Skip to main content
About
About Iieta
Policies
Services
Subscription
Fast Track
Language Support
Conference Services
Publication Services
Journals
CONFERENCES
Books
Submission
Search form
Search IIETA Content
-Any-
Article
Basic page
Blog entry
Journal
Event
Feature
Home
Safety Culture and Managerial Behavior in Indonesian Tourism: A PLS-SEM Analysis of Mediating Effects
https://www.iieta.org/sites/default/files/pdf/2025-09/ijsse_15.07_11_0.pdf
Preparedness for Fire Emergencies in The Security Industry: Demographic Determinants of Fire Emergency Preparedness in Security Personnel
https://www.iieta.org/sites/default/files/pdf/2025-09/ijsse_15.07_02.pdf
Symmetric Image Encryption Using Chaotic Logistic Map and Deep Convolutional Feature Learning
https://www.iieta.org/sites/default/files/pdf/2025-09/ijsse_15.07_04_1.pdf
Towards a Security Model for Dynamic Access Control in Graph Databases
https://www.iieta.org/sites/default/files/pdf/2025-09/ijsse_15.07_03_1.pdf
Risk Assessment of Information System Audit Tools Based on SPBE Risk Management Guidelines
https://www.iieta.org/sites/default/files/pdf/2025-09/ijsse_15.07_14_0.pdf
Enhancing Food Security in Central Asia and the Caucasus: A SWOT Analysis of Agro-Industrial Potential
https://www.iieta.org/sites/default/files/pdf/2025-09/ijsse_15.07_13_0.pdf
A Deep Learning-Based Approach for Gender Prediction in Digital Forensics
https://www.iieta.org/sites/default/files/pdf/2025-09/ijsse_15.07_15.pdf
Key Node Authentication Model Using Asymmetric Cryptography for Smart Cities
https://www.iieta.org/sites/default/files/pdf/2025-09/ijsse_15.07_09.pdf
Database Manipulation Security Risk Detection (DMSRD) Based on GSP and Markov Chain
https://www.iieta.org/sites/default/files/pdf/2025-09/ijsse_15.07_01_0.pdf
Accurate Brain Tumor Detection and Classification System Based on MRI Images Using Deep Learning Technology
https://www.iieta.org/sites/default/files/pdf/2025-09/jesa_58.07_04.pdf
Pages
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »