Skip to main content
About
About Iieta
Policies
Services
Subscription
Fast Track
Language Support
Conference Services
Publication Services
Journals
CONFERENCES
Books
Submission
Search form
Search IIETA Content
-Any-
Article
Basic page
Blog entry
Journal
Event
Feature
Home
Journals
IJSSE
CURRENT ISSUE
CURRENT ISSUE
Vol. 15, No. 7, July 2025
Database Manipulation Security Risk Detection (DMSRD) Based on GSP and Markov Chain
Natthaphong Luangnaruedom, Somchai Prakancharoen, Thavatchai Ngamsantivong
https://doi.org/10.18280/ijsse.150701
Page
1333-1347
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Preparedness for Fire Emergencies in The Security Industry: Demographic Determinants of Fire Emergency Preparedness in Security Personnel
Ng Goot Seong, Abdul Mutalib Bin Leman
https://doi.org/10.18280/ijsse.150702
Page
1349-1360
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Towards a Security Model for Dynamic Access Control in Graph Databases
Samira Telghamti, Lakhdar Derdouri, Abdelhabib Bourouis
https://doi.org/10.18280/ijsse.150703
Page
1361-1368
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Symmetric Image Encryption Using Chaotic Logistic Map and Deep Convolutional Feature Learning
Christy Atika Sari, Eko Hari Rachmawanto, Folasade Olubusola Isinkaye, Rabei Raad Ali
https://doi.org/10.18280/ijsse.150704
Page
1369-1377
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Assessing the Role of Human Factors in Traffic Accident Causation
Omer M. Sreesih, Hanan A. Khudhair
https://doi.org/10.18280/ijsse.150705
Page
1379-1385
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Data-Driven Insights into Road Accident Severity in Sub-Saharan Africa: A Multiple Correspondence Analysis for SDG-Aligned Policy
Timothy T. Adeliyi, Deborah Oluwadele, Oluwasegun J. Aroba, Kevin Igwe
https://doi.org/10.18280/ijsse.150706
Page
1387-1396
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Bus Drivers’ Perspectives on Factors Contributing to Road Traffic RTAs on Prithvi and Mugling-Narayanghat Highway Segment in Nepal
Om Prakash Giri, Padma Bahadur Shahi
https://doi.org/10.18280/ijsse.150707
Page
1397-1407
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Ring-LWE Authentication in Centralized Cognitive Radio Networks
Israa Nasir Abdulhussien
https://doi.org/10.18280/ijsse.150708
Page
1409-1414
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Key Node Authentication Model Using Asymmetric Cryptography for Smart Cities
Nalluri Brahma Naidu, Gondi Lakshmeewari
https://doi.org/10.18280/ijsse.150709
Page
1415-1426
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Steganalysis Secret Message Using Rich Model Method for Stego Color Image
Fatimah Husam Kamil, Maisa'a Abid Ali Khodher, Layth Kamil Adday
https://doi.org/10.18280/ijsse.150710
Page
1427-1436
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Safety Culture and Managerial Behavior in Indonesian Tourism: A PLS-SEM Analysis of Mediating Effects
Faidal, Ahmad Rizki Sridadi, Dian Ekowati
https://doi.org/10.18280/ijsse.150711
Page
1437-1443
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Multimodal Deep Learning Framework Using Transformer and LSTM Models for Suicide Risk Detection from Social Media and Voice Data
Shwetha Sadashiva, Koratagere Gangadharasastry Manjunath
https://doi.org/10.18280/ijsse.150712
Page
1445-1459
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Enhancing Food Security in Central Asia and the Caucasus: A SWOT Analysis of Agro-Industrial Potential
Dmitry Zhilyakov, Olga Petrushina, Konstantin Meshcheryakov, Alexander Petrov, Sergey Guskov, Dilnoza Ibrayimova, Altynay Shilmanova, Diana Stepanova, Judith Josefina Hernández García De Velazco
https://doi.org/10.18280/ijsse.150713
Page
1461-1470
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Risk Assessment of Information System Audit Tools Based on SPBE Risk Management Guidelines
Harnum Annisa Prafitia, Nilo Legowo
https://doi.org/10.18280/ijsse.150714
Page
1471-1480
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
A Deep Learning-Based Approach for Gender Prediction in Digital Forensics
Abeer D. Salman, Aymen Jalil Abdulelah, Ali Al-Kubaisi
https://doi.org/10.18280/ijsse.150715
Page
1481-1492
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Application of RPZ-Based DNS Filtering in Educational Network Security
Aries Maesya, Victor Ilyas Sugara, Azi Heris Saputra
https://doi.org/10.18280/ijsse.150716
Page
1493-1500
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Urban Building Safety Through Public Participation and Digital Governance in Indonesia
Dwi Putranto Riau, Abdurrahman Rahim Thaha, Florentina Ratih Wulandari, Guntur Bagus Pamungkas, Koespiadi
https://doi.org/10.18280/ijsse.150717
Page
1501-1508
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
A Hybrid Encryption Method for Data Security Based on ARB3 Algorithm
Vijay Vamsi Nadakuditi, Radhika Rani Chintala
https://doi.org/10.18280/ijsse.150718
Page
1509-1518
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Multi-Encoding Distributed Steganography (MEDS): A High-Security and Fault-Tolerant Framework for Secure Data Hiding in Multi-Cloud Environment
Syed Shakeel Hashmi, Sireesha Moturi, Arshad Ahmad Khan Mohammad, Raj Mohammad Mohd, Arif Mohammad Abdul, Anusha Marouthu
https://doi.org/10.18280/ijsse.150719
Page
1519-1526
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Evolution of Automated Penetration Testing: Toolchains, Integration Strategies, and Operational Challenges
Vijaykumar Bidve, Kiran Kakade, Priyanka Paygude, Ranjeet Vasant Bidwe, Sunil Sangve, Aryani Gangadhara
https://doi.org/10.18280/ijsse.150720
Page
1527-1539
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS