Skip to main content
About
About Iieta
Policies
Services
Subscription
Fast Track
Language Support
Conference Services
Publication Services
Journals
CONFERENCES
Books
Submission
Search form
Search IIETA Content
-Any-
Article
Basic page
Blog entry
Journal
Event
Feature
Home
Journals
IJSSE
Archive
Archive
2025: Vol. 15
No. 9, September
No. 8, August
No. 7, July
No. 6, June
No. 5, May
No. 4, April
No. 3, March
No. 2, February
No. 1, January
2024: Vol. 14
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2023: Vol. 13
No. 6, December
No. 5, October
No. 4, September
No. 3, June
No. 2, April
No. 1, February
2022: Vol. 12
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2021: Vol. 11
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2020: Vol. 10
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2019: Vol. 9
No. 4, November
No. 3, September
No. 2, June
No. 1, January
2018: Vol. 8
No. 4, September
No. 3, July
No. 2, February
No. 1, January
2017: Vol. 7
No. 4, November
No. 3, September
No. 2, June
No. 1, March
2016: Vol. 6
No. 4, December
No. 3, August
No. 2, June
No. 1, March
2015: Vol. 5
No. 4, December
No. 3, September
No. 2, June
No. 1, March
2014: Vol. 4
No. 4, December
No. 3, September
No. 2, June
No. 1, March
2013: Vol. 3
No. 4, December
No. 3, September
No. 2, June
No. 1, March
2012: Vol. 2
No. 4, December
No. 3, November
No. 2, June
No. 1, March
2011: Vol. 1
No. 4, December
No. 3, September
No. 2, June
No. 1, March
Dynamic Mirrored CAPTCHA Design and Security Evaluation
Krishna Chythanya Nagaraju, Salim Amirali Jiwani, Kiran Kumar Bejjanki, Janaki Vinjamuri, Kanchipati C. V. Koushik, Ratan Kollabathula, Dodda Hanoch Raj Jedidiah
https://doi.org/10.18280/ijsse.150901
Page
1767-1773
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Design and Evaluation of a Resilient IoT-Based Safety Monitoring System with Real-Time Alerts for Industrial Environments
Farah Nazar Ibraheem, Qutaiba Ali, Jumana Abdullah Kareem
https://doi.org/10.18280/ijsse.150902
Page
1775-1787
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Design of an Automated UV-C Disinfection Capsule Prototype
Javier Andrea's Moises Verme-Ochoa, Cristian Castro-Vargas
https://doi.org/10.18280/ijsse.150903
Page
1789-1795
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Hybrid Lightweight Cryptographic Framework for Enhancing Security and Efficiency in Healthcare Wireless Sensor Networks
Hemalatha S., KVSV Trinadh Reddy, Tavanam Venkata Rao, Ramaswamy T., Priti Shende,Naga Malleshwari
https://doi.org/10.18280/ijsse.150904
Page
1797-1807
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Network Anomaly Activity Detection Model Based on Feature Correlation Analysis
Yohanes Priyo Atmojo, I Made Darma Susila, Eva Hariyanti, Dandy Pramana Hostiadi, Gede Angga Pradipta, Putu Desiana Wulaning Ayu
https://doi.org/10.18280/ijsse.150905
Page
1809-1817
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
FPGA Implementation of SFN Lightweight Encryption Algorithm
Yasir A. Abbas, Miaad H. Mahdi, Saad Al-Azawi
https://doi.org/10.18280/ijsse.150906
Page
1819-1825
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Hybrid CNN-BiLSTM for Deepfake Voice Detection: A Comparative Study
Sidharth Bhroge, Vijay Mane, Medha Wyawahare, Milind Kamble, Milind Rane, Ruta Sapate, Samruddhi Raut
https://doi.org/10.18280/ijsse.150907
Page
1827-1835
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
A Deep Learning and AutoML-Based Multimodal Text Extraction Framework for Detecting Online Gambling Advertisements in Indonesian Social Media
Ari Muzakir, Usman Ependi, Suyanto
https://doi.org/10.18280/ijsse.150908
Page
1837-1848
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Machine Learning-Based Malware Detection Using Frequency Features
Firas Omar Ahmed, Helen Farqad Taha, Mustafa Mahmood Yahya, Abdulelah Hameed Yaseen
https://doi.org/10.18280/ijsse.150909
Page
1849-1860
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Impact of Green Jobs on Worker Classification and Categorization
Lyazat Aktayeva, Alimzhan Bekmagambetov, Laura Yedilbayeva, Anar Rakhmetova, Gulzhan Daumova, Elmira Kulmagambetova, Nurgul Sagindykova
https://doi.org/10.18280/ijsse.150910
Page
1861-1872
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
A Blockchain-Enabled GNN Framework for Secure Routing in IoT Networks
Rekha K S, Bhat Geetalaxmi Jairam, Jagruthi H, Shashank Dhananjaya, Sonika Sharma D, Suhaas K P, Rakhi Krishna C R, Sunitha R
https://doi.org/10.18280/ijsse.150911
Page
1873-1883
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Are GPT-Powered AI Systems Superior to Traditional Cybersecurity Tools: Applications and Challenges
Abdelzahir Abdelmaboud, Sayeed Salih, Aisha H. A. Hashim, Refan Mohamed Almohamedh, Hayfaa Tajelsier, Abdelwahed Motwakel
https://doi.org/10.18280/ijsse.150912
Page
1885-1900
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Solution Evaluation to Enhance Cloud Computing Security: Challenges and Solutions
Lubab H. Albak, Arwa Hamid Salih Hamdany, Rabei Raad Ali
https://doi.org/10.18280/ijsse.150913
Page
1901-1907
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Trust-Aware Iterative Monitoring for False Alarm Reduction in Intrusion Detection Systems
Aswadhati Sirisha, Kurra Santhi Sri
https://doi.org/10.18280/ijsse.150914
Page
1909-1920
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
YOLOv12-Based Driver Monitoring System: Real-Time Applications in ADAS
Mohammed Chaman, Anas El Maliki, Hamza El Yanboiy, Hamad Dahou, Abdelkader Hadjoudja
https://doi.org/10.18280/ijsse.150915
Page
1921-1932
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Image Encryption Algorithm Based on a New Four-Dimensional Hyper Chaotic System and Second Order Fuzzy Differential Equations
Zainab Ali Dheyab, Sadiq A. Mehdi
https://doi.org/10.18280/ijsse.150916
Page
1933-1940
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Landslide Potential Analysis on Hilly Terrain Based on the CPT Data along the Malang-Kediri Road, Indonesia
Muhammad Fathur Rouf Hasan, Adi Susilo, Eko Andi Suryo, Putera Agung Maha Agung, Kevin Ciputra, Mohammad Singgih Purwanto, Mustaffa Anjang Ahmad, Adnan Zainorabidin
https://doi.org/10.18280/ijsse.150917
Page
1941-1948
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Quantitative Assessment of Thermal Runaway Risk in a Chemical Reactor: Hybrid Approach
Badrtamam Benamrane, Nouara Ouazraoui, Brahim Lakehal, Noureddine Bourmada
https://doi.org/10.18280/ijsse.150918
Page
1949-1959
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Hybrid Deep Learning Framework via Early Feature Fusion for XSS Attacks Detection
Ali Nafea Yousif, Ziyad Tariq Mustafa Al-Ta'i
https://doi.org/10.18280/ijsse.150919
Page
1961-1970
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Evaluating AI-Based Learning Platform to Increase Cybersecurity Awareness: Case Study of Indonesian Students
Puspita Kencana Sari, Hasiva Amalia Dewi, Candiwan Candiwan, Puspita Wulansari, Achmad Nizar Hidayanto, Shinta Oktaviana, Hariandi Maulid
https://doi.org/10.18280/ijsse.150920
Page
1971-1981
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS