Skip to main content
About
About Iieta
Policies
Services
Subscription
Fast Track
Language Support
Conference Services
Publication Services
Journals
CONFERENCES
Books
Submission
Search form
Search IIETA Content
-Any-
Article
Basic page
Blog entry
Journal
Event
Feature
Home
Journals
IJSSE
CURRENT ISSUE
CURRENT ISSUE
Vol. 16, No. 2, February 2026
Proximity-Based Trust Classification for Private and Public IoE Devices Using a Hybrid CNN–LSTM Architecture
Jayashree C. Pasalkar, Dattatraya S. Bormane
https://doi.org/10.18280/ijsse.160201
Page
249-262
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Application of Geoelectrical Methods for Mapping Unstable Areas in the Guarumales Camp-Ecuador
Edgar Molina-Torres, Roberto Avalos-Sánchez, Jessica Robles, Joselyne Solórzano, Paúl Carrión-Mero
https://doi.org/10.18280/ijsse.160202
Page
263-274
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
A Deep Learning Framework for Covert Timing Channel Detection Using Gramian Angular Field and Markov Transition Field Fusion and Convolutional Neural Networks
Shorouq Al-Eidi
https://doi.org/10.18280/ijsse.160203
Page
275-282
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Secure Hybrid Authentication Using Facial Biometrics, Liveness Verification, and Time-Based One-Time Passwords
Kuldeep Vayadande, Praveenkumar Patel, Govinda Sambare, Prajakta Pawar,Premanand Ghadekar, Namrata Salgar, Vivek Kheradkar, Shlok Shinde, Aryan Shinde, Siddhant Shinde, Prathamesh Shinde, Samyak Lokhande
https://doi.org/10.18280/ijsse.160204
Page
283-296
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Fast Entropy Quantile Forest for Federated Distributed Denial of Service Detection in Software-Defined Networking Environments
Noble T N Pillai, Meena Mathivanan
https://doi.org/10.18280/ijsse.160205
Page
297-305
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Wearable Health IoT Devices: A Vision on Compliance, Security and Feature Directions
Sheetal V A, Jyothi S Nayak
https://doi.org/10.18280/ijsse.160206
Page
307-326
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Network-Centric Security Awareness in Software Development: Integrating Vulnerability Patterns, Developer Practices, and Organizational Controls
Aladdin Abbas Abdulhassan, Abdullah Yousif Lafta, Alaa Shawqi Jaber, Mohammed Ibrahim Kareem
https://doi.org/10.18280/ijsse.160207
Page
327-333
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
FPGA Architectures for ANU-PHOTON-Based Authenticated Encryption: A Comparative Evaluation of Encrypt-then-MAC and MAC-then-Encrypt Designs
Miaad Husam Mahdi, Shaima Miteb Sadoon, Omar Hatem Zaidan, Riyadh Salam Mohammed
https://doi.org/10.18280/ijsse.160208
Page
335-341
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
A New Four-Dimensional Hyperchaotic System with Four Unstable Equilibria: Dynamical Analysis, Bifurcation Structure, and Initial-Condition Sensitivity
Rana A. Sattar, Omar A. Jasim, Dhuha M. Noori, Sadiq A. Mehdi
https://doi.org/10.18280/ijsse.160209
Page
343-350
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
A Novel STRIDE Model for Improved Security and DDoS Mitigation for Software-Defined Networking
Sugandhi Malhotra, Riya Sapra, Chaitanya Singla, Chander Prabha, Snehal Bhosale, Durgesh Nandan
https://doi.org/10.18280/ijsse.160210
Page
351-363
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Causal Drivers of Sinking and Capsizing Accidents Involving Passenger Ships and Roll-on/Roll-off Ferries in Indonesia
Sunardi, Aleik Nurwahyudi, Eko Sulkhany, Heri Supomo, Putu Sindhu Asmara
https://doi.org/10.18280/ijsse.160211
Page
365-371
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Video Encryption Using 7D Hyperchaotic System with Two-Level Discrete Wavelet Transform and Rubik's Cube Scrambling
Ashwaq A. Kadhim, Sadiq A. Mehdi, Duaa F. Al Edhary
https://doi.org/10.18280/ijsse.160212
Page
373-381
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
An OAuth 2.0 and Lightweight Cryptography Framework for Secure IoT Communication and Authentication
Delsina Faiza, Geovanne Farell, Vera Irma Delianti, Rido Wahyudi, Sartika Anori
https://doi.org/10.18280/ijsse.160213
Page
383-392
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Comparative Performance of Class Imbalance Treatments in Random Forest for Social Engineering Classification
Ratih Hafsarah Maharrani, Laura Sari, Oman Somantri
https://doi.org/10.18280/ijsse.160214
Page
393-402
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
National Security and New Technologies: The Impact of Digitalization, Innovation, and Artificial Intelligence on the Effectiveness of Security and Defense Forces
Orest Kachurovskyi, Andrii Buzarov, Yevhenii Taran, Oleksandr Mynko, Andriy Sogorin
https://doi.org/10.18280/ijsse.160215
Page
403-412
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Enhancing Water Security and Aquifer Recharge through Rainwater Harvesting and Soil Percolation: A Sustainable Strategy for Security in Rote Ndao Regency, East Nusa Tenggara
Paul Gabriel Tamelan, Doppy Roy Nendissa, I Ketut Mahendra, Milson M. Selan, Elsy E. Hangge, Ralno Robson Klau, Jakobis J. Messakh, Dinah Charlota Lerik
https://doi.org/10.18280/ijsse.160216
Page
413-430
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Improving Early Fire and Smoke Detection with YOLOv12N via Histogram-Based Contrast Enhancement
Christine Dewi, Hanna P. Chernovita, Melati V. V. Santoso, Evangs Mailoa, Stephen A. Philemon, Stephen A. Sutresno, Abbott P. S. Chen
https://doi.org/10.18280/ijsse.160217
Page
431-445
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
Enhancing Occupational Safety in Rock Mining: A Comprehensive Hazard Identification, Risk Assessment, and Risk Control and Fault Tree Analysis
Indah Sari BR Hutauruk, Purwanto, Muhammad Ramli
https://doi.org/10.18280/ijsse.160218
Page
447-453
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS
ECDHSS: A Two-Party Key Generation Scheme Combining Elliptic Curve Diffie–Hellman and Shamir’s Secret Sharing
Noor Muneam Abbas, Asmaa Rashid Salman, Hala Bahjat Abdulwahab, Nidaa Flaih Hassan, Mustafa Tareq Abd
https://doi.org/10.18280/ijsse.160219
Page
455-460
PDF Full-text
HTML Full-text
Citation
OPEN ACCESS
A Leakage-Aware Post-Quantum KEM–DEM Framework for Medical Image Encryption with DICOM-Compatible Integration
Smitha Madenahalli Mallesh, Harohalli Shivalingappa Niranjana Murthy, Sundaresha Madalu Puttappa, Sushma Ullamadi KrishnappaGowda
https://doi.org/10.18280/ijsse.160220
Page
461-477
PDF Full-text
HTML Full-text
Citation
DOWNLOAD PDF
OPEN ACCESS