Login / Signup

Survey of Vulnerabilities and Mitigation Techniques for Mooc-Based Applications.

Hossain ShahriarHisham M. HaddadDavid LebronRubana Yasmin Lupu
Published in: Int. J. Secur. Softw. Eng. (2016)
Keyphrases
  • real time
  • data collection
  • information security
  • artificial intelligence
  • metadata
  • learning environment
  • wireless sensor networks
  • online course
  • countermeasures
  • security issues