Skip to main content
About
About Iieta
Policies
Services
Subscription
Fast Track
Language Support
Conference Services
Publication Services
Journals
CONFERENCES
Books
Submission
Search form
Search IIETA Content
-Any-
Article
Basic page
Blog entry
Journal
Event
Feature
Home
Network-Centric Security Awareness in Software Development: Integrating Vulnerability Patterns, Developer Practices, and Organizational Controls
https://iieta.org/sites/default/files/pdf/2026-04/ijsse_16.02_07.pdf
Comparative Performance of Class Imbalance Treatments in Random Forest for Social Engineering Classification
https://iieta.org/sites/default/files/pdf/2026-04/ijsse_16.02_14.pdf
Causal Drivers of Sinking and Capsizing Accidents Involving Passenger Ships and Roll-on/Roll-off Ferries in Indonesia
https://iieta.org/sites/default/files/pdf/2026-04/ijsse_16.02_11.pdf
A New Four-Dimensional Hyperchaotic System with Four Unstable Equilibria: Dynamical Analysis, Bifurcation Structure, and Initial-Condition Sensitivity
https://iieta.org/sites/default/files/pdf/2026-04/ijsse_16.02_09_0.pdf
Fast Entropy Quantile Forest for Federated Distributed Denial of Service Detection in Software-Defined Networking Environments
https://iieta.org/sites/default/files/pdf/2026-04/ijsse_16.02_05.pdf
Improving Early Fire and Smoke Detection with YOLOv12N via Histogram-Based Contrast Enhancement
https://iieta.org/sites/default/files/pdf/2026-04/ijsse_16.02_17.pdf
A Novel STRIDE Model for Improved Security and DDoS Mitigation for Software-Defined Networking
https://iieta.org/sites/default/files/pdf/2026-04/ijsse_16.02_10.pdf
Proximity-Based Trust Classification for Private and Public IoE Devices Using a Hybrid CNN–LSTM Architecture
https://iieta.org/sites/default/files/pdf/2026-04/ijsse_16.02_01_0.pdf
Enhancing Water Security and Aquifer Recharge through Rainwater Harvesting and Soil Percolation: A Sustainable Strategy for Security in Rote Ndao Regency, East Nusa Tenggara
https://iieta.org/sites/default/files/pdf/2026-04/ijsse_16.02_16.pdf
A Deep Learning Framework for Covert Timing Channel Detection Using Gramian Angular Field and Markov Transition Field Fusion and Convolutional Neural Networks
https://iieta.org/sites/default/files/pdf/2026-04/ijsse_16.02_03.pdf
Pages
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »