Skip to main content
About
About Iieta
Policies
Services
Subscription
Fast Track
Language Support
Conference Services
Publication Services
Journals
CONFERENCES
Books
Submission
Search form
Search IIETA Content
-Any-
Article
Basic page
Blog entry
Journal
Event
Feature
Home
Evaluating Performances of Two Unsupervised Methods for Classification Crime Text
https://www.iieta.org/sites/default/files/pdf/2024-03/ijsse_14.01_16.pdf
Genetic Crossover at the RNA Level for Secure Medical Image Encryption
https://www.iieta.org/sites/default/files/pdf/2024-03/ijsse_14.01_20_0.pdf
Network Master Node Assessed Trust Factor with Arbitrary Neighbor Assessment for Secure Route Detection in 6G Enabled Wireless Sensor Networks
https://www.iieta.org/sites/default/files/pdf/2024-03/ijsse_14.01_11.pdf
Simultaneous Botnet Attack Detection Using Long Short Term Memory-Based Autoencoder and XGBoost Classifier
https://www.iieta.org/sites/default/files/pdf/2024-03/ijsse_14.01_15_0.pdf
Spurious Trip Rate Optimization Using Particle Swarm Optimization Algorithm
https://www.iieta.org/sites/default/files/pdf/2024-03/ijsse_14.01_06_0.pdf
Urban Safety is a Tool for Containing Slums to Reach a Sustainable Urban Structure
https://www.iieta.org/sites/default/files/pdf/2024-03/ijsse_14.01_19_0.pdf
Biometric Identification for a Secured Environment Using AI-Based Facial Recognition
https://www.iieta.org/sites/default/files/pdf/2024-03/ijsse_14.01_18.pdf
Genetic Algorithm Using Feistel and Genetic Operator Acting at the Bit Level for Images Encryption
https://www.iieta.org/sites/default/files/pdf/2024-03/ijsse_14.01_02_0.pdf
Safe Work and Personal Protective Equipment in an Economic Context
https://www.iieta.org/sites/default/files/pdf/2024-03/ijsse_14.01_08.pdf
Android Malware Classification Using Gain Ratio and Ensembled Machine Learning
https://www.iieta.org/sites/default/files/pdf/2024-03/ijsse_14.01_26.pdf
Pages
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
…
next ›
last »