Skip to main content
About
About Iieta
Policies
Services
Subscription
Fast Track
Language Support
Conference Services
Publication Services
Journals
CONFERENCES
Books
Submission
Search form
Search IIETA Content
-Any-
Article
Basic page
Blog entry
Journal
Event
Feature
Home
Evaluation of Mobile Mixed Reality Simulator (M2RSi) Using Hybrid Technology Acceptance Model (HTAM) in Disaster Mitigation Simulation
https://iieta.org/sites/default/files/pdf/2024-04/ijsse_14.02_23.pdf
MART 23: A Tool to Audit Information Technology Risk Management Maturity
https://iieta.org/sites/default/files/pdf/2024-04/ijsse_14.02_09.pdf
An Artificial Neural Network Approach for Construction Project Risk Management
https://iieta.org/sites/default/files/pdf/2024-04/ijsse_14.02_22.pdf
A Comprehensive Analysis of Security Challenges and Countermeasures in Wireless Sensor Networks Enhanced by Machine Learning and Deep Learning Technologies
https://iieta.org/sites/default/files/pdf/2024-04/ijsse_14.02_06_0.pdf
The Role of Safety and Security in Achieving Urban Space Vitality
https://iieta.org/sites/default/files/pdf/2024-04/ijsse_14.02_27.pdf
Sulfuric Acid Highly Sensitive Detection at Different Concentrations Using Photonic Crystal Fiber Sensor
https://iieta.org/sites/default/files/pdf/2024-04/ijsse_14.02_13.pdf
Exploring Metric Dimensions for Dimensionality Reduction and Navigation in Rough Graphs
https://iieta.org/sites/default/files/pdf/2024-04/mmep_11.04_21.pdf
An Experimental Study on Detecting and Mitigating Vulnerabilities in Web Applications
https://iieta.org/sites/default/files/pdf/2024-04/ijsse_14.02_19.pdf
Cross-Platform Malware Classification: Fusion of CNN and GRU Models
https://iieta.org/sites/default/files/pdf/2024-04/ijsse_14.02_15.pdf
An Efficient Cluster Based Multi-Label Classification Model for Advanced Persistent Threat Attacks Detecting
https://iieta.org/sites/default/files/pdf/2024-04/ijsse_14.02_21.pdf
Pages
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »