Skip to main content
About
About Iieta
Policies
Services
Subscription
Fast Track
Language Support
Conference Services
Publication Services
Journals
CONFERENCES
Books
Submission
Search form
Search IIETA Content
-Any-
Article
Basic page
Blog entry
Journal
Event
Feature
Home
Journals
IJSSE
Archive
Archive
2025: Vol. 15
No. 7, July
No. 6, June
No. 5, May
No. 4, April
No. 3, March
No. 2, February
No. 1, January
2024: Vol. 14
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2023: Vol. 13
No. 6, December
No. 5, October
No. 4, September
No. 3, June
No. 2, April
No. 1, February
2022: Vol. 12
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2021: Vol. 11
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2020: Vol. 10
No. 6, December
No. 5, October
No. 4, August
No. 3, June
No. 2, April
No. 1, February
2019: Vol. 9
No. 4, November
No. 3, September
No. 2, June
No. 1, January
2018: Vol. 8
No. 4, September
No. 3, July
No. 2, February
No. 1, January
2017: Vol. 7
No. 4, November
No. 3, September
No. 2, June
No. 1, March
2016: Vol. 6
No. 4, December
No. 3, August
No. 2, June
No. 1, March
2015: Vol. 5
No. 4, December
No. 3, September
No. 2, June
No. 1, March
2014: Vol. 4
No. 4, December
No. 3, September
No. 2, June
No. 1, March
2013: Vol. 3
No. 4, December
No. 3, September
No. 2, June
No. 1, March
2012: Vol. 2
No. 4, December
No. 3, November
No. 2, June
No. 1, March
2011: Vol. 1
No. 4, December
No. 3, September
No. 2, June
No. 1, March
Metamodeling-Based Drone Forensics Investigation: A Systematic Literature Review
Senan A. M. Alhasan, Siti Hajar Othman, Arafat Al-Dhaqm
https://doi.org/10.18280/ijsse.150101
Page
1-12
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
A Blockchain-Based Malware Detection Model for IoT Devices
Doaa Abdelrahman, Mohamed Rasslan, Nashwa Abdelbaki
https://doi.org/10.18280/ijsse.150102
Page
13-20
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Modification of Emergency Management Systems Based on Experiences of Germany and Ukraine
Maksym V. Kustov, Volodymyr A. Andronov, Christian Buscham
https://doi.org/10.18280/ijsse.150103
Page
21-29
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Influence of Safety Leadership Styles on Safety Behaviour: The Mediating Role of Safety Climate, Knowledge, and Motivation in Indonesia's Oil and Gas Construction Project
Novrianty Rizky, Agus Mansur, Hari Purnomo, Adithya Sudiarno, Ivan Darma Wangsa
https://doi.org/10.18280/ijsse.150104
Page
31-42
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Biometric Data Encryption Using a New Five Dimensional Hyper-Chaotic System
Maryam T. M. Alghamazi, Sadiq A. Mehdi, Emad I. Abdul Kareem
https://doi.org/10.18280/ijsse.150105
Page
43-51
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Assessing the Accident Severity Level of Passenger Vessels in Indonesia Using Bayesian Network Model
Muhammad Faishal, Dwitya Harits Waskito, Raja Oloan Saut Gurning, Agoes Santoso, Tris Handoyo, Ayudhia Pangestu Gusti, Sridhani Lestari Pamungkas
https://doi.org/10.18280/ijsse.150106
Page
53-66
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Hybrid BiLSTM-SVM Intrusion Detection with Decision-Based Flow Ranking
Asraa A. Abd Al-Ameer, Alaa Akram Huby
https://doi.org/10.18280/ijsse.150107
Page
67-72
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Deep Learning – Augmented Block Analysis for Detecting Advanced Video Forgeries
Sumaiya Shaikh, Sathish Kumar Kannaiah
https://doi.org/10.18280/ijsse.150108
Page
73-78
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Road Damage Identification Using a Combination of UAV Quadcopter Technology and Subgrade Investigation
Muh. Akbar, Dina Limbong Pamuttu, Eko Budianto, Rachmat Rachmat, Zulfikar Mardiyadi
https://doi.org/10.18280/ijsse.150109
Page
79-85
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Color Image Encryption by Using Modified E0 Keystream Generator with Peter De Jong Chaotic Map
Rusul Basheer Bahedh, Ali Shakir Mahmood
https://doi.org/10.18280/ijsse.150110
Page
87-94
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Innovative MADM Framework for Strengthening Port Resilience Against Extreme Weather
Eko Prihartanto, M. Arif Rohman, I Putu Artama Wiguna
https://doi.org/10.18280/ijsse.150111
Page
95-104
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Real-Time Deep Learning-Driven Surveillance with Spatiotemporal Feature Extraction for Detection of Anomalous Human Behavior Across Dynamic Environments
Madhuri Pangavhane, Rahul Patil, Rajesh Bharati, Deepak Gupta, Prashant Ahire, Pramod Patil, Wasudeo Rahane, Deepak Dharrao
https://doi.org/10.18280/ijsse.150112
Page
105-111
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Identifying and Validating Critical Factors in Designing a Comprehensive Data Protection Impact Assessment (DPIA) Framework for Indonesia
Sidik Prabowo, Maman Abdurohman, Hilal Hudan Nuha, Sarwono Sutikno
https://doi.org/10.18280/ijsse.150113
Page
113-126
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Expansive Residual Soil Stability Behavior During Wetting and Drying Process
Putera Agung Maha Agung, Sony Pramusandi, Andikanoza Pradiptiya, Aldo Wirastana Adinegara, Suripto, Muhammad Idris, Ramlan Sultan, Muhammad Fathur Rouf Hasan, Adnan Zainorabidin
https://doi.org/10.18280/ijsse.150114
Page
127-139
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Optimizing Malware Detection and Classification in Real-Time Using Hybrid Deep Learning Approaches
Yaseen Ahmed Mohammed Alsumaidaee, Mustafa Mahmood Yahya, Abdulelah Hameed Yaseen
https://doi.org/10.18280/ijsse.150115
Page
141-150
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Design of Worker Rotation for a Precast Concrete Pole Factory Based on Mental Workload
Anizar Anizar, Aulia Ishak, Rabeka Gracia Gurusinga, Hermansyah
https://doi.org/10.18280/ijsse.150116
Page
151-156
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Enhancing Safety and Accessibility for Wheelchair Users in Traditional Tuna Fishing Boats
Sunardi, Eko Sulkhany Yulianto, Ali Muntaha, R. Sapto Pamungkas, Ardi Nugroho Yulianto, Oktiyas Muzakky Luthfi
https://doi.org/10.18280/ijsse.150117
Page
157-170
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
A Comparative Study of Incremental and Batch Machine Learning Methodologies for Network Intrusion Detection
Rawabi Alanzi, Murad A. Rassam
https://doi.org/10.18280/ijsse.150118
Page
171-179
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Security Threat Analysis in 5G Cognitive Radio Networks: A Deep Learning Ensemble Approach
M. Minilal, M. Meena
https://doi.org/10.18280/ijsse.150119
Page
181-187
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Hybrid GAN-LSTM for Enhancing DDoS Detection on Imbalance Dataset
Gregorius Edo, Tohari Ahmad, Muhammad Aidiel Rachman Putra
https://doi.org/10.18280/ijsse.150120
Page
189-196
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS