Fog-Assisted Secure Data Exchange for Examination and Testing in E-learning System
暂无分享,去创建一个
Ata Ullah | Samina Kausar | Zhu Wenhao | Xu Huahu | Muhammad Yasir Shabir | Samina Kausar | Xu Huahu | A. Ullah | Zhu Wenhao
[1] Samina Kausar,et al. Integration of Data Mining Clustering Approach in the Personalized E-Learning System , 2018, IEEE Access.
[2] Md. Hedayetul Islam Shovon,et al. An Approach of Improving Students Academic Performance by using k means clustering algorithm and Decision tree , 2012, ArXiv.
[3] Preeti Singh,et al. Symmetric Key Cryptography: Current Trends , 2014 .
[4] C. Seldev Christopher,et al. Secure cloud data storage approach in e-learning systems , 2019, Clust. Comput..
[5] Leonard Barolli,et al. Implementation of an IoT-Based E-Learning Testbed: Performance Evaluation Using Mean-Shift Clustering Approach Considering Four Types of BrainWaves , 2018, 2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA).
[6] Riccardo Pecori,et al. A Virtual Learning Architecture Enhanced by Fog Computing and Big Data Streams , 2018, Future Internet.
[7] Hosam Farouk El-Sofany,et al. The Impact of Cloud Computing Technologies in E-learning , 2013, Int. J. Emerg. Technol. Learn..
[8] Robert John Walters,et al. Fog Computing and the Internet of Things: A Review , 2018, Big Data Cogn. Comput..
[9] Seungmin Rho,et al. Context-Driven Mobile Learning Using Fog Computing , 2018, 2018 International Conference on Platform Technology and Service (PlatCon).
[10] Tao Zhang,et al. Fog and IoT: An Overview of Research Opportunities , 2016, IEEE Internet of Things Journal.
[11] Wu Zhang,et al. Student Engagement Predictions in an e-Learning System and Their Impact on Student Course Assessment Scores , 2018, Comput. Intell. Neurosci..
[12] Samir Abou El-Seoud,et al. Studying the Effect of Using E-Learning Through Secure Cloud Computing Systems , 2018 .
[13] Karim Faez,et al. A New Lightweight Watchdog-Based Algorithm for Detecting Sybil Nodes in Mobile WSNs , 2018, Future Internet.
[14] Hannan Xiao,et al. Privacy and usability of image and text based challenge questions authentication in online examination , 2014, 2014 International Conference on Education Technologies and Computers (ICETC).
[15] Mohammed A. Al-Sharafi,et al. The Effectiveness of Cloud-Based E-Learning towards Quality of Academic Services: An Omanis’ Expert View , 2018 .
[16] Shadab Alam,et al. Cloud-Based E-Learning: Using Cloud Computing Platform for an Effective E-Learning , 2018, Smart Innovations in Communication and Computational Sciences.
[17] Ramgopal Kashyap. Biometric Authentication Techniques and E-Learning , 2019 .
[18] Rashid Mehmood,et al. Data Fusion and IoT for Smart Ubiquitous Environments: A Survey , 2017, IEEE Access.
[19] Denise Whitelock,et al. e-Authentication for online assessment: A mixed-method study , 2019, Br. J. Educ. Technol..
[20] Huazhu Song,et al. Private Cloud with e-Learning for Resources Sharing in University Environment , 2016, eLEOT.
[21] M. Zheng,et al. Evaluating outcomes of computer-based classroom testing: Student acceptance and impact on learning and exam performance , 2019, Medical teacher.
[22] Harry Raymond Joseph. Promoting education: A state of the art machine learning framework for feedback and monitoring E-Learning impact , 2014, 2014 IEEE Global Humanitarian Technology Conference - South Asia Satellite (GHTC-SAS).
[23] Yassine Khlifi,et al. A Novel Authentication Scheme for E-assessments Based on Student Behavior over E-learning Platform , 2017, Int. J. Emerg. Technol. Learn..
[24] Meghna Bhatia,et al. E-learning Platforms Security Issues and Vulnerability Analysis , 2018, 2018 International Conference on Computational and Characterization Techniques in Engineering & Sciences (CCTES).
[25] Andrea Bondavalli,et al. Continuous Authentication and Non-repudiation for the Security of Critical Systems , 2016, SRDS 2016.
[26] Theon L. Danet,et al. An Empirical Study of Authentication Methods to Secure E-learning System Activities Against Impersonation Fraud , 2016 .
[27] Siyang Wang,et al. Clustering of online learning resources via minimum spanning tree , 2016 .
[28] Rashid Mehmood,et al. UbeHealth: A Personalized Ubiquitous Cloud and Edge-Enabled Networked Healthcare System for Smart Cities , 2018, IEEE Access.
[29] Nagesh Kumar,et al. DES, AES and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysis , 2011 .
[30] Sunil Karforma,et al. Risks and remedies in e-learning system , 2012, ArXiv.
[31] Rashid Mehmood,et al. UTiLearn: A Personalised Ubiquitous Teaching and Learning System for Smart Societies , 2017, IEEE Access.
[32] Ismail M.A,et al. Clustering Algorithms Applied in Educational Data Mining , 2015 .
[33] David Argles,et al. Transparent authentication in E-learning , 2011, International Conference on Information Society (i-Society 2011).
[34] Analía Amandi,et al. eTeacher: Providing personalized assistance to e-learning students , 2008, Comput. Educ..
[35] Yuki Indrayadi,et al. Developing E-Learning System to Support Teaching and Learning Activities Using DSDM Approach , 2015 .
[36] Adekunle Isiaka Obasa,et al. A COMPARATIVE STUDY OF SYNCHRONOUS AND ASYNCHRONOUSE-LEARNING RESOURCES , 2013 .
[37] José Palazzo Moreira de Oliveira,et al. AdaptWeb: an Adaptive Web-based Courseware , 2003 .
[38] Wasim A. Al-Hamdani,et al. Secure E-Learning and Cryptography , 2014 .
[39] Defta Costinela Luminita. Information security in E-learning Platforms , 2011 .
[40] Leonard Barolli,et al. Performance Evaluation of an IoT-Based E-Learning Testbed Using Mean-Shift Clustering Approach Considering Gamma Type of Brain Waves , 2017, BWCCA.
[41] Hanan Lutfiyya,et al. E-Learning: Challenges and Research Opportunities Using Machine Learning & Data Analytics , 2018, IEEE Access.
[42] Corina Savulescu,et al. Security in e-learning systems , 2015, 2015 7th International Conference on Electronics, Computers and Artificial Intelligence (ECAI).
[43] Peter Appiahene,et al. Application of Wireless Ad-Hoc Networks Model to provide Education to rural Communities in Ghana , 2019 .
[44] Analía Amandi,et al. Improving User Profiling for a Richer Personalization: Modeling Context in E-Learning , 2012 .
[45] Yong Tang,et al. Exposing the hidden to the eyes: Analysis of SCHOLAT E-Learning data , 2016, 2016 IEEE 20th International Conference on Computer Supported Cooperative Work in Design (CSCWD).
[46] B. B. Gupta,et al. Secure Machine Learning Scenario from Big Data in Cloud Computing via Internet of Things Network , 2020, Handbook of Computer Networks and Cyber Security.
[47] Yong Chen,et al. Security Risks and Protection in Online Learning: A Survey. , 2013 .
[48] Rohit Rampal,et al. Synchronous e-learning: Reflections and design considerations , 2014 .
[49] Mostafa Azizi,et al. El-Security: E-learning Systems Security Checker Plug-in , 2017, BDCA'17.
[50] Tanupriya Choudhury,et al. Internet of Things and its applications in E-learning , 2017, 2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT).