Security in Online Learning Assessment Towards an Effective Trustworthiness Approach to Support E-Learning Teams
暂无分享,去创建一个
Fatos Xhafa | Santi Caballé | Jorge Miguel | Josep Prieto | F. Xhafa | S. Caballé | Jorge Miguel | Josep Prieto
[1] Ryan West,et al. The psychology of security , 2008, CACM.
[2] Christian J. Eibl. Discussion of information security in e-learning , 2010 .
[3] Melissa Dark,et al. Information Assurance and Security Ethics in Complex Systems: Interdisciplinary Perspectives , 2010 .
[4] Bamshad Mobasher,et al. Towards Trustworthy Recommender Systems : An Analysis of Attack Models and Algorithm Robustness , 2007 .
[5] Yair Levy,et al. A Theoretical Approach for Biometrics Authentication of e-Exams , 2007 .
[6] Bruce Schneier,et al. The psychology of security , 2007, CACM.
[7] Hossein Bidgoli. Key concepts, infrastructure, standards, and protocols , 2006 .
[8] Fatos Xhafa,et al. Distributed-based massive processing of activity logs for efficient user modeling in a Virtual Campus , 2013, Cluster Computing.
[9] Susan K. Ferencz,et al. Privacy Issues in a Virtual Learning Environment. , 1998 .
[10] Yingchun Liu,et al. A Survey on Trust and Trustworthy E-learning System , 2010, 2010 International Conference on Web Information Systems and Mining.
[11] Santi Caballé,et al. Information Security in Support for Mobile Collaborative Learning , 2013, 2013 Seventh International Conference on Complex, Intelligent, and Software Intensive Systems.
[12] Zheng Wu,et al. A Taxonomy of Network and Computer Attacks Based on Responses , 2011, 2011 International Conference of Information Technology, Computer Engineering and Management Sciences.
[13] Fatos Xhafa,et al. A parallel grid-based implementation for real-time processing of event log data of collaborative applications , 2010, Int. J. Web Grid Serv..
[14] Santi Caballé,et al. Providing Information Security to MOOC: Towards Effective Student Authentication , 2013, 2013 5th International Conference on Intelligent Networking and Collaborative Systems.
[15] Santi Caballé,et al. Providing Security to Computer-Supported Collaborative Learning: An Overview , 2012, 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems.
[16] Indrajit Ray,et al. A Vector Model of Trust for Developing Trustworthy Systems , 2004, ESORICS.
[17] Edgar R. Weippl. Security in e-learning , 2005, ELERN.
[18] Elisa Bertino,et al. An Approach to Evaluate Data Trustworthiness Based on Data Provenance , 2008, Secure Data Management.
[19] Tom White,et al. Hadoop: The Definitive Guide , 2009 .