Skip to main content
About
About Iieta
Policies
Services
Subscription
Fast Track
Language Support
Conference Services
Publication Services
Journals
CONFERENCES
Books
Submission
Search form
Search IIETA Content
-Any-
Article
Basic page
Blog entry
Journal
Event
Feature
Home
Smarter Secure Surveillance: Leveraging AI, IoT, and Cryptographic Techniques for Enhanced Public Safety
https://www.iieta.org/sites/default/files/pdf/2025-07/ijsse_15.06_20_0.pdf
Dynamics of Flood and Landslide Risk Governance Policy in Solok Regency, Indonesia
https://www.iieta.org/sites/default/files/pdf/2025-07/ijsse_15.06_11.pdf
Securing Smart Vehicles: A Bilateral TARA Approach for ISO 21434 and ASPICE for CS Compliance
https://www.iieta.org/sites/default/files/pdf/2025-07/ijsse_15.06_04.pdf
Examining the Impact of Health Expenditure on Life Expectancy in Kazakhstan: A Causality Analysis
https://www.iieta.org/sites/default/files/pdf/2025-07/ijsse_15.06_07.pdf
Enhancing Safety Standards in Purse Seine Fisheries: An Assessment of Maritim Labor Convention (MLC) Compliance in Indonesian Waters
https://www.iieta.org/sites/default/files/pdf/2025-07/ijsse_15.06_06.pdf
IoT-Based Smart Waste Management System: A Solution for Urban Sustainability
https://www.iieta.org/sites/default/files/pdf/2025-07/ijsse_15.06_09.pdf
Multi-Class Anomaly Detection in Network Intrusion Detection Using Variational Autoencoder
https://www.iieta.org/sites/default/files/pdf/2025-07/ijsse_15.06_16.pdf
A Hybrid Oversampling Approach for Fraud Detection: Integrating SMOTE-ENN and ADASYN
https://www.iieta.org/sites/default/files/pdf/2025-07/ijsse_15.06_14_0.pdf
A New Intrusion Detection System for RPL Based on Machine Learning
https://www.iieta.org/sites/default/files/pdf/2025-07/ijsse_15.06_01.pdf
Using Fuzzy DEMATEL Technique in Analyzing and Evaluating the Risks of Construction Projects
https://www.iieta.org/sites/default/files/pdf/2025-07/ijsse_15.06_19.pdf
Pages
« first
‹ previous
…
31
32
33
34
35
36
37
38
39
…
next ›
last »