Skip to main content
About
About Iieta
Policies
Services
Subscription
Fast Track
Language Support
Conference Services
Publication Services
Journals
CONFERENCES
Books
Submission
Search form
Search IIETA Content
-Any-
Article
Basic page
Blog entry
Journal
Event
Feature
Home
Journals
IJSSE
Archive
Archive
2025: Vol. 15
No. 12, December
No. 11, November
No. 10, October
No. 9, September
No. 8, August
No. 7, July
No. 6, June
No. 5, May
No. 4, April
No. 3, March
No. 2, February
No. 1, January
2024: Vol. 14
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2023: Vol. 13
No. 6, December
No. 5, October
No. 4, September
No. 3, June
No. 2, April
No. 1, February
2022: Vol. 12
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2021: Vol. 11
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2020: Vol. 10
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2019: Vol. 9
No. 4, November
No. 3, September
No. 2, June
No. 1, January
2018: Vol. 8
No. 4, September
No. 3, July
No. 2, February
No. 1, January
2017: Vol. 7
No. 4, November
No. 3, September
No. 2, June
No. 1, March
2016: Vol. 6
No. 4, December
No. 3, August
No. 2, June
No. 1, March
2015: Vol. 5
No. 4, December
No. 3, September
No. 2, June
No. 1, March
2014: Vol. 4
No. 4, December
No. 3, September
No. 2, June
No. 1, March
2013: Vol. 3
No. 4, December
No. 3, September
No. 2, June
No. 1, March
2012: Vol. 2
No. 4, December
No. 3, November
No. 2, June
No. 1, March
2011: Vol. 1
No. 4, December
No. 3, September
No. 2, June
No. 1, March
Artificial Intelligence-Driven Neonatal Disease Diagnosis Using Efficient Particle Swarm Fine-Tuned Dilated Recurrent Neural Net: A High-Precision Deep Learning Approach
Saadya Fahad Jabbar, Asmaa Hussien Alwan, Nuha Sami Mohsin, Israa Ibraheem Al Barazanchi, Ravi Sekhar, Pritesh Shah, Shilpa Malge
https://doi.org/10.18280/ijsse.151201
Page
2419-2430
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Predicting Fatigue in High-Intensity Turnaround Operations Using a Machine Learning Approach
Adithya Sudiarno, Ermi Kusherawati, Rarasmaya Indraswari, Hafidz Ridho
https://doi.org/10.18280/ijsse.151202
Page
2431-2448
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Security Enhancements in Cloud-Based Personal Voice Assistants: A Survey and Evaluation of Cryptographic Techniques
K. Winshiny Madonna, Marshiana Devaerakkam, L. Nisha Evangelin
https://doi.org/10.18280/ijsse.151203
Page
2449-2457
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Performance Optimization in Blockchain-Based Approach to Secure Communication Channel in the Fifth Generation (5G) Authentication Mechanism
Nida Al-Shafi, Nidal Turab
https://doi.org/10.18280/ijsse.151204
Page
2459-2469
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Detecting Digital Image Forgeries Using Error Level Analysis Features and Neural Network Classification Enhanced by Synthetic Minority Over-Sampling Technique
Noor Hamza Aubed, Suhad A. Ali, Majid Jabbar Jawad
https://doi.org/10.18280/ijsse.151205
Page
2471-2482
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Security Engineering of Open Web Application Security Project-Based Automated System for Web Vulnerability Detection and Mitigation
Irawan Afrianto, Ismayani Setyaningrum, Sufa Atin, Eddy Prasetyo Nugroho, Girindro Pringgo Digdo
https://doi.org/10.18280/ijsse.151206
Page
2483-2495
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Secure Data Storage in Android: A DataStore-Based Encrypted Library
Abdennour Jebbar, Ahmed El-Yahyaoui
https://doi.org/10.18280/ijsse.151207
Page
2497-2510
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
A Hybrid Attention-Based Deep Learning Architecture for Phishing Detection
Akshat Uike, Prakash Prasad
https://doi.org/10.18280/ijsse.151208
Page
2511-2518
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Deep Learning Models for Fake Review Detection: A Focus on Bidirectional Encoder Representations from Transformers and Bidirectional Long Short-Term Memory
Wesam Hameed Asaad, Ragheed Allami
https://doi.org/10.18280/ijsse.151209
Page
2519-2530
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
The Impact of Plant Layout Dimensions on Fire Load Density in the Rice Milling Industry in Lambayeque-Peru
Juan Franciosi, Annie Vidarte, Abraham Dávila
https://doi.org/10.18280/ijsse.151210
Page
2531-2539
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
A Hybrid Model of Disaster-Resilient Schools in Padang City, Indonesia
Roni Ekha Putera, Nabilaa Binti Mohamed, Warisah Wanaeloh, Aqil Teguh Fathani, Nika Saputra, Tengku Rika Valentina, Tirza Haqia Purnama
https://doi.org/10.18280/ijsse.151211
Page
2541-2549
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
An Interpretable Hybrid Framework for Principal Component Analysis–Extreme Gradient Boosting and a Single-Class Support Vector Machine for Zero-Day Penetration Detection
Alaa Jalal Abdullah, Muna Rashid Hameed, Qusay Kanaan Kadhim, Shaymaa Taha Ahmed, Ahmed Kanaan Kadhim
https://doi.org/10.18280/ijsse.151212
Page
2551-2559
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
An Integrated Smart Defense Architecture for the Nusantara Capital City of Indonesia
Muhammad Arsy Ash Shiddiqy, Riky Novarizal, Mohd Syaiful Nizam Bin Abu Hassan, Dani Kurniawansyah, Alficandra
https://doi.org/10.18280/ijsse.151213
Page
2561-2572
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Software-Defined Wide Area Network Enhanced IoT Network: Performance Optimization and Security Analysis under Distributed Denial of Service Attack Scenarios
Moussa Malqui, Mariyam Ouaissa, Mariya Ouaissa, Mohamed Hanine
https://doi.org/10.18280/ijsse.151214
Page
2573-2587
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
A Blockchain-Biometric Lightweight Mutual Authentication Protocol for IoT Security
Durvasi Gudivada, Kameswara Rao Manchiraju
https://doi.org/10.18280/ijsse.151215
Page
2589-2602
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Cyber Security Risk Management in the Indonesian Capital Market
Slamet Aji Pamungkas, Widowati, Aris Sugiharto, Muhammad Hilmi Amanullah
https://doi.org/10.18280/ijsse.151216
Page
2603-2611
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Attribute-Based Lightweight Encryption Framework for Securing a Voter Database
Safa A. Ahmed, Ali M. Sagheer
https://doi.org/10.18280/ijsse.151217
Page
2613-2624
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Tree Augmented Naïve Bayesian Network Application on Multiplicative Premium Equation for Indonesian Passenger Vessels
Sridhani Lestari Pamungkas, Raja Oloan Saut Gurning, Dhimas Widhi Handani, Abdul Hafizh
https://doi.org/10.18280/ijsse.151218
Page
2625-2638
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Application of Defensible Space Theory in a Nigerian Secondary School: Faith Academy, Ota
Foluke Jegede, Efe Joanna Ayara
https://doi.org/10.18280/ijsse.151219
Page
2639-2648
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Lightweight Threshold-Based Real-Time Distributed Denial of Service Attack Detection with WebSocket Alerts
Saleha Saudagar, Gayatri Jagnade, Mayura Shelke, Sayali Belhe, Supriya Gorde, Amol Bhosle
https://doi.org/10.18280/ijsse.151220
Page
2649-2657
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS