Authors
Orieb AbuAlghanam
Department of Networks and Information Security, Faculty of Information Technology, Al-Ahliyya Amman University, Amman, Jordan
Omar Adwan
Department of Computer Science, Faculty of Information Technology, Al-Ahliyya Amman University, Amman, Jordan
Department of Computer Science, King Abdulla II School for Information Technology, University of Jordan, Amman, Jordan
Mohammad A. Al Shariah
Department of Data Science and Artificial Intelligence, Al-Ahliyya Amman University, Amman, Jordan
Mohammad Qatawneh
Department of Computer Science, King Abdulla II School for Information Technology, University of Jordan, Amman, Jordan
