Skip to main content
About
About Iieta
Policies
Services
Subscription
Fast Track
Language Support
Conference Services
Publication Services
Journals
CONFERENCES
Books
Submission
Search form
Search IIETA Content
-Any-
Article
Basic page
Blog entry
Journal
Event
Feature
Home
Journals
IJSSE
Archive
Archive
2025: Vol. 15
No. 9, September
No. 8, August
No. 7, July
No. 6, June
No. 5, May
No. 4, April
No. 3, March
No. 2, February
No. 1, January
2024: Vol. 14
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2023: Vol. 13
No. 6, December
No. 5, October
No. 4, September
No. 3, June
No. 2, April
No. 1, February
2022: Vol. 12
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2021: Vol. 11
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2020: Vol. 10
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2019: Vol. 9
No. 4, November
No. 3, September
No. 2, June
No. 1, January
2018: Vol. 8
No. 4, September
No. 3, July
No. 2, February
No. 1, January
2017: Vol. 7
No. 4, November
No. 3, September
No. 2, June
No. 1, March
2016: Vol. 6
No. 4, December
No. 3, August
No. 2, June
No. 1, March
2015: Vol. 5
No. 4, December
No. 3, September
No. 2, June
No. 1, March
2014: Vol. 4
No. 4, December
No. 3, September
No. 2, June
No. 1, March
2013: Vol. 3
No. 4, December
No. 3, September
No. 2, June
No. 1, March
2012: Vol. 2
No. 4, December
No. 3, November
No. 2, June
No. 1, March
2011: Vol. 1
No. 4, December
No. 3, September
No. 2, June
No. 1, March
Policy Design for Strengthening the Institutional Framework of Disaster Risk Governance in Padang City, Indonesia
Zikri Alhadi, Ory Riandini, Rahmadani Yusran, Fitri Eriyanti, Yuliarti, Artha Dini Akmal, Hidayatul Fajri, Azhari Syarief
https://doi.org/10.18280/ijsse.150801
Page
1541-1555
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Securing Software-Defined Networks with Multi-Layer Defense Mechanisms
Suaad M. Saber, Rasha Thamer Shawi, Bourair Al-Attar, Reyad Omran Essa
https://doi.org/10.18280/ijsse.150802
Page
1557-1563
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Spark-Based Contextual Embeddings for Automated Feature Extraction in Intrusion Detection
R. Panneerselvi, J. Visumathi
https://doi.org/10.18280/ijsse.150803
Page
1565-1575
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
PCDD/Fs and dl-PCBs in Household Dust Near an Incineration Facility in South Africa: Levels, Distribution, and Risk Assessment
Tlou B. Chokwe, Nomathemba Themba, Linda L. Sibali
https://doi.org/10.18280/ijsse.150804
Page
1577-1591
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Public Safety Firearms: Users’ Perceptions and Quality Evaluation of the Beretta APX
Tiago Mesquita Matos da Paz, Celso Vila Nova de Souza Júnior, Alexandre Nascimento de Almeida
https://doi.org/10.18280/ijsse.150805
Page
1593-1602
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Security and Cybersecurity Risk Management in E-Health Systems: A Hybrid Approach
Tellakula Aakanksha, B. Chaitanya Krishna
https://doi.org/10.18280/ijsse.150806
Page
1603-1610
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Integrated Framework for Real-Time Cyber Threat Detection and Mitigation in IoT and Healthcare Systems Using Deep Learning and Blockchain
Zainab Qahtan Mohammed, Chasib Hasan Abooddy, Omar Hatem Zaidan
https://doi.org/10.18280/ijsse.150807
Page
1611-1625
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Promoting Employees’ Well-Being to Mitigate Occupational Risks under Extreme Heat
Amira Zadem, Samia Chettouh, Saadia Saadi
https://doi.org/10.18280/ijsse.150808
Page
1627-1634
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Application of Machine Learning and Deep Learning Techniques for Android Malware Detection
Sangeetha Shivananda, Pramod Tumkur Channabasavanna
https://doi.org/10.18280/ijsse.150809
Page
1635-1645
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
On Chaotic Color Image Encryption Using an Improved Hill Cipher with a Non-Square Pseudo-Random Key Matrix
Mariem Jarjar, Hamid El Bourakkadi, Abdellah Abid, Hassan Tabti, Abdellatif Jarjar, Abdelhamid Benazzi
https://doi.org/10.18280/ijsse.150810
Page
1647-1660
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Quantitative Assessment and Strategic Planning for Jeneberang River Crossing Services
Uswatul Hasanah, Venny Veronica Natalia, Andi Sitti Chairunnisa
https://doi.org/10.18280/ijsse.150811
Page
1661-1671
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
A Review on Adversarial Attacks and Defenses on Image Classification Models
Anuja Jana Naik, Siddesh Vishnu Savant, François Maas
https://doi.org/10.18280/ijsse.150812
Page
1673-1679
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Cybersecurity Strategies and Service Quality in Mobile Payments: The Moderating Role of Fintech Literacy in Building Customer Trust
Syed Khusro Chishty, Sarah Al Qahtani, Sonia Sayari, Shahid Alam, Ahmad Murtaza Alvi
https://doi.org/10.18280/ijsse.150813
Page
1681-1689
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Risk Assessment of Industrial Domino Effects Using Stochastic Petri Nets
Asma Amira, Fares Innal
https://doi.org/10.18280/ijsse.150814
Page
1691-1701
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Hybrid Machine Learning–Based Intrusion Detection for Zero-Day Attack Prevention in Digital Education Networks
Swathi Sridharan, Seema Patil, T. Shobha, Prameetha Pai
https://doi.org/10.18280/ijsse.150815
Page
1703-1713
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Sunny Skies, Sleepy Drivers: Weather Effects on Alertness in A Simulated Driving Environment
Novie Susanto, Maria Goretti Beata Setyo Maharani, Manik Mahachandra
https://doi.org/10.18280/ijsse.150816
Page
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Enhanced Steganographic Framework for Secure Communications
Asmaa Alqassab, Younis Al-Arbo
https://doi.org/10.18280/ijsse.150817
Page
1723-1731
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
A Review on Intrusion Detection Systems for MQTT in IoT Environments
Kholoud Nasser Al Maawi, Monir Abdullah
https://doi.org/10.18280/ijsse.150818
Page
1733-1744
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Deep Reinforcement Learning-Based Energy-Aware Intrusion Prevention in IoT Environment
K. S. Rekha, Priyadarshini Jainapur, K. Manjushree, Shashank Dhananjaya, S. R. Nandini, G. Nandini, R. Sunitha
https://doi.org/10.18280/ijsse.150819
Page
1745-1754
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Analysis of Thermal Stress and Ergonomic Risks in the Oil Industry in Ecuador
Vinicio Rodríguez-Fiallos, Lady Bravo-Montero, Gricelda Herrera-Franco
https://doi.org/10.18280/ijsse.150820
Page
1755-1765
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS