“…Security techniques, models, frameworks, procedures, policies, and processes have been proposed in several fields. These include database systems (Al-Dhaqm et al, 2023b), networks, robotics (Mohammed et al, 2021), prevent cyberbullying (Yafooz et al, 2023), wireless networks (Onwuegbuzie et al, 2022;Al-dhaqm et al, 2013) cloud security (Al-Mugerrn et al, 2023;Zubair et al, 2022), the internet of vehicles, IoT (Saleh et al, 2023), UAV field and mobile field (Yahya et al, 2023), medical field (Qureshi et al, 2022;Ngadi et al, 2012;Onwuegbuzie et al, 2020;Abd Razak et al, 2020;Altowayti et al, 2022;Rasool et al, 2022;Mohammed et al, 2022;Onwuegbuzie et al, 2021;Bakhtiari and Al-dhaqm, 2012).…”