Skip to main content
About
About Iieta
Policies
Services
Subscription
Fast Track
Language Support
Conference Services
Publication Services
Journals
CONFERENCES
Books
Submission
Search form
Search IIETA Content
-Any-
Article
Basic page
Blog entry
Journal
Event
Feature
Home
Journals
IJSSE
Archive
Archive
2025: Vol. 15
No. 7, July
No. 6, June
No. 5, May
No. 4, April
No. 3, March
No. 2, February
No. 1, January
2024: Vol. 14
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2023: Vol. 13
No. 6, December
No. 5, October
No. 4, September
No. 3, June
No. 2, April
No. 1, February
2022: Vol. 12
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2021: Vol. 11
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2020: Vol. 10
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2019: Vol. 9
No. 4, November
No. 3, September
No. 2, June
No. 1, January
2018: Vol. 8
No. 4, September
No. 3, July
No. 2, February
No. 1, January
2017: Vol. 7
No. 4, November
No. 3, September
No. 2, June
No. 1, March
2016: Vol. 6
No. 4, December
No. 3, August
No. 2, June
No. 1, March
2015: Vol. 5
No. 4, December
No. 3, September
No. 2, June
No. 1, March
2014: Vol. 4
No. 4, December
No. 3, September
No. 2, June
No. 1, March
2013: Vol. 3
No. 4, December
No. 3, September
No. 2, June
No. 1, March
2012: Vol. 2
No. 4, December
No. 3, November
No. 2, June
No. 1, March
2011: Vol. 1
No. 4, December
No. 3, September
No. 2, June
No. 1, March
A New Intrusion Detection System for RPL Based on Machine Learning
Jihad Dazine, Abderrahim Maizate, Larbi Hassouni
https://doi.org/10.18280/ijsse.150601
Page
1089-1101
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Hybrid AI for Arabic Sensitive Data Detection: Enhancing Privacy Compliance in Egypt
Omar Elbarbary, Mohamed Rasslan, Alia El Bolock, Caroline Sabty
https://doi.org/10.18280/ijsse.150602
Page
1103-1109
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
New Approach to Image Encryption Based on Large Invertible Pseudo-Random Matrices
Hicham Rrghout, Mourad Kattass, Younes Qobbi, Naima Benazzi, Abdellatif JarJar, Abdelhamid Benazzi
https://doi.org/10.18280/ijsse.150603
Page
1111-1121
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Securing Smart Vehicles: A Bilateral TARA Approach for ISO 21434 and ASPICE for CS Compliance
Ahmed Adel Mohamed, Heba Aslan, Tamer Arafa
https://doi.org/10.18280/ijsse.150604
Page
1123-1137
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Hybrid Vigenère-Hill Approach for Color Image Encryption
Mourad Kattass, Hicham Rrghout, Hamid El Bourakkadi, Abdellah Abid, Abdellatif Jarjar, Abdelhamid Benazzi
https://doi.org/10.18280/ijsse.150605
Page
1139-1149
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Enhancing Safety Standards in Purse Seine Fisheries: An Assessment of Maritim Labor Convention (MLC) Compliance in Indonesian Waters
Eko Sulkhani Y., Sunardi, Daduk Setyohadi, R. Sapto Pamungkas, Muh Arif Rahman, Muamar Kadhafi
https://doi.org/10.18280/ijsse.150606
Page
1151-1158
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Examining the Impact of Health Expenditure on Life Expectancy in Kazakhstan: A Causality Analysis
Zeynab Giyasova, Naila Eyvazova, Ilhama Mahmudova, Vusal Guliyev, László Vasa
https://doi.org/10.18280/ijsse.150607
Page
1159-1164
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Comparative Analysis of Two-Step Machine Learning Models for Botnet SPAM Detection
Thoriq Afif Habibi, Tohari Ahmad, Dandy Pramana Hostiadi, Muhammad Aidiel Rachman Putra, Ntivuguruzwa Jean De La Croix, Md. Sagar Hossen, Abdulati K. S. Jahbel, Royyana M. Ijtihadie
https://doi.org/10.18280/ijsse.150608
Page
1165-1172
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
IoT-Based Smart Waste Management System: A Solution for Urban Sustainability
Jamil Abedalrahim Jamil Alsayaydeh, Rex Bacarra, Adam Wong Yoon Khang, Noorayisahbe Bt Mohd Yaacob, Safarudin Gazali Herawan
https://doi.org/10.18280/ijsse.150609
Page
1173-1183
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
A Hyperledger-Based Secure Framework for Academic Certificate Authentication Using Blockchain
Siba Prasad Dash, Ajay Kumar Jena, Dileep Kumar Murala
https://doi.org/10.18280/ijsse.150610
Page
1185-1195
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Dynamics of Flood and Landslide Risk Governance Policy in Solok Regency, Indonesia
Zikri Alhadi, Agid Rahman, Rahmadani Yusran, Yuliarti, Fitri Eriyanti, Yudi Antomi, Iip Permana
https://doi.org/10.18280/ijsse.150611
Page
1197-1217
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Blockchain Enabled Light Weight Encryption Scheme for IoT-Edge Devices Applied for Smart Medical Image Transmission
Goli Archana, Rajeev Goyal, K.M.V. Madan Kumar
https://doi.org/10.18280/ijsse.150612
Page
1219-1228
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Cybersecurity Compliance and Other Factors Influencing Employee Protective Behavior: A Case Study of Bank X in Indonesia
Andi Amelia Putri Maharani Akib, Candiwan Candiwan, Dian Puteri Ramadhani
https://doi.org/10.18280/ijsse.150613
Page
1229-1241
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
A Hybrid Oversampling Approach for Fraud Detection: Integrating SMOTE-ENN and ADASYN
Ammar Ali Mustafa, Haneen Mohammed Hussein, Mohammed Mundher Kadhim, Marwan J. Hussein
https://doi.org/10.18280/ijsse.150614
Page
1243-1250
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Bakaum: How Local Communities Handle Crisis in Policy Perspective
Misnar Sitriwanti, Ismi Dwi Astuti Nurhaeni, Roni Ekha Putera, Indah Adi Putri
https://doi.org/10.18280/ijsse.150615
Page
1251-1264
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Multi-Class Anomaly Detection in Network Intrusion Detection Using Variational Autoencoder
Azhar F. Al-zubidi, Alaa Kadhim Farhan
https://doi.org/10.18280/ijsse.150616
Page
1265-1278
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Multi-Level Node Behavior Pattern Analysis for Malicious Node Detection with False Alarm Reduction in Wireless Sensor Networks
Midhunchakkaravarthy, Orchu Aruna
https://doi.org/10.18280/ijsse.150617
Page
1279-1292
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Towards Safer Roads: A Review of Hybrid Machine Learning and Vision-Based Approaches for Speed Bump Detection in Intelligent Transportation Systems
Ankita Gupta, P. Abirami, Om Prakash Bharthuar, Mukul Malviya, Shripad Deshpande
https://doi.org/10.18280/ijsse.150618
Page
1293-1308
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Using Fuzzy DEMATEL Technique in Analyzing and Evaluating the Risks of Construction Projects
Yasser Sahib Nassar, Ali Hasan. Hadi, Ryad Tuma Hazem
https://doi.org/10.18280/ijsse.150619
Page
1309-1323
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Smarter Secure Surveillance: Leveraging AI, IoT, and Cryptographic Techniques for Enhanced Public Safety
Mona, Manjushree C. V., Manikantha K., Shilpa G. V., Rekha B., Shreedevi Suresh Ronihal
https://doi.org/10.18280/ijsse.150620
Page
1325-1332
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS