encryption in Energy Production and Management Systems: Integrating Chaos Bifurcation and Polynomial High Order Fibonacci for Enhanced Cybersecurity
Tulus, Jonathan Liviera Marpaung, Syafrizal Sy, Kiki Ariyanti Sugeng, Rinovia Simanjuntak, Suriati
https://doi.org/10.18280/ijsse.151018
Page
2155-2167
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Optimizing IoT Intrusion Detection and Attack Classification via WOA-Based Feature Reduction and Boosting Algorithms
Manar Bashar Mortatha, Dhahir Abdulhade Abdulah
https://doi.org/10.18280/ijsse.151019
Page
2169-2176
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
A Deep Learning and Blockchain-Based Trust Framework for Securing IoMT
Mariem Fourati, Amel Meddeb-Makhlouf, Ferdaous Kamoun-Abid, Faouzi Zarai
https://doi.org/10.18280/ijsse.151020
Page
2177-2189
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS