Abstract: In the era of rapid technological advancements, data and information have become significant assets that require continuous protection from unauthorized access and malicious attacks. Network ...