“…The findings indicate that the envisaged system exhibited satisfactory performance, even in the presence of a filtering attack. Furthermore, upon conducting a comparative analysis of the outcomes with other extant methodologies, namely [28,[30][31][32], at intensities of 0.05, 0.025, and 0.10 (as presented in Table 5), it was noted that the findings of [31,32] bear similarity to the suggested approach at an intensity of 0.050. At the intensity of 0.025 and 0.010, the performance of our approach is much better than other similar schemes.…”