{"id":"https://openalex.org/W4414527521","doi":"https://doi.org/10.3390/a18100601","title":"Neural Network Architectures for Secure and Sustainable Data Processing in E-Government Systems","display_name":"Neural Network Architectures for Secure and Sustainable Data Processing in E-Government Systems","publication_year":2025,"publication_date":"2025-09-25","ids":{"openalex":"https://openalex.org/W4414527521","doi":"https://doi.org/10.3390/a18100601"},"language":"en","primary_location":{"id":"doi:10.3390/a18100601","is_oa":true,"landing_page_url":"https://doi.org/10.3390/a18100601","pdf_url":"https://www.mdpi.com/1999-4893/18/10/601/pdf?version=1758795467","source":{"id":"https://openalex.org/S190629608","display_name":"Algorithms","issn_l":"1999-4893","issn":["1999-4893"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Algorithms","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/1999-4893/18/10/601/pdf?version=1758795467","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5032974396","display_name":"Shadi AlZu\u2019bi","orcid":"https://orcid.org/0000-0003-4173-2323"},"institutions":[{"id":"https://openalex.org/I145019703","display_name":"Al-Zaytoonah University of Jordan","ror":"https://ror.org/04a5b0p13","country_code":"JO","type":"education","lineage":["https://openalex.org/I145019703"]}],"countries":["JO"],"is_corresponding":true,"raw_author_name":"Shadi AlZu\u2019bi","raw_affiliation_strings":["Faculty of Science and IT, Al-Zaytoonah University of Jordan, Amman 11733, Jordan"],"affiliations":[{"raw_affiliation_string":"Faculty of Science and IT, Al-Zaytoonah University of Jordan, Amman 11733, Jordan","institution_ids":["https://openalex.org/I145019703"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017303499","display_name":"Fatima Quiam","orcid":"https://orcid.org/0000-0002-3162-8111"},"institutions":[{"id":"https://openalex.org/I145019703","display_name":"Al-Zaytoonah University of Jordan","ror":"https://ror.org/04a5b0p13","country_code":"JO","type":"education","lineage":["https://openalex.org/I145019703"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Fatima Quiam","raw_affiliation_strings":["Faculty of Science and IT, Al-Zaytoonah University of Jordan, Amman 11733, Jordan"],"affiliations":[{"raw_affiliation_string":"Faculty of Science and IT, Al-Zaytoonah University of Jordan, Amman 11733, Jordan","institution_ids":["https://openalex.org/I145019703"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042798851","display_name":"Ala\u2019 M. Al-Zoubi","orcid":"https://orcid.org/0000-0003-0414-3570"},"institutions":[{"id":"https://openalex.org/I145019703","display_name":"Al-Zaytoonah University of Jordan","ror":"https://ror.org/04a5b0p13","country_code":"JO","type":"education","lineage":["https://openalex.org/I145019703"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Ala\u2019 M. Al-Zoubi","raw_affiliation_strings":["Faculty of Science and IT, Al-Zaytoonah University of Jordan, Amman 11733, Jordan"],"affiliations":[{"raw_affiliation_string":"Faculty of Science and IT, Al-Zaytoonah University of Jordan, Amman 11733, Jordan","institution_ids":["https://openalex.org/I145019703"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5021455872","display_name":"Muder Almiani","orcid":"https://orcid.org/0000-0003-0021-2364"},"institutions":[{"id":"https://openalex.org/I179311214","display_name":"Gulf University for Science & Technology","ror":"https://ror.org/04d9rzd67","country_code":"KW","type":"education","lineage":["https://openalex.org/I179311214"]}],"countries":["KW"],"is_corresponding":false,"raw_author_name":"Muder Almiani","raw_affiliation_strings":["Department of MIS, GUST Engineering and Applied Innovation Research Center (GEAR), Gulf University of Science & Technology, Hawally 32093, Kuwait"],"affiliations":[{"raw_affiliation_string":"Department of MIS, GUST Engineering and Applied Innovation Research Center (GEAR), Gulf University of Science & Technology, Hawally 32093, Kuwait","institution_ids":["https://openalex.org/I179311214"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5032974396"],"corresponding_institution_ids":["https://openalex.org/I145019703"],"apc_list":{"value":1400,"currency":"CHF","value_usd":1515},"apc_paid":{"value":1400,"currency":"CHF","value_usd":1515},"fwci":2.3234,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.89949711,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":"18","issue":"10","first_page":"601","last_page":"601"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.977400004863739,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.977400004863739,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9578999876976013,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.942799985408783,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.7408000230789185},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.5942000150680542},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.5734999775886536},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.4350999891757965},{"id":"https://openalex.org/keywords/data-processing","display_name":"Data processing","score":0.39899998903274536},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.3783999979496002},{"id":"https://openalex.org/keywords/path","display_name":"Path (computing)","score":0.3409999907016754},{"id":"https://openalex.org/keywords/network-architecture","display_name":"Network architecture","score":0.33899998664855957}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8327000141143799},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.7408000230789185},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.5942000150680542},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.5734999775886536},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.48840001225471497},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.4350999891757965},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.42179998755455017},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.41780000925064087},{"id":"https://openalex.org/C138827492","wikidata":"https://www.wikidata.org/wiki/Q6661985","display_name":"Data processing","level":2,"score":0.39899998903274536},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.3783999979496002},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.37290000915527344},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3621000051498413},{"id":"https://openalex.org/C2777735758","wikidata":"https://www.wikidata.org/wiki/Q817765","display_name":"Path (computing)","level":2,"score":0.3409999907016754},{"id":"https://openalex.org/C193415008","wikidata":"https://www.wikidata.org/wiki/Q639681","display_name":"Network architecture","level":2,"score":0.33899998664855957},{"id":"https://openalex.org/C12725497","wikidata":"https://www.wikidata.org/wiki/Q810247","display_name":"Baseline (sea)","level":2,"score":0.33889999985694885},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3237000107765198},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3003999888896942},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.29679998755455017},{"id":"https://openalex.org/C204241405","wikidata":"https://www.wikidata.org/wiki/Q461499","display_name":"Transformation (genetics)","level":3,"score":0.2930000126361847},{"id":"https://openalex.org/C193519340","wikidata":"https://www.wikidata.org/wiki/Q891179","display_name":"Data loss","level":2,"score":0.29019999504089355},{"id":"https://openalex.org/C118524514","wikidata":"https://www.wikidata.org/wiki/Q173212","display_name":"Computer architecture","level":1,"score":0.28999999165534973},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.2849999964237213},{"id":"https://openalex.org/C98025372","wikidata":"https://www.wikidata.org/wiki/Q477538","display_name":"Systems architecture","level":3,"score":0.2847000062465668},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.2838999927043915},{"id":"https://openalex.org/C13926793","wikidata":"https://www.wikidata.org/wiki/Q3507155","display_name":"Group method of data handling","level":2,"score":0.28290000557899475},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.2827000021934509},{"id":"https://openalex.org/C2986045029","wikidata":"https://www.wikidata.org/wiki/Q294240","display_name":"Public security","level":2,"score":0.27630001306533813},{"id":"https://openalex.org/C126082660","wikidata":"https://www.wikidata.org/wiki/Q4252370","display_name":"Digital