Saad Abid2, Zhiyong Li1, and Renfa Li1 1College of Information Science and Engineering, Hun an University, China 2Department of Computer Science and Informatics, Al- Mansour University College, Iraq
and Mohammad BinIdris3 1Center of Excellence in Information Assurance, King Saud University, Saudi Arabia 2Department of Information Systems, King Saud Univer sity, Saudi Arabia 3Faculty of Computer Science and Information Systems, University Technology Malaysia, Malaysia
Mohammad Alia1 and Khaled Suwais2 1Faculty of Sciences and Information Technology, Al-Zaytoonah University of Jordan, Jordan 2Faculty of Computer Studies, Arab Open University, Saudi Arabia