Skip to main content
About
About Iieta
Policies
Services
Subscription
Fast Track
Language Support
Conference Services
Publication Services
Journals
CONFERENCES
Books
Submission
Search form
Search IIETA Content
-Any-
Article
Basic page
Blog entry
Journal
Event
Feature
Home
Deep Learning Models for Fake Review Detection: A Focus on Bidirectional Encoder Representations from Transformers and Bidirectional Long Short-Term Memory
https://iieta.org/sites/default/files/pdf/2026-03/ijsse_15.12_09.pdf
Performance Optimization in Blockchain-Based Approach to Secure Communication Channel in the Fifth Generation (5G) Authentication Mechanism
https://iieta.org/sites/default/files/pdf/2026-03/ijsse_15.12_04.pdf
Security Enhancements in Cloud-Based Personal Voice Assistants: A Survey and Evaluation of Cryptographic Techniques
https://iieta.org/sites/default/files/pdf/2026-03/ijsse_15.12_03.pdf
An Interpretable Hybrid Framework for Principal Component Analysis–Extreme Gradient Boosting and a Single-Class Support Vector Machine for Zero-Day Penetration Detection
https://iieta.org/sites/default/files/pdf/2026-03/ijsse_15.12_12.pdf
Security Engineering of Open Web Application Security Project-Based Automated System for Web Vulnerability Detection and Mitigation
https://iieta.org/sites/default/files/pdf/2026-03/ijsse_15.12_06.pdf
Artificial Intelligence-Driven Neonatal Disease Diagnosis Using Efficient Particle Swarm Fine-Tuned Dilated Recurrent Neural Net: A High-Precision Deep Learning Approach
https://iieta.org/sites/default/files/pdf/2026-03/ijsse_15.12_01.pdf
Detecting Digital Image Forgeries Using Error Level Analysis Features and Neural Network Classification Enhanced by Synthetic Minority Over-Sampling Technique
https://iieta.org/sites/default/files/pdf/2026-03/ijsse_15.12_05.pdf
Software-Defined Wide Area Network Enhanced IoT Network: Performance Optimization and Security Analysis under Distributed Denial of Service Attack Scenarios
https://iieta.org/sites/default/files/pdf/2026-03/ijsse_15.12_14.pdf
Application of Defensible Space Theory in a Nigerian Secondary School: Faith Academy, Ota
https://iieta.org/sites/default/files/pdf/2026-03/ijsse_15.12_19.pdf
Attribute-Based Lightweight Encryption Framework for Securing a Voter Database
https://iieta.org/sites/default/files/pdf/2026-03/ijsse_15.12_17.pdf
Pages
« first
‹ previous
…
63
64
65
66
67
68
69
70
71
…
next ›
last »