Xi Luo1,2 and Ying An1 1Institute of Information Security and Big Data, Central South University, China 2Department of Information Technology, Hunan Police Academy, China
Mustafa Al-Fayoumi1, Jaber Alwidian2, and Mohammad Abusaif2 1Computer Science Department, Princess Sumaya University for Technology, Jordan 2Big Data Department, Intrasoft Middle East, Jordan