Skip to main content
About
About Iieta
Policies
Services
Subscription
Fast Track
Language Support
Conference Services
Publication Services
Journals
CONFERENCES
Books
Submission
Search form
Search IIETA Content
-Any-
Article
Basic page
Blog entry
Journal
Event
Feature
Home
A Hybrid Encryption Method for Data Security Based on ARB3 Algorithm
https://www.iieta.org/sites/default/files/pdf/2025-09/ijsse_15.07_18.pdf
Assessing the Role of Human Factors in Traffic Accident Causation
https://www.iieta.org/sites/default/files/pdf/2025-09/ijsse_15.07_05.pdf
Urban Building Safety Through Public Participation and Digital Governance in Indonesia
https://www.iieta.org/sites/default/files/pdf/2025-09/ijsse_15.07_17.pdf
Evolution of Automated Penetration Testing: Toolchains, Integration Strategies, and Operational Challenges
https://www.iieta.org/sites/default/files/pdf/2025-09/ijsse_15.07_20_0.pdf
Application of RPZ-Based DNS Filtering in Educational Network Security
https://www.iieta.org/sites/default/files/pdf/2025-09/ijsse_15.07_16.pdf
Ring-LWE Authentication in Centralized Cognitive Radio Networks
https://www.iieta.org/sites/default/files/pdf/2025-09/ijsse_15.07_08_0.pdf
Multimodal Deep Learning Framework Using Transformer and LSTM Models for Suicide Risk Detection from Social Media and Voice Data
https://www.iieta.org/sites/default/files/pdf/2025-09/ijsse_15.07_12.pdf
Multi-Encoding Distributed Steganography (MEDS): A High-Security and Fault-Tolerant Framework for Secure Data Hiding in Multi-Cloud Environment
https://www.iieta.org/sites/default/files/pdf/2025-09/ijsse_15.07_19.pdf
Bus Drivers’ Perspectives on Factors Contributing to Road Traffic RTAs on Prithvi and Mugling-Narayanghat Highway Segment in Nepal
https://www.iieta.org/sites/default/files/pdf/2025-09/ijsse_15.07_07.pdf
Steganalysis Secret Message Using Rich Model Method for Stego Color Image
https://www.iieta.org/sites/default/files/pdf/2025-09/ijsse_15.07_10_0.pdf
Pages
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »