Australian Journal of Wireless Technologies, Mobility and Security 2021-12-11T13:41:12+00:00 Pritam Gajkumar Shah, PhD Australia Open Journal Systems <p><strong>Since 2011 Serving Researchers</strong></p> <p>Ausjournal serves to disseminate to the public results of current and on-going works in various areas of computer sciences and engineering more precisely cyber security. It had taken initiative in August 2012 to setup editorial board and published its first inaugural edition in February 2012, and regularly publishing yearly issues. It has completed 11 years of service for upcoming researchers. Ausjournal is owned by SISTMR Australia.</p> PREDICTING SURFACE WATER LEVEL ESTIMATION BY USING DATA MINING TECHNIQUES 2021-11-11T08:00:28+00:00 KusumaKavya M <p><em>&nbsp;&nbsp;</em>To auspicious get exact pixel water surface extent data through remote detecting is to a great degree noteworthy to the environmental reclamation in inland waterway bowls and for the exact administration of water assets. In regard to the insufficient extraction of water surface extent data show in pixels in the greater part of the ebb and flow water data models, a straightforward model Enhanced Water Index (EWI) in view of Modified Standardized Difference Water Index (MNDWI) has been presented. EWI, which is arranged toward the sub-pixel level examination of water surface extent mapping of inland stream bowl, has been advanced in light of the examination of run of the mill ghostly marks for example, forsake, soil, and vegetation alongside MNDWI in agreement with the Landsat TM band highlights. The examination is done by utilizing strategies for pixel-based EWI esteem with various water extents which are dissected through the presentation of the straight crossover reenactment between the water body and the comparing foundation. In conclusion, the impact of EWI demonstrate has been tried in the medium and lower ranges. The amendment coefficient for sub-pixel level water surface extent anticipated by the EWI show and the test information. Results demonstrated that the model could viably remove the data about pixel water surface extent in inland stream bowls. This investigation demonstrates that EWI show has awesome potential in its application for water extent mapping applications.</p> 2021-11-11T00:00:00+00:00 ##submission.copyrightStatement## Potential threats and mitigation tools for Network Attacks 2021-12-09T07:29:46+00:00 Scott Sawyer <p><strong>In today’s data hungry and interconnected world, the use of technology has become an integral part of our daily lives. As our reliance on technology grows, so does the need to keep the data that is captured, collated, processed and disseminated through our use of such data secure. Network security relates to the field of securing such data as it is moved between systems from the prying eyes of malicious actors or others, who through various network attack methods and exploits, seek to potentially misuse this data for their own benefit and/or further their own causes. This paper seeks to analyse some recent network attacks that have been launched against companies in the past five years, how these attacks work and the societal impact that these attacks when successful, be it financially through extortion or theft, through the loss of data or reputationally where customers trust and confidence in a brand or product is negatively impacted. &nbsp;Additionally, we will perform a deeper analysis of such an attack against a company as a case study and determine what happened, and what further could be done to mitigate or prevent the attack from occurring in the first place.&nbsp; However, before we can perform such an analysis, we need to discuss what a network attack is and some of the types of attacks that can occur.</strong></p> 2021-12-09T00:00:00+00:00 ##submission.copyrightStatement## Cyber Security Audit of Top Four Technologies- A Short Note 2021-12-11T13:41:12+00:00 Scott Sawyer <p><strong>Cybersecurity and networking play a major role in todays interconnected world. The ultimate aim of this report is to discuss and provide insight into 4 areas of the cybersecurity and networking realm, from threats such as SQL Injection Attacks, through to technologies such as Load Balancing, Blockchain for the Internet of Things and Cloud Computing. As such, this report will be broken up into 4 sections to address each item individually.</strong></p> 2021-12-11T13:41:12+00:00 ##submission.copyrightStatement##