Skip to main content
About
About Iieta
Policies
Services
Subscription
Fast Track
Language Support
Conference Services
Publication Services
Journals
CONFERENCES
Books
Submission
Search form
Search IIETA Content
-Any-
Article
Basic page
Blog entry
Journal
Event
Feature
Home
Journals
IJSSE
Archive
Archive
2025: Vol. 15
No. 11, November
No. 10, October
No. 9, September
No. 8, August
No. 7, July
No. 6, June
No. 5, May
No. 4, April
No. 3, March
No. 2, February
No. 1, January
2024: Vol. 14
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2023: Vol. 13
No. 6, December
No. 5, October
No. 4, September
No. 3, June
No. 2, April
No. 1, February
2022: Vol. 12
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2021: Vol. 11
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2020: Vol. 10
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2019: Vol. 9
No. 4, November
No. 3, September
No. 2, June
No. 1, January
2018: Vol. 8
No. 4, September
No. 3, July
No. 2, February
No. 1, January
2017: Vol. 7
No. 4, November
No. 3, September
No. 2, June
No. 1, March
2016: Vol. 6
No. 4, December
No. 3, August
No. 2, June
No. 1, March
2015: Vol. 5
No. 4, December
No. 3, September
No. 2, June
No. 1, March
2014: Vol. 4
No. 4, December
No. 3, September
No. 2, June
No. 1, March
2013: Vol. 3
No. 4, December
No. 3, September
No. 2, June
No. 1, March
2012: Vol. 2
No. 4, December
No. 3, November
No. 2, June
No. 1, March
2011: Vol. 1
No. 4, December
No. 3, September
No. 2, June
No. 1, March
Proximal Policy Optimization–Based Deep Reinforcement Learning for Intelligent Test Case Generation in Autonomous Vehicles
Tamizharasi Arthanari, Rajalakshmi Dharmadurai, Keerthiga Viswanathan, Jaithunbi Abdul Kareem
https://doi.org/10.18280/ijsse.151101
Page
2191-2204
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
A Hybrid Structural Equation Modeling–Partial Least Square and Analytic Hierarchy Process Framework for Evidence-Based Safety Management in High-Risk Electricity Industry Operations
Pawenary, Hari Purnomo, Winda Nur Cahyo, Arif Rahman
https://doi.org/10.18280/ijsse.151102
Page
2205-2217
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Design and Evaluation of BE-RF Framework on Multi-Dataset: A Network Intrusion Detection System Using Ensemble Learning with Random Forest
Mukhtar Ghaleb
https://doi.org/10.18280/ijsse.151103
Page
2219-2227
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Enhanced Intrusion Detection in Social IoT Environments via Double Deep Q-Learning
Sabah M. Alturfi, Nibras Talib Mohammed, Nagham Habeeb Shakir
https://doi.org/10.18280/ijsse.151104
Page
2229-2237
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Influence of Grain Size Distribution of Sand Lenses in Evaluating the Liquefaction Potential
Putera Agung Maha Agung, Suripto, Denny Yatmadi, Satwarnirat, Syaiful Amri, Muhammad Fathur Rouf Hasan
https://doi.org/10.18280/ijsse.151105
Page
2239-2246
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
A Visual Cryptography Framework with Tuned Cipher Block Chaining and Quantum Key Distribution–Assisted Encryption for Securing Thermal Facial Biometrics in Anti-Doping Applications
K. Komathi, D. Kavitha
https://doi.org/10.18280/ijsse.151106
Page
2247-2259
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Detection and Classification of Darknet Traffic Using an Enhanced LocalKNN Algorithm
Ekram H. Hasan, Hussein K. Almulla,Omar A. Dawood, Mohammed Khalaf
https://doi.org/10.18280/ijsse.151107
Page
2261-2273
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Behavioral and Demographic Data-Driven Cybersecurity Risk Classification Using K-Means Clustering on Active Internet Users
Mary Rose C. Columbres
https://doi.org/10.18280/ijsse.151108
Page
2275-2284
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
MedRec-Secure: A Framework for Confidentiality Preservation in Medical Patient Records
Tigo S Yoga, Ntivuguruzwa Jean De La Croix, Tohari Ahmad, Royyana Muslim Ijtihadie, Wahyu Suadi
https://doi.org/10.18280/ijsse.151109
Page
2285-2295
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Intrusion Detection for Flooding-Based Denial-of-Service Attacks in Wireless Sensor Networks Using a Long Short-Term Memory Deep Learning Model
Abeer Hussein Abdulrasool, Ekhlas Kadhum Hamza, Ahmed Mudheher Hasan
https://doi.org/10.18280/ijsse.151110
Page
2297-2310
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Evaluating Blackhole Attack Detection Strategies for Secure Heterogeneous Wireless Sensor Networks
Sonali Prashant Bhoite, Ganapati A. Patil
https://doi.org/10.18280/ijsse.151111
Page
2311-2321
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Enhancing Private Cloud Security Using Knowledge Understanding Assessment Defense Method for Distributed Denial of Service Attack Mitigation
Hero Wintolo, Imam Riadi, Anton Yudhana
https://doi.org/10.18280/ijsse.151112
Page
2323-2331
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Adaptive Clustering Approaches for Domain Name System Anomaly Detection: Comparative Performance Analysis
Khaoula Radi, Mohamed Moughit
https://doi.org/10.18280/ijsse.151113
Page
2333-2342
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
An Accurate Fraud Source Path Identification Using Integration of Graphical Neural Networks, Long-Short Term Memories, and XGBoost
Allamudi Anil Kumar, S. Hrushikesava Raju
https://doi.org/10.18280/ijsse.151114
Page
2343-2352
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
The Relationship Between Paraquat Exposure, Cholinesterase Activity, and Hematological Results Among Sugar Cane Plantation Workers in South Sumatra, Indonesia: A Cross-Sectoral Mediation Analysis
Vivi Oktari, Muhammad Irsan Saleh, Mohammad Zulkarnain, Nurhayati Damiri
https://doi.org/10.18280/ijsse.151115
Page
2353-2360
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Application of Numerical Models for Flood Risk in Arid Regions
Muneam G. Ali, Ammar H. Kamel
https://doi.org/10.18280/ijsse.151116
Page
2361-2366
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
A Framework for Enhancing Transparency and Security in Telehealth Record Access Using Dual-One-Time Passwords
S. Hemalatha, T. Thilagam, Surya Lakshmi Kantham Vinti, B. U. Anu Barathi, B. Yamini Supriya, Jyoti D. Shendage
https://doi.org/10.18280/ijsse.151117
Page
2367-2378
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Machine Learning for Rainfall-Driven Debris Flow Prediction in Data-Scarce Volcanic Watersheds
Jazaul Ikhsan, Sameh Fuqaha, Adam P. Rahardjo, Suharyanto
https://doi.org/10.18280/ijsse.151118
Page
2379-2391
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Extraction of Common Processes of the Investigation Models Proposed in the Drone Forensics Domain
Senan A. M. Alhasan, Siti Hajar Othman
https://doi.org/10.18280/ijsse.151119
Page
2393-2402
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
A Comprehensive Survey on Lightweight Cryptography Algorithms to Enhance Quality of Service in Medical Internet of Things
Tanukonda Padmaja, Misha Chandar
https://doi.org/10.18280/ijsse.151120
Page
2403-2417
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS