Xi Luo1,2 and Ying An1 1Institute of Information Security and Big Data, Central South University, China 2Department of Information Technology, Hunan Police Academy, China
Suhair AlHajHassan1, Mohammed Odeh1, Stewart Green1, and Asem Mansour2 1Software Engineering Research Group, University of the West of England (UWE), UK 2King Hussein Cancer Centre (KHCC), Jordan