Authors
Rawan Baalous
Cybersecurity Department, University of Jeddah, Jeddah, Saudi Arabia
Alanoud Althobaiti
Cybersecurity Department, University of Jeddah, Jeddah, Saudi Arabia
Dareen Alyoubi
Cybersecurity Department, University of Jeddah, Jeddah, Saudi Arabia
Rama Alzahrani
Cybersecurity Department, University of Jeddah, Jeddah, Saudi Arabia
Mona Aljohani
Cybersecurity Department, University of Jeddah, Jeddah, Saudi Arabia
