Skip to main content
About
About Iieta
Policies
Services
Subscription
Fast Track
Language Support
Conference Services
Publication Services
Journals
CONFERENCES
Books
Submission
Search form
Search IIETA Content
-Any-
Article
Basic page
Blog entry
Journal
Event
Feature
Home
A Hybrid Oversampling Approach for Fraud Detection: Integrating SMOTE-ENN and ADASYN
https://www.iieta.org/sites/default/files/pdf/2025-07/ijsse_15.06_14_0.pdf
A New Intrusion Detection System for RPL Based on Machine Learning
https://www.iieta.org/sites/default/files/pdf/2025-07/ijsse_15.06_01.pdf
Using Fuzzy DEMATEL Technique in Analyzing and Evaluating the Risks of Construction Projects
https://www.iieta.org/sites/default/files/pdf/2025-07/ijsse_15.06_19.pdf
Hybrid AI for Arabic Sensitive Data Detection: Enhancing Privacy Compliance in Egypt
https://www.iieta.org/sites/default/files/pdf/2025-07/ijsse_15.06_02.pdf
A Hyperledger-Based Secure Framework for Academic Certificate Authentication Using Blockchain
https://www.iieta.org/sites/default/files/pdf/2025-07/ijsse_15.06_10.pdf
Cybersecurity Compliance and Other Factors Influencing Employee Protective Behavior: A Case Study of Bank X in Indonesia
https://www.iieta.org/sites/default/files/pdf/2025-07/ijsse_15.06_13.pdf
Multi-Level Node Behavior Pattern Analysis for Malicious Node Detection with False Alarm Reduction in Wireless Sensor Networks
https://www.iieta.org/sites/default/files/pdf/2025-07/ijsse_15.06_17.pdf
Comparative Analysis of Two-Step Machine Learning Models for Botnet SPAM Detection
https://www.iieta.org/sites/default/files/pdf/2025-07/ijsse_15.06_08_0.pdf
New Approach to Image Encryption Based on Large Invertible Pseudo-Random Matrices
https://www.iieta.org/sites/default/files/pdf/2025-07/ijsse_15.06_03.pdf
Bakaum: How Local Communities Handle Crisis in Policy Perspective
https://www.iieta.org/sites/default/files/pdf/2025-07/ijsse_15.06_15.pdf
Pages
« first
‹ previous
…
195
196
197
198
199
200
201
202
203
…
next ›
last »