Authors
Mosleh M. Abualhaj
Department of Networks and Information Security, Al-Ahliyya Amman University, Amman, Jordan
Mayy M. Al-Tahrawi
Department of Computer Science, Al-Ahliyya Amman University, Amman, Jordan
Abdelrahman H. Hussein
Department of Computer Science, Al-Ahliyya Amman University, Amman, Jordan
Sumaya N. Al-Khatib
Department of Networks and Information Security, Al-Ahliyya Amman University, Amman, Jordan
