Comparing the Security of Three Proctoring Regimens for Bring-Your-Own-Device Exams.
Rishi GulatiMatthew WestCraig B. ZillesMariana SilvaPublished in: SIGCSE (1) (2024)
Keyphrases
- information security
- access control
- web applications
- computer security
- network security
- virtual private network
- security level
- security policies
- rfid tags
- security issues
- database security
- security mechanisms
- data acquisition
- intrusion detection
- sql server
- statistical databases
- security analysis
- cyber security
- windows xp
- anomaly detection