Skip to main content
About
About Iieta
Policies
Services
Subscription
Fast Track
Language Support
Conference Services
Publication Services
Journals
CONFERENCES
Books
Submission
Search form
Search IIETA Content
-Any-
Article
Basic page
Blog entry
Journal
Event
Feature
Home
Most Read and Cited
Most Read and Cited
Most Read and Cited
Prioritization of Hazards by Means of A QFD-Based Procedure
Mara Lombardi, Mario Fargnoli
https://doi.org/10.2495/SAFE-V8-N2-342-353
Page
342-353
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
https://www.witpress.com/elibrary/sse-volumes/8/2/2133
Problems of European Integration in the Construction of EU Security Policy in the Context of Counter-Terrorism
Myroslav Kryshtanovych, Liudmyla Akimova, Valentina Shamrayeva, Marta Karpa, Oleksandr Akimov
https://doi.org/10.18280/ijsse.120411
Page
501-506
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Office Building Occupancy Monitoring Through Image Recognition Sensors
Mannino Antonino, Moretti Nicola, Dejaco Mario Claudio, Baresi Luciano, Re Cecconi Fulvio
https://doi.org/10.2495/SAFE-V9-N4-371-380
Page
371-380
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
https://www.witpress.com/elibrary/sse-volumes/9/4/2554
Influence of COVID-19 on the Functional Device of State Governance of Economic Growth of Countries in the Context of Ensuring Security
Myroslav Kryshtanovych, Liudmyla Antonova, Viktoriia Filippova, Svitlana Dombrovska, Tetiana Pidlisna
https://doi.org/10.18280/ijsse.120207
Page
193-199
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Software Supply Chain Attacks, a Threat to Global Cybersecurity: SolarWinds’ Case Study
Jeferson Martínez, Javier M. Durán
https://doi.org/10.18280/ijsse.110505
Page
537-545
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Flood Risk Management in Nigeria: A Review of the Challenges and Opportunities
V.O. Oladokun, D. Proverbs
https://doi.org/10.2495/SAFE-V6-N3-485-497
Page
485-497
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
https://www.witpress.com/elibrary/sse-volumes/6/3/1343
Emerging Issues in the Management of Floods in Ghana
D.K. Ahadzie, D.G. Proverbs
https://doi.org/10.2495/SAFE-V1-N2-182-192
Page
182-192
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
https://www.witpress.com/elibrary/sse-volumes/1/2/526
Implementation of a Secure Ride-Sharing DApp Using Smart Contracts on Ethereum Blockchain
Sathya A. Renu, Barnali Gupta Banik
https://doi.org/10.18280/ijsse.110205
Page
167-173
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Effects of Information Security and Innovations on Country’s Image: Governance Aspect
Olha Petroye, Oleksii Lyulyov, Iryna Lytvynchuk, Yurii Paida, Vladimir Pakhomov
https://doi.org/10.18280/ijsse.100404
Page
459-466
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Homeowners’ Perceptions of Property-Level Flood Risk Adaptation (PLFRA) Measures: The Case of the Summer 2007 Flood Event in England
R. Joseph, D. Proverbs, J. Lamond
https://doi.org/10.2495/SAFE-V5-N3-251-265
Page
251-265
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
https://www.witpress.com/elibrary/sse-volumes/5/3/995
A Mining Project is a Field of Risks: A Systematic and Preliminary Portrait of Mining Risks
A. Badri, S. Nadeau, A. Gbodossou
https://doi.org/10.2495/SAFE-V2-N2-145-166
Page
145-166
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
https://www.witpress.com/elibrary/sse-volumes/2/2/629
An Active Man-In-The-Middle Attack on Bluetooth Smart Devices
Tal Melamed
https://doi.org/10.2495/SAFE-V8-N2-200-211
Page
200-211
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
https://www.witpress.com/elibrary/sse-volumes/8/2/2120
Using Fuzzy AHP and Fuzzy TOPSIS Approaches for Assessing Safety Conditions at Worksites in Construction Industry
A. Basahel, O. Taylan
https://doi.org/10.2495/SAFE-V6-N4-728-745
Page
728-745
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
https://www.witpress.com/elibrary/sse-volumes/6/4/1663
A Systematic Literature Review on the Application of Multicriteria Decision Making Methods for Information Security Risk Assessment
Davor Maček, Ivan Magdalenić, Nina Begičević Ređep
https://doi.org/10.18280/ijsse.100202
Page
161-174
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
From Risk Management to Quantitative Disaster Resilience – A Paradigm Shift
S. P. Simonovic
https://doi.org/10.2495/SAFE-V6-N2-85-95
Page
85-95
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
https://www.witpress.com/elibrary/sse-volumes/6/2/1152
Modeling the Process of Forming the Safety Potential of Engineering Enterprises
Myroslav Kryshtanovych, Liudmyla Akimova, Oleksandr Akimov, Natalya Kubiniy, Viktoria Marhitich
https://doi.org/10.18280/ijsse.110302
Page
223-230
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
CBRNe Training in Virtual Environments: SWOT Analysis & Practical Guidelines
Markus Murtinger, Emma Jaspaert, Helmut Schrom-Feiertag, Sebastian Egger-Lampl
https://doi.org/10.18280/ijsse.110402
Page
295-303
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Assessment of Aspects of the COVID-19 Crisis in the Context of Ensuring Economic Security
Anzhela Kuznyetsova, Tetiana Sydorchenko, Olena Zadvorna, Uliana Nikonenko, Olena Khalina
https://doi.org/10.18280/ijsse.110601
Page
615-622
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Pollution Dispersion from a Fire Using a Gaussian Plume Model
Nicoletta Lotrecchiano, Daniele Sofia, Aristide Giuliano, Diego Barletta, Massimo Poletto
https://doi.org/10.18280/ijsse.100401
Page
431-439
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
The Integrated Security System of the Vatican City State
F. Garzia, E. Sammarco, R. Cusani
https://doi.org/10.2495/SAFE-V1-N1-1-17
Page
1-17
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
https://www.witpress.com/elibrary/sse-volumes/1/1/485