transformation","level":2,"score":0.2623000144958496},{"id":"https://openalex.org/C557945733","wikidata":"https://www.wikidata.org/wiki/Q389772","display_name":"Data transmission","level":2,"score":0.2590000033378601}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/a18100601","is_oa":true,"landing_page_url":"https://doi.org/10.3390/a18100601","pdf_url":"https://www.mdpi.com/1999-4893/18/10/601/pdf?version=1758795467","source":{"id":"https://openalex.org/S190629608","display_name":"Algorithms","issn_l":"1999-4893","issn":["1999-4893"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Algorithms","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:b4918c322cb245159ac27a48307c7db9","is_oa":true,"landing_page_url":"https://doaj.org/article/b4918c322cb245159ac27a48307c7db9","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Algorithms, Vol 18, Iss 10, p 601 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/a18100601","is_oa":true,"landing_page_url":"https://doi.org/10.3390/a18100601","pdf_url":"https://www.mdpi.com/1999-4893/18/10/601/pdf?version=1758795467","source":{"id":"https://openalex.org/S190629608","display_name":"Algorithms","issn_l":"1999-4893","issn":["1999-4893"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Algorithms","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F1058312785","display_name":"Gulf University for Science and Technology","ror":null}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4414527521.pdf"},"referenced_works_count":28,"referenced_works":["https://openalex.org/W2995392485","https://openalex.org/W3023273951","https://openalex.org/W3084211848","https://openalex.org/W3123160711","https://openalex.org/W3195286883","https://openalex.org/W3202495522","https://openalex.org/W4220751743","https://openalex.org/W4224294104","https://openalex.org/W4224880558","https://openalex.org/W4284879605","https://openalex.org/W4303649164","https://openalex.org/W4310050354","https://openalex.org/W4380841429","https://openalex.org/W4387106890","https://openalex.org/W4387618324","https://openalex.org/W4389195433","https://openalex.org/W4391906962","https://openalex.org/W4393242275","https://openalex.org/W4402350084","https://openalex.org/W4403571731","https://openalex.org/W4404480333","https://openalex.org/W4404874075","https://openalex.org/W4405722107","https://openalex.org/W4405805097","https://openalex.org/W4408407802","https://openalex.org/W4410852389","https://openalex.org/W4411430183","https://openalex.org/W4413480343"],"related_works":[],"abstract_inverted_index":{"In":[0],"the":[1,57,85,109],"digital":[2,125],"transformation":[3],"of":[4],"public":[5,126],"services,":[6],"reliable":[7],"and":[8,31,39,45,67,99,123],"secure":[9,124],"data":[10,33],"handling":[11],"has":[12],"become":[13],"central":[14],"to":[15,42,65,91,95,103],"effective":[16],"E-government":[17,51,115],"operations.":[18],"This":[19],"study":[20],"introduces":[21],"a":[22,118],"symmetry-driven":[23],"neural":[24,83],"network":[25],"architecture":[26,86],"tailored":[27],"for":[28,112,121],"secure,":[29],"scalable,":[30],"energy-efficient":[32],"processing.":[34],"The":[35],"model":[36,59],"integrates":[37],"weight-sharing":[38],"symmetrical":[40],"configurations":[41],"enhance":[43],"efficiency":[44,100],"resilience.":[46],"Experimental":[47],"validation":[48],"on":[49],"three":[50],"datasets":[52],"(95,000\u2013230,000":[53],"records)":[54],"demonstrates":[55],"that":[56],"proposed":[58],"improves":[60],"processing":[61],"speed":[62],"by":[63,71],"up":[64,102],"40%":[66],"enhances":[68],"adversarial":[69],"robustness":[70],"maintaining":[72],"accuracy":[73,89],"reductions":[74],"below":[75],"2.5%":[76],"under":[77],"attack":[78,97],"scenarios.":[79],"Compared":[80],"with":[81],"baseline":[82],"networks,":[84],"achieves":[87],"higher":[88],"(up":[90,94],"95.1%),":[92],"security":[93],"98%":[96],"prevention),":[98],"(processing":[101],"1600":[104],"records/sec).":[105],"These":[106],"results":[107],"confirm":[108],"model\u2019s":[110],"applicability":[111],"large-scale,":[113],"real-time":[114],"systems,":[116],"providing":[117],"practical":[119],"path":[120],"sustainable":[122],"administration.":[127]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
