Skip to main content
About
About Iieta
Policies
Services
Subscription
Fast Track
Language Support
Conference Services
Publication Services
Journals
CONFERENCES
Books
Submission
Search form
Search IIETA Content
-Any-
Article
Basic page
Blog entry
Journal
Event
Feature
Home
RFID Clone Detection in Supply Chain Using Modified Count-Min and BASE Protocol
https://iieta.org/sites/default/files/pdf/2024-05/ijsse_14.02_12.pdf
Micro Cloud Services Forensics as a Framework
https://iieta.org/sites/default/files/pdf/2024-05/ijsse_14.02_10.pdf
Post-Landslide Liquefaction Analysis: A Case Study in the Kupang Regency Area, Indonesia
https://iieta.org/sites/default/files/pdf/2024-04/ijsse_14.02_25.pdf
The Impact of Call Spoofing on Trust and Communication: A User Perception Study
https://iieta.org/sites/default/files/pdf/2024-04/ijsse_14.02_16.pdf
The Influence of Safety Culture on Safety Attitude, Personnel Error Behavior, and Safety Citizenship Behavior: Research in the Vietnam Oil and Gas Industry
https://iieta.org/sites/default/files/pdf/2024-04/ijsse_14.02_08.pdf
Safety Assessment of Irrigation Weirs by Modeling Local Scour Potential Downstream of Energy Dissipator
https://iieta.org/sites/default/files/pdf/2024-04/ijsse_14.02_20.pdf
Fundamental Study on Evacuation Guidance Assistance Robots in Disasters: A Measurement Method for Evacuation Routes Using 3D-LiDAR
https://iieta.org/sites/default/files/pdf/2024-04/ijsse_14.02_03.pdf
Performance Analysis of Regex-Based Processing for Dark Web Targeted Crawling
https://iieta.org/sites/default/files/pdf/2024-04/ijsse_14.02_14.pdf
Security Concerns and Data Breaches for Data Deduplication Techniques in Cloud Storage: A Brief Meta-Analysis
https://iieta.org/sites/default/files/pdf/2024-04/ijsse_14.02_11_0.pdf
Security Surveillance Using UAVs and Embedded Systems in Industrial Areas
https://iieta.org/sites/default/files/pdf/2024-04/ijsse_14.02_07.pdf
Pages
« first
‹ previous
…
118
119
120
121
122
123
124
125
126
…
next ›
last »