Skip to main content
About
About Iieta
Policies
Services
Subscription
Fast Track
Language Support
Conference Services
Publication Services
Journals
CONFERENCES
Books
Submission
Search form
Search IIETA Content
-Any-
Article
Basic page
Blog entry
Journal
Event
Feature
Home
An Efficient Swift Routing Model with Node Trust Identity Factor (SRM-NTIF) to Perform Secure Data Transmission Among IoT Gadgets
https://iieta.org/sites/default/files/pdf/2022-03/36.01_04.pdf
Enhanced Black Widow Algorithm for Numerical Functions Optimization
https://iieta.org/sites/default/files/pdf/2022-03/36.01_01.pdf
ADCSA-WSD: Adapted Discrete Crow Search Algorithm for Word Sense Disambiguation
https://iieta.org/sites/default/files/pdf/2022-03/36.01_15.pdf
The Measurement of Evacuation Effectiveness Regarding Dynamic Evacuation Routing System (DERS) in High-Rise Building Using Virtual Reality Simulation
https://iieta.org/sites/default/files/pdf/2022-03/12.01_14.pdf
Maturity Models for Business Continuity–A Systematic Literature Review
https://iieta.org/sites/default/files/pdf/2022-03/12.01_15.pdf
Management of Innovative Development of Enterprises Considering Their Financial and Resource Opportunities in the Context of Security
https://iieta.org/sites/default/files/pdf/2022-03/12.01_02.pdf
Application of Systems Theoretic Process Analysis and Failure Modes and Effects Analysis to Process Reliability and Occupational Safety and Health in Construction Projects
https://iieta.org/sites/default/files/pdf/2022-03/12.01_01.pdf
The Impact of Environmental Energy Taxes on Nigeria’s Insecurity Situation
https://iieta.org/sites/default/files/pdf/2022-03/12.01_08.pdf
Analysis of Spatial Concentrations of Large-Truck Crashes Using Data Mining Methods
https://iieta.org/sites/default/files/pdf/2022-03/12.01_07.pdf
Effectiveness of Forensic Firewall in Protection of Devices from Cyberattacks
https://iieta.org/sites/default/files/pdf/2022-03/12.01_10.pdf
Pages
« first
‹ previous
…
624
625
626
627
628
629
630
631
632
…
next ›
last »