Skip to main content
About
About Iieta
Policies
Services
Subscription
Fast Track
Language Support
Conference Services
Publication Services
Journals
CONFERENCES
Books
Submission
Search form
Search IIETA Content
-Any-
Article
Basic page
Blog entry
Journal
Event
Feature
Home
Journals
IJSSE
CURRENT ISSUE
CURRENT ISSUE
Vol. 15, No. 2, February 2025
Comparative Analysis of Malware Detection Approaches in Cloud Computing
Doaa Abdelrahman, Mohamed Rasslan, Nashwa Abdelbaki
https://doi.org/10.18280/ijsse.150201
Page
197-207
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
The Impact of Safety Culture on Workers' Safety Motivation and Behavior in Vietnam's Construction Industry
Nguyen Trong Minh Thai, Nguyen Ngoc Hien
https://doi.org/10.18280/ijsse.150202
Page
209-218
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Decentralized and Secure Access Control Model for Multi-Cloud Data Storage
Mohammed El Moudni, Elhoussaine Ziyati
https://doi.org/10.18280/ijsse.150203
Page
219-231
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Geophysical Investigations for the Characterisation of the Landslide Zone, Pungalapampa-Puninhuayco-Alao, Chimborazo, Ecuador
Dania Costales-Iglesias, María Jaya-Montalvo, Joselyne Solórzano, Paúl Carrión-Mero
https://doi.org/10.18280/ijsse.150204
Page
233-245
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
IoT-Based Real-Time Carbon Monoxide Mitigation for MSME Indoor Environments
Fivia Eliza, Oriza Candra, Riki Mukhaiyar, Radinal Fadli, Abdulnassir Yassin, Valiant Lukad Perdana Sutrisno, Mustofa Abi Hamid, Mohammad Raafi Jauhari
https://doi.org/10.18280/ijsse.150205
Page
247-256
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Applying Xfuzzy for the Development of Fuzzy Logic-Based Anomaly Detection Systems in Network Security: Moroccan Agribusiness SME
Fadoua Tamtam, Amina Tourabi
https://doi.org/10.18280/ijsse.150206
Page
257-265
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Design and Implementation of Distributed Web Application Vulnerability Assessment Tools for Securing Complex Microservices Environment
Muhammad Izzat, Ferry Astika Saputra, Iwan Syarif
https://doi.org/10.18280/ijsse.150207
Page
267-273
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Prioritizing Risks in Production Activities: A Study of Salt Processing Enterprises in the Central Region of Vietnam
Khoat Tran Van, Anh Tuan Nguyen, Vo Van Tuyen
https://doi.org/10.18280/ijsse.150208
Page
275-285
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Leveraging Centrality Matrix and Enhanced Walrus Evoked Learning Framework for Digital Forensics Anomaly Data Detection
Srikanth Addagatla, G. Madhukar Rao
https://doi.org/10.18280/ijsse.150210
Page
297-307
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Enhancing Service Quality Through Effective Language and Fuzzy SERVQUAL in Occupational Safety Companies
Sitti Rahmawati, Ahmad Padhil, Rizkariani Sulaiman, Umar Mansyur
https://doi.org/10.18280/ijsse.150211
Page
309-314
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Steganalysis of Secret Messages Using the Blockiness Method on Stego Color Images
Fatimah Husam Kamil, Maisa'a Abid Ali Khodher, Layth Kamil Adday
https://doi.org/10.18280/ijsse.150212
Page
315-321
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Authentication in Liveness Detection Utilizing CNN and MobileViT Algorithm
Vera Suryani, Fazmah Arif Yulianto, Parman Sukarno, Gian Maxmillian Firdaus
https://doi.org/10.18280/ijsse.150213
Page
323-330
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Hybrid Machine Learning for Fraud Detection: Balancing Accuracy and Security in Digital Transactions
A. Anil Kumar, S. Hrushikesava Raju
https://doi.org/10.18280/ijsse.150214
Page
331-337
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Determinant Factors Affecting Design for Safety in Planning Stage of High-Rise Building
Muhammad Alfanny Setiawan, Rossy Armyn Machfudiyanto, Akhmad Suraji
https://doi.org/10.18280/ijsse.150215
Page
339-347
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
New Approach in Steganography Algorithm by Using Audio and Image as Secure Information Based on Chaotic Method
Aliaa Sadoon Abd, Osama Qasim Jumah Al-Thahab, Ahmed A. Hamad
https://doi.org/10.18280/ijsse.150216
Page
349-358
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Monte Carlo Aggregating Method for Radon Precursor-Based Earthquake Parameter Prediction in Java, Indonesia
Wahyu Sukestyastama Putra, Sunarno, I Wayan Mustika
https://doi.org/10.18280/ijsse.150217
Page
359-367
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Design and Develop the Business Process Model for Open Access Copyright Management System Using Permission Less Blockchain
K. Varaprasada Rao, Dileep Kumar Murala, Sandeep Kumar Panda
https://doi.org/10.18280/ijsse.150218
Page
369-382
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Risk Assessment Using a Structured Combined Method
Seif El Islam Bouasla, Youcef Zennir, EL-Arkam Mechhoud, Manuel Rodriguez
https://doi.org/10.18280/ijsse.150219
Page
383-396
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Enhancing Crashworthiness of Aluminum Fishing Boats with Stiffener Plate Configurations
Sunardi, Moch Agus Choiron, Sugiarto, Putu Hadi Setyarini, Hasanudin, Oktiyas Muzakky Lutfi
https://doi.org/10.18280/ijsse.150220
Page
397-404
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS