https://ausjournal.com/index.php/j/issue/feedAustralian Journal of Wireless Technologies, Mobility and Security2025-07-21T09:10:48+00:00Dr Pritam Gajkumar Shaheditor@ausjournal.comOpen Journal Systems<p>The <em>Australian Journal of Wireless Technologies, Mobility and Security</em> is a peer-reviewed academic journal dedicated to advancing research and innovation in the rapidly evolving fields of wireless communication, mobile systems, and cybersecurity. The journal covers a wide array of topics including 5G and beyond, IoT networks, wireless security protocols, and emerging trends in mobile computing. It serves as a platform for scholars, researchers, and industry professionals to publish cutting-edge findings that contribute to both academic and practical advancements. The editorial team is led by <strong>Dr. Pritam Shah</strong>, Editor-in-Chief, and a diverse panel of associate editors and reviewers from leading international institutions, each bringing expertise across telecommunications, cyber security, and mobile network technologies.</p> <p><strong>Open Access Statement</strong></p> <p>This journal operates under an open access policy. All published articles are freely accessible to readers worldwide and may be used, shared, or adapted for non-commercial purposes, provided appropriate credit is given to the original authors.</p>https://ausjournal.com/index.php/j/article/view/48AI-Enabled Security Protocols for Safeguarding Wireless Communications and IOT Devices2025-02-11T07:56:15+00:00Pritam Gajkumar Shahwsnpgs@gmail.com<p>The rapid growth of Internet of Things (IoT) devices and wireless communication technologies has introduced significant security challenges. Traditional security protocols are often inadequate to address the dynamic and complex nature of modern cyber threats. This paper explores the integration of Artificial Intelligence (AI) into security protocols to enhance the protection of wireless communications and IoT devices. We discuss the limitations of conventional methods, the role of AI in detecting and mitigating threats, and the development of AI-enabled security frameworks. Case studies and experimental results demonstrate the effectiveness of AI-driven approaches in safeguarding IoT ecosystems. The paper concludes with recommendations for future research and implementation strategies.</p>2025-02-11T00:00:00+00:00Copyright (c) 2025 Australian Journal of Wireless Technologies, Mobility and Securityhttps://ausjournal.com/index.php/j/article/view/49Innovative AI-Based Protocol to Mitigate DDoS Attacks on City Infrastructure2025-02-11T08:24:55+00:00Pritam Gajkumar Shahwsnpgs@gmail.com<p>Distributed Denial of Service (DDoS) attacks pose a significant threat to city infrastructure, disrupting essential services such as critical infrastrcture, healthcare, and utilities. Traditional mitigation techniques often fail to address the scale and sophistication of modern DDoS attacks. This paper proposes an innovative AI-driven protocol designed to detect, analyze, and mitigate DDoS attacks in real-time. Leveraging machine learning (ML) and deep learning (DL) algorithms, the protocol adapts to evolving attack patterns and ensures the resilience of smart city infrastructure. Experimental results demonstrate the protocol's effectiveness in reducing attack impact and maintaining service availability. The paper concludes with recommendations for implementation and future research directions.</p>2025-02-11T00:00:00+00:00Copyright (c) 2025 Australian Journal of Wireless Technologies, Mobility and Securityhttps://ausjournal.com/index.php/j/article/view/50AI for Penetration Testing: Enhancing Cybersecurity Through Intelligent Automation2025-02-12T06:05:09+00:00Pritam Gajkumar Shahwsnpgs@gmail.com<p>Penetration testing is a critical component of cybersecurity, aimed at identifying vulnerabilities in systems before malicious actors can exploit them. Traditional penetration testing methods are often time-consuming, labor-intensive, and limited by human expertise. This paper explores the application of Artificial Intelligence (AI) in penetration testing, highlighting its potential to automate vulnerability detection, optimize attack simulations, and improve overall efficiency. Through case studies and examples, we demonstrate how AI-driven tools can enhance the accuracy and scalability of penetration testing. The paper concludes with a discussion of challenges and future directions for AI in this domain.</p>2025-02-12T00:00:00+00:00Copyright (c) 2025 Australian Journal of Wireless Technologies, Mobility and Securityhttps://ausjournal.com/index.php/j/article/view/51A case study of implementing COBIT 5 framework for E commerce web site2025-04-08T01:46:03+00:00Sujan Poudelpoudelsujan2023@gmail.comSukhchain Singhsukhchainsoni36@gmail.comManpreet Kaurmanpreetkaur1112001@gmail.com<p>This paper presents a comprehensive case study on the application of the COBIT 5 framework to an e-commerce website. The implementation utilizes a Linux-based web hosting environment with unmetered bandwidth , SSD storage and SSL certificate so that users information will reach server via HTTPS protocol. . For demonstration purposes, the AbanteCart script has been employed. The study systematically addresses key challenges related to the confidentiality, integrity, and availability of online transactions, along with the protection of user data privacy. It is important to note that this work does not introduce any novel innovations; rather, it is based entirely on currently available technologies and best practices.</p>2025-04-08T00:00:00+00:00Copyright (c) 2025 Australian Journal of Wireless Technologies, Mobility and Securityhttps://ausjournal.com/index.php/j/article/view/61How AI is Automating Data Cleaning and Feature Engineering in Data Science Pipelines2025-07-21T09:10:48+00:00manish chaudharymanishkc2131@gmail.com<p>Data preparation—including cleaning and feature engineering—has long been one of the most time-consuming yet critical stages in the data science workflow. Traditionally done manually, it demands a large share of time and is prone to human error. As datasets grow in volume and complexity, the need for automated, intelligent solutions becomes increasingly urgent. This article explores how Artificial Intelligence (AI) is revolutionizing this space. From anomaly detection and semantic matching to AutoML-driven feature generation and AI-guided selection techniques, AI is accelerating and enhancing the quality of data preparation. Through practical tools, case studies, and forward-looking trends, we show how AI not only saves time but improves accuracy, scalability, and reproducibility, while freeing human analysts to focus on higher-value tasks.</p>2025-10-21T00:00:00+00:00Copyright (c) 2025 Australian Journal of Wireless Technologies, Mobility and Security