Skip to main content
About
About Iieta
Policies
Services
Subscription
Fast Track
Language Support
Conference Services
Publication Services
Journals
CONFERENCES
Books
Submission
News / Announcements
Search form
Search IIETA Content
-Any-
Article
Basic page
Blog entry
Journal
Event
Feature
Home
Deep Learning Models for Fake Review Detection: A Focus on Bidirectional Encoder Representations from Transformers and Bidirectional Long Short-Term Memory
Performance Optimization in Blockchain-Based Approach to Secure Communication Channel in the Fifth Generation (5G) Authentication Mechanism
Security Enhancements in Cloud-Based Personal Voice Assistants: A Survey and Evaluation of Cryptographic Techniques
An Interpretable Hybrid Framework for Principal Component Analysis–Extreme Gradient Boosting and A Single-Class Support Vector Machine for Zero-Day Penetration Detection
Security Engineering of Open Web Application Security Project-Based Automated System for Web Vulnerability Detection and Mitigation
Artificial Intelligence-Driven Neonatal Disease Diagnosis Using Efficient Particle Swarm Fine-Tuned Dilated Recurrent Neural Net: A High-Precision Deep Learning Approach
Detecting Digital Image Forgeries Using Error Level Analysis Features and Neural Network Classification Enhanced by Synthetic Minority Over-Sampling Technique
Software-Defined Wide Area Network Enhanced IoT Network: Performance Optimization and Security Analysis under Distributed Denial of Service Attack Scenarios
Application of Defensible Space Theory in a Nigerian Secondary School: Faith Academy, Ota
Attribute-Based Lightweight Encryption Framework for Securing a Voter Database
Pages
1
2
3
4
5
6
7
8
9
…
next ›
last »