Skip to main content
About
About Iieta
Policies
Services
Subscription
Fast Track
Language Support
Conference Services
Publication Services
Journals
CONFERENCES
Books
Submission
Search form
Search IIETA Content
-Any-
Article
Basic page
Blog entry
Journal
Event
Feature
Home
Journals
IJSSE
Archive
Archive
2025: Vol. 15
No. 7, July
No. 6, June
No. 5, May
No. 4, April
No. 3, March
No. 2, February
No. 1, January
2024: Vol. 14
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2023: Vol. 13
No. 6, December
No. 5, October
No. 4, September
No. 3, June
No. 2, April
No. 1, February
2022: Vol. 12
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2021: Vol. 11
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2020: Vol. 10
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2019: Vol. 9
No. 4, November
No. 3, September
No. 2, June
No. 1, January
2018: Vol. 8
No. 4, September
No. 3, July
No. 2, February
No. 1, January
2017: Vol. 7
No. 4, November
No. 3, September
No. 2, June
No. 1, March
2016: Vol. 6
No. 4, December
No. 3, August
No. 2, June
No. 1, March
2015: Vol. 5
No. 4, December
No. 3, September
No. 2, June
No. 1, March
2014: Vol. 4
No. 4, December
No. 3, September
No. 2, June
No. 1, March
2013: Vol. 3
No. 4, December
No. 3, September
No. 2, June
No. 1, March
2012: Vol. 2
No. 4, December
No. 3, November
No. 2, June
No. 1, March
2011: Vol. 1
No. 4, December
No. 3, September
No. 2, June
No. 1, March
Development of a Malicious Network Traffic Intrusion Detection System Using Deep Learning
Olisaemeka F. Isife, Kennedy Okokpujie, Imhade P. Okokpujie, Roselyn E. Subair, Akingunsoye Adenugba Vincent, Morayo E. Awomoyi
https://doi.org/10.18280/ijsse.130401
Page
587-595
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Assessing and Mitigating Seismic Risk for a Hospital Structure in Zaruma, Ecuador: A Structural and Regulatory Evaluation
Pedro P. Rojas, Cindy Moya, Martha Caballero, Wilmer Márquez, Josué Briones-Bitar, Fernando Morante-Carballo
https://doi.org/10.18280/ijsse.130402
Page
597-610
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
SE-CDR: Enhancing Security and Efficiency of Key Management in Internet of Energy Consumer Demand-Response Communications
Mourad Benmalek, Kamel Harkat, Kamel-Dine Haouam, Zakaria Gheid
https://doi.org/10.18280/ijsse.130403
Page
611-623
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Integrated Sensor-Based Smart Mannequin for Injury Detection in Armored Vehicle
Giva Andriana Mutiara, Periyadi , Lisda Meisaroh, Muhammad Rizqy Alfarisi, Wildan Muhammad Yasin, Nadya Nanda Adisty, Muhammad Aulia Rifqi Zain
https://doi.org/10.18280/ijsse.130404
Page
625-633
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Safety Leadership and Performance in Indonesia’s Construction Sector: The Role of Project Owners’ Marurity
Desiderius V. Indrayana, Krishna S. Pribadi, Puti F. Marzuki, Hardianto Iridiastadi
https://doi.org/10.18280/ijsse.130405
Page
635-646
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Dual-Activation Emergency Situation Notification System: A Feature Driven Development Approach
Oluwatofunmi O. Adetunji, Blossom C. Chikezie, Toniloba P. Ogundare, Michael Osayame-Ebohon
https://doi.org/10.18280/ijsse.130406
Page
647-656
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Ultra-Lightweight Encryption for STL Files in IoT-based 3D Printing
Nilufar Yasmin, Richa Gupta
https://doi.org/10.18280/ijsse.130407
Page
657-664
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
A Multi-Round Zero Knowledge Proof Algorithm for Secure IoT and Blockchain Environments
Deebakkarthi Chinnasame Rani, Sai Ganesh Janakiraman, Kommula Serath Chandra, Elambharathi Padmavathi Thangavel, Ganga Abhirup Kothamasu, Krithika Latha Bhaskaran, Guruprakash Jayabalasamy
https://doi.org/10.18280/ijsse.130408
Page
665-671
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
An Evaluation of Community Adoption of the InaRISK BNPB Platform for Disaster Management: An Application of the Technology Acceptance Model (TAM)
Erni Suharini, Supriyadi, Mohammad Syifauddin, Ervando Tommy Al-Hanif, Edi Kurniawan, Satya Budi Nugraha
https://doi.org/10.18280/ijsse.130409
Page
673-684
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
The Effect of Plan Corner Shapes on the Spread Speed of Fire in High-Rise Buildings
Raya Haqqi Ismail, Omar H. Kharufa
https://doi.org/10.18280/ijsse.130410
Page
685-691
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Enhancing Safety and Security: Face Tracking and Detection in Dehazed Video Frames Using KLT and Viola-Jones Algorithms
Vijaya Kumar Gurrala, Srinivas Talasila, Pulagari Madhuri, Sandela Nithish Varma, Lekkala Puneeth, Padmaraju Koppireddi
https://doi.org/10.18280/ijsse.130411
Page
693-700
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Enhancing Cyber Forensics with AI and Machine Learning: A Study on Automated Threat Analysis and Classification
Bandr Fakiha
https://doi.org/10.18280/ijsse.130412
Page
701-707
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Detecting Cyberbullying on Social Media Using Support Vector Machine: A Case Study on Twitter
Al-Khowarizmi, Indah Purnama Sari, Halim Maulana
https://doi.org/10.18280/ijsse.130413
Page
709-714
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Deep Learning-Based Detection of IoT Botnet Attacks: An Exploration of Residual Networks
Manikandan Govindaraji, Ramachandran Periyasamy, Vidyaathulasiraman
https://doi.org/10.18280/ijsse.130414
Page
715-722
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Capitalizing on Blockchain Technology for Efficient Crowdfunding: An Exploration of Ethereum's Smart Contracts
Cynthia Jayapal, Arputha Rathina Xavier, Poonguzhali Arunachalam
https://doi.org/10.18280/ijsse.130415
Page
723-729
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Implementing a Seismic Sensor-Driven Disaster Management System for Efficient Tsunami Early Warnings in the Arabian Peninsula
Minu Theresa Mathew, Zeyad Ismail
https://doi.org/10.18280/ijsse.130416
Page
731-737
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Contributory Factors and Implications of Excavation Accidents in the Rumaila Oil Field, Basra
Ahmed A. Marzooq, Hatim A. Rashid
https://doi.org/10.18280/ijsse.130417
Page
739-743
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Improving the SIR Model: Isolation and Containment Strategies for COVID-19 - A Case Study of Ain-Touta City
Assia Aouachria, Moussa Anoune, Soraya Tebbal, Zeroual Aouachria
https://doi.org/10.18280/ijsse.130418
Page
745-752
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Impact of Stepped Structures on Tsunami Wave Propagation and Overtopping Engineering
Fayçal Chergui, Mohamed Bouzit
https://doi.org/10.18280/ijsse.130419
Page
753-762
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Leveraging Security Modeling and Information Systems Audits to Mitigate Network Vulnerabilities
Laberiano Andrade Arenas, Cesar Yactayo-Arias, Sheyla Rivera Quispe, Jenner Lavalle Sandoval
https://doi.org/10.18280/ijsse.130420
Page
763-771
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS