Australian Journal of Wireless Technologies, Mobility and Security https://ausjournal.com/index.php/j <p>The <em>Australian Journal of Wireless Technologies, Mobility and Security</em> is a peer-reviewed academic journal dedicated to advancing research and innovation in the rapidly evolving fields of wireless communication, mobile systems, and cybersecurity. The journal covers a wide array of topics including 5G and beyond, IoT networks, wireless security protocols, and emerging trends in mobile computing. It serves as a platform for scholars, researchers, and industry professionals to publish cutting-edge findings that contribute to both academic and practical advancements. The editorial team is led by <strong>Dr. Pritam Shah</strong>, Editor-in-Chief, and a diverse panel of associate editors and reviewers from leading international institutions, each bringing expertise across telecommunications, cyber security, and mobile network technologies.</p> <p><strong>Open Access Statement</strong></p> <p>This journal operates under an open access policy. All published articles are freely accessible to readers worldwide and may be used, shared, or adapted for non-commercial purposes, provided appropriate credit is given to the original authors.</p> SISTMR AUSTRALIA en-US Australian Journal of Wireless Technologies, Mobility and Security 2200-1875 AI-Enabled Security Protocols for Safeguarding Wireless Communications and IOT Devices https://ausjournal.com/index.php/j/article/view/48 <p>The rapid growth of Internet of Things (IoT) devices and wireless communication technologies has introduced significant security challenges. Traditional security protocols are often inadequate to address the dynamic and complex nature of modern cyber threats. This paper explores the integration of Artificial Intelligence (AI) into security protocols to enhance the protection of wireless communications and IoT devices. We discuss the limitations of conventional methods, the role of AI in detecting and mitigating threats, and the development of AI-enabled security frameworks. Case studies and experimental results demonstrate the effectiveness of AI-driven approaches in safeguarding IoT ecosystems. The paper concludes with recommendations for future research and implementation strategies.</p> Pritam Gajkumar Shah Copyright (c) 2025 Australian Journal of Wireless Technologies, Mobility and Security 2025-02-11 2025-02-11 1 1 Innovative AI-Based Protocol to Mitigate DDoS Attacks on City Infrastructure https://ausjournal.com/index.php/j/article/view/49 <p>Distributed Denial of Service (DDoS) attacks pose a significant threat to city infrastructure, disrupting essential services such as critical infrastrcture, healthcare, and utilities. Traditional mitigation techniques often fail to address the scale and sophistication of modern DDoS attacks. This paper proposes an innovative AI-driven protocol designed to detect, analyze, and mitigate DDoS attacks in real-time. Leveraging machine learning (ML) and deep learning (DL) algorithms, the protocol adapts to evolving attack patterns and ensures the resilience of smart city infrastructure. Experimental results demonstrate the protocol's effectiveness in reducing attack impact and maintaining service availability. The paper concludes with recommendations for implementation and future research directions.</p> Pritam Gajkumar Shah Copyright (c) 2025 Australian Journal of Wireless Technologies, Mobility and Security 2025-02-11 2025-02-11 1 1 AI for Penetration Testing: Enhancing Cybersecurity Through Intelligent Automation https://ausjournal.com/index.php/j/article/view/50 <p>Penetration testing is a critical component of cybersecurity, aimed at identifying vulnerabilities in systems before malicious actors can exploit them. Traditional penetration testing methods are often time-consuming, labor-intensive, and limited by human expertise. This paper explores the application of Artificial Intelligence (AI) in penetration testing, highlighting its potential to automate vulnerability detection, optimize attack simulations, and improve overall efficiency. Through case studies and examples, we demonstrate how AI-driven tools can enhance the accuracy and scalability of penetration testing. The paper concludes with a discussion of challenges and future directions for AI in this domain.</p> Pritam Gajkumar Shah Copyright (c) 2025 Australian Journal of Wireless Technologies, Mobility and Security 2025-02-12 2025-02-12 1 1 A case study of implementing COBIT 5 framework for E commerce web site https://ausjournal.com/index.php/j/article/view/51 <p>This paper presents a comprehensive case study on the application of the COBIT 5 framework to an e-commerce website. The implementation utilizes a Linux-based web hosting environment with unmetered bandwidth , SSD storage and SSL certificate so that users information will reach server via HTTPS protocol. . For demonstration purposes, the AbanteCart script has been employed. The study systematically addresses key challenges related to the confidentiality, integrity, and availability of online transactions, along with the protection of user data privacy. It is important to note that this work does not introduce any novel innovations; rather, it is based entirely on currently available technologies and best practices.</p> Sujan Poudel Sukhchain Singh Manpreet Kaur Copyright (c) 2025 Australian Journal of Wireless Technologies, Mobility and Security 2025-04-08 2025-04-08 1 1 How AI is Automating Data Cleaning and Feature Engineering in Data Science Pipelines https://ausjournal.com/index.php/j/article/view/61 <p>Data preparation—including cleaning and feature engineering—has long been one of the most time-consuming yet critical stages in the data science workflow. Traditionally done manually, it demands a large share of time and is prone to human error. As datasets grow in volume and complexity, the need for automated, intelligent solutions becomes increasingly urgent. This article explores how Artificial Intelligence (AI) is revolutionizing this space. From anomaly detection and semantic matching to AutoML-driven feature generation and AI-guided selection techniques, AI is accelerating and enhancing the quality of data preparation. Through practical tools, case studies, and forward-looking trends, we show how AI not only saves time but improves accuracy, scalability, and reproducibility, while freeing human analysts to focus on higher-value tasks.</p> manish chaudhary Copyright (c) 2025 Australian Journal of Wireless Technologies, Mobility and Security 2025-10-21 2025-10-21 1 1