Skip to main content
About
About Iieta
Policies
Services
Subscription
Fast Track
Language Support
Conference Services
Publication Services
Journals
CONFERENCES
Books
Submission
Search form
Search IIETA Content
-Any-
Article
Basic page
Blog entry
Journal
Event
Feature
Home
Journals
IJSSE
Archive
Archive
2025: Vol. 15
No. 7, July
No. 6, June
No. 5, May
No. 4, April
No. 3, March
No. 2, February
No. 1, January
2024: Vol. 14
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2023: Vol. 13
No. 6, December
No. 5, October
No. 4, September
No. 3, June
No. 2, April
No. 1, February
2022: Vol. 12
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2021: Vol. 11
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2020: Vol. 10
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2019: Vol. 9
No. 4, November
No. 3, September
No. 2, June
No. 1, January
2018: Vol. 8
No. 4, September
No. 3, July
No. 2, February
No. 1, January
2017: Vol. 7
No. 4, November
No. 3, September
No. 2, June
No. 1, March
2016: Vol. 6
No. 4, December
No. 3, August
No. 2, June
No. 1, March
2015: Vol. 5
No. 4, December
No. 3, September
No. 2, June
No. 1, March
2014: Vol. 4
No. 4, December
No. 3, September
No. 2, June
No. 1, March
2013: Vol. 3
No. 4, December
No. 3, September
No. 2, June
No. 1, March
2012: Vol. 2
No. 4, December
No. 3, November
No. 2, June
No. 1, March
2011: Vol. 1
No. 4, December
No. 3, September
No. 2, June
No. 1, March
Optimal Feature Extraction Model for Detecting Cyberattacks on IoT Devices
Monir Abdullah
https://doi.org/10.18280/ijsse.150301
Page
405-413
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Occupational Hazards in Mineral Ore Crushing and Grinding: A Literature Review
Gulzhan Nuruldaeva, Asel Isakhanova, Dauren Kumar, Bakdaulet Kumar
https://doi.org/10.18280/ijsse.150302
Page
415-426
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Click Fraud Detection in Online Advertising: A Comparative Study of Machine Learning Models
Zainab A. Abbas, Zahraa M. Hilal, Hanan G. Jabbar
https://doi.org/10.18280/ijsse.150303
Page
427-441
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Determinants of Security Behavior Intention in State-Owned Enterprises: Applying Protection Motivation Theory to Phishing Emails
Okta Pratama, Riadi Arief Aladin, Budiarto Lim, Arta Moro Sundjaja
https://doi.org/10.18280/ijsse.150304
Page
443-453
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Proactive MiDLAF: A Novel Mining MinHash-Deep Learning Approach for Advanced Spam Email Filtering
Fryal Jassim Abd Al-Razaq, Ali Kadhim Bermani, Ali Khalid Ali, Mehdi Ebady Manaa
https://doi.org/10.18280/ijsse.150305
Page
455-463
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Communication Innovations for Adaptation to Climate Change and Increased Disaster Risk
Dadang Sugiana, Asep Suryana, Teddy Kurnia Wirakusumah, Priyo Subekti
https://doi.org/10.18280/ijsse.150306
Page
465-477
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
SIOPA-DLMUC: A Self-Improved Orca Predation Algorithm with Deep Learning for Enhancing 5G Enabled Cognitive Radio Network Security
M. Minilal, M. Meena
https://doi.org/10.18280/ijsse.150307
Page
479-489
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Challenges and Development of Disaster Mitigation Policies in North Luwu Regency: Strengthening Post-Disaster Resilience
Iqbal Aidar Idrus, Kasmad Kamal, Syahiruddin Syah
https://doi.org/10.18280/ijsse.150308
Page
491-498
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Performance of Chain Energy-Absorbing Anti-Impact Brackets
Like Zhao, Xueqi Zhang, Hao Luo, Hanjun Gao, Xinpin Zhang, Shuwei Hu, Yonghui Xiao, Runze Zhang
https://doi.org/10.18280/ijsse.150309
Page
499-507
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
A Hybrid Semantic Enrichment Approach for Multi-Label Toxic Speech Detection
Ari Muzakir, Uci Suriani, Usman Ependi
https://doi.org/10.18280/ijsse.150310
Page
509-520
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
A Hybrid Security System for Text Encryption and Steganography in Video Using Multi-Level Chaotic Maps
Suhad Naji Al-Rekaby, Maisa’a Abid Ali Khodher, Layth Kamil Adday
https://doi.org/10.18280/ijsse.150311
Page
521-532
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Design of Reliability Monitoring on Solar Power Plants Using Artificial Neural Network
Muhammad Khamim Asy’ari, Vinar Shinta Saitama Sitanggang, Kevin Bestian Ginting
https://doi.org/10.18280/ijsse.150312
Page
533-541
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Enhanced Gated Sway Network and Hybrid Henon Encryption for Secured VANET Communication
Thuvva Anjali, Rajeev Goyal, G. N. Balaji
https://doi.org/10.18280/ijsse.150313
Page
543-553
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Comprehensive Analysis of Physical and Mental Workloads for Electronic Installation Workers Utilizing CVL and NASA-TLX at the Building X Construction
Ari Rahman, Diva Ramadhani Jatnika, Betanti Ridhosari, Eri Aryani
https://doi.org/10.18280/ijsse.150314
Page
555-562
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Parallel and GPU-Based Optimization of XGBoost and Neural Networks for Effective Landmine Classification
Lesia Mochurad, Nataliya Shakhovska, Jamil Abedalrahim Jamil Alsayaydeh, Mohd Faizal Yusof
https://doi.org/10.18280/ijsse.150315
Page
563-572
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Integrating Deep Learning into Location-Aided Routing (LAR) for Enhanced Mobile Ad-Hoc Networks (MANET): A Comprehensive Survey
Bourair Al-Attar, Zaid H. Nasralla, Intisar A. M. Al Sayed, Jamal Fadhil Tawfeq, Ravi Sekhar, Pritesh Shah, Shilpa Malge
https://doi.org/10.18280/ijsse.150316
Page
573-588
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Comparative Assessment of Preventive Maintenance Strategies for Enhanced Reliability, Security, and Cost Reduction in Industrial Systems
Oussama Berrahal, Brahim Hamaidi, Mohamed Djemana, Hadjadj Elias
https://doi.org/10.18280/ijsse.150317
Page
589-599
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Evaluation of the Impact of Indoor and Outdoor Background Ionizing Radiation on Health risk in two Physics University Laboratories
Mohamed Eisa, Mohamed Ali, Mustafa Abualreish, Safwa Yagoub, Lamiaa Amin, Gamal Khamis
https://doi.org/10.18280/ijsse.150318
Page
601-607
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Integrating Human Performance Factors to Improve Occupational Risk Assessment
Leila Aouragh, Nouara Ouazraoui , Leila Boubaker, Noureddine Bourmada, Abdelhak Sekhri
https://doi.org/10.18280/ijsse.150319
Page
609-619
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Evaluating Students’ Vulnerability and Awareness to Phishing Attacks in Educational Institutions
Kennedy Okokpujie, Michael Ayomide Ariyo, Funmilayo S. Moninuola, Matthew Boladele Akanle, Imhade P. Okokpujie
https://doi.org/10.18280/ijsse.150320
Page
621-630
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS