Saad Abid2, Zhiyong Li1, and Renfa Li1 1College of Information Science and Engineering, Hun an University, China 2Department of Computer Science and Informatics, Al- Mansour University College, Iraq
and Mohammad BinIdris3 1Center of Excellence in Information Assurance, King Saud University, Saudi Arabia 2Department of Information Systems, King Saud Univer sity, Saudi Arabia 3Faculty of Computer Science and Information Systems, University Technology Malaysia, Malaysia