Authors
Mosleh M. Abualhaj
Department of Networks and Information Security, Al-Ahliyya Amman University, Amman, Jordan
Sumaya N. Al-Khatib
Department of Computer Science, Al-Ahliyya Amman University, Amman, Jordan
Qusai Y. Shambour
Department of Software Engineering, Al-Ahliyya Amman University, Amman, Jordan
Ahmad Adel Abu-Shareha
Department of Computer Science, Al-Ahliyya Amman University, Amman, Jordan
