logo
ArticlesAbout
Register | Login
Research Article
JUCS - Journal of Universal Computer Science 25(9): 1174-1198
https://doi.org/10.3217/jucs-025-09-1174 (28 Sep 2019)
Other versions:
XML
PDF
 
 
Twitter
Facebook
Mendeley
Reddit
Notify a colleague
  • Article InfoArticle Info
  • CitationCitation
  • MetricsMetrics
  • CommentComment
  • RelatedRelated
  • CitedCited
JUCS - Journal of Universal Computer Science 25(9): 1174-1198
doi: 10.3217/jucs-025-09-1174
Received: 22 Dec 2018 | Approved: 09 Jul 2019 | Published: 28 Sep 2019
This article is part of:
JUCS - Journal of Universal Computer Science 25(9): Recent Advances in Detection, Investigation and Mitigation of Cyber Crimes
Authors
Ziad A. Al-Sharif - Corresponding author
Jordan University of Science and Technology, Irbid, Jordan
Articles by this author in:  CrossRef  |  Google Scholar
Mohammed I. Al-Saleh
Jordan University of Science and Technology, Irbid, Jordan
Articles by this author in:  CrossRef  |  Google Scholar
Yaser Jararweh
Jordan University of Science and Technology, Irbid, Jordan
Articles by this author in:  CrossRef  |  Google Scholar
Ahmed S. Shatnawi
Jordan University of Science and Technology, Irbid, Jordan
Articles by this author in:  CrossRef  |  Google Scholar
Conflict of interest
The authors have declared that no competing interests exist.
This article is freely available under the J.UCS Open Content License.
Powered by

This website uses cookies in order to improve your web experience. Read our Cookies Policy

OK