Skip to main content
About
About Iieta
Policies
Services
Subscription
Fast Track
Language Support
Conference Services
Publication Services
Journals
CONFERENCES
Books
Submission
Search form
Search IIETA Content
-Any-
Article
Basic page
Blog entry
Journal
Event
Feature
Home
Securing IoT Networks: A Post-Quantum Blockchain and Deep Learning Approach for Enhanced Cyber Defense
https://iieta.org/sites/default/files/pdf/2025-01/ijsse_14.06_04.pdf
Optimizing Feature Selection for Intrusion Detection: A Hybrid Approach Using Cuckoo Search and Particle Swarm Optimization
https://iieta.org/sites/default/files/pdf/2025-01/ijsse_14.06_24.pdf
Machine Learning Approaches to Ransomware Detection: A Comprehensive Review
https://iieta.org/sites/default/files/pdf/2025-01/ijsse_14.06_30.pdf
Comparative Analysis of SVM Classifiers in Criminal Profiling Using a Hybridized Algorithm
https://iieta.org/sites/default/files/pdf/2025-01/ijsse_14.06_03.pdf
Hazard and Risk Identification in Earthworks for Road Tunnel Construction: A Case Study of the First Road Tunnel in Kalimantan Island, Indonesia
https://iieta.org/sites/default/files/pdf/2025-01/ijsse_14.06_29.pdf
Policy Design for Strengthening Disaster Risk Reduction Based on Sendai Framework for Action in West Sumatera Province, Indonesia
https://iieta.org/sites/default/files/pdf/2025-01/ijsse_14.06_23.pdf
Hybrid Machine Learning and Blockchain Technology for Early Detection of Cyberattacks in Healthcare Systems
https://iieta.org/sites/default/files/pdf/2025-01/ijsse_14.06_22.pdf
Investigating the Dynamic Interactions Between Safety Knowledge, Attitudes, Behaviors, and Workplace Accidents Among Solid Waste Management Personnel
https://iieta.org/sites/default/files/pdf/2025-01/ijsse_14.06_28.pdf
Chlorine Safety in Water Treatment: A Study of Causes and Preventive Measures Through Fault Tree and Event Tree Analysis
https://iieta.org/sites/default/files/pdf/2025-01/ijsse_14.06_14.pdf
A New Approach to Improving the Security of the 5G-AKA Using Crystals-Kyber Post-Quantum Technologies and ASCON Algorithm
https://iieta.org/sites/default/files/pdf/2025-01/ijsse_14.06_08.pdf
Pages
« first
‹ previous
…
11
12
13
14
15
16
17
18
19
…
next ›
last »