Research Article
Other versions:
- Article InfoArticle Info
- CiteCite
- MetricsMetrics
- CommentComment
- RelatedRelated
- CitedCited
JUCS - Journal of Universal Computer Science 32(2): 209-240
doi:
10.3897/jucs.140733
Received:
01 Nov 2024 | Approved:
08 Aug 2025 | Published:
28 Feb 2026
This article is part of:
Authors
Department of Computer Science, Taibah University, Madinah, Saudi Arabia
Maher Alharby
- Corresponding author
Department of Cybersecurity, Taibah University, Madinah, Saudi Arabia
Conflict of interest
The authors have declared that no competing interests exist.
This is an open access article distributed under the terms of the Creative Commons Attribution License (CC BY-ND 4.0). This license allows reusers to copy and distribute the material in any medium or format in unadapted form only, and only so long as attribution is given to the creator. The license allows for commercial use.
