Login / Signup
Survey of Vulnerabilities and Mitigation Techniques for Mooc-Based Applications.
Hossain Shahriar
Hisham M. Haddad
David Lebron
Rubana Yasmin Lupu
Published in:
Int. J. Secur. Softw. Eng. (2016)
Keyphrases
</>
real time
data collection
information security
artificial intelligence
metadata
learning environment
wireless sensor networks
online course
countermeasures
security issues