{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T08:49:32Z","timestamp":1730278172117,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,4]]},"DOI":"10.1109\/ithet.2018.8424805","type":"proceedings-article","created":{"date-parts":[[2018,8,6]],"date-time":"2018-08-06T18:59:55Z","timestamp":1533581995000},"page":"1-7","source":"Crossref","is-referenced-by-count":1,"title":["eAssessment by using a Trustworthy System in Blended and Online Institutions"],"prefix":"10.1109","author":[{"given":"Malinka","family":"Ivanova","sequence":"first","affiliation":[]},{"given":"Mariana","family":"Durcheva","sequence":"additional","affiliation":[]},{"given":"David","family":"Baneres","sequence":"additional","affiliation":[]},{"given":"M. Elena","family":"Rodriguez","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/TLT.2014.2320919"},{"year":"2017","journal-title":"E-Assessment at the University of Basel Examinations with EvaExam Educational Technologies","key":"ref11"},{"key":"ref12","first-page":"541","article-title":"Improving e-Assessment Platform with Flexible Scoring Mechanism based on Event Log Analysis","author":"djaghloul","year":"2010","journal-title":"Conference ICL2010"},{"key":"ref13","article-title":"A demonstration of Numbas, an e-assessment system for mathematical disciplines","author":"perfect","year":"2015","journal-title":"the Internationl Conference on Compupter Assisted Assessment (CAA)"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.20533\/ijds.2040.2570.2010.0018"},{"key":"ref15","first-page":"647","article-title":"An approach to presence verification in summative e-assessment security","author":"apampa","year":"2010","journal-title":"International Conference on Information Society (I-Society)"},{"key":"ref16","first-page":"32","article-title":"A smart approach for bimodal biometric authentication in home exams (SABBAH model)","volume":"4","author":"sabah","year":"2012","journal-title":"CiiT Int Journal of Biometrics and Bioinformatics"},{"key":"ref17","first-page":"60","article-title":"Impersonation challenges associated with e-assessment of university students","volume":"4","author":"gathuri","year":"2014","journal-title":"Journal of Information Engineering and Applications"},{"year":"0","journal-title":"The TeSLA project","key":"ref18"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/TPAMI.2012.233"},{"key":"ref4","article-title":"eAssessment and the independent learner","author":"butcher","year":"0","journal-title":"Proceedings of the 21st World Conference on Open Learning and Distance Education ICDE"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.3916\/C39-2012-03-06"},{"year":"0","author":"williams","journal-title":"Advantages & Disadvantages of Online Assessment","key":"ref6"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1016\/j.compedu.2011.06.004"},{"key":"ref8","first-page":"1786","article-title":"Software for E-Assessment of Programming Exercises","author":"priss","year":"2012","journal-title":"GI-Jahrestagung"},{"key":"ref7","first-page":"555","article-title":"The Use of E-assessment in Chemical Engineering Education","volume":"12","author":"perry","year":"2007","journal-title":"Chemical Engineering Transactions"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.3390\/educsci4040247"},{"year":"2007","journal-title":"Effective Practice with E-Assessment","key":"ref1"},{"key":"ref9","article-title":"Enhancing the Learning Experience on Programming-focused Courses via Electronic Assessment Tools","author":"loidl","year":"2017","journal-title":"The 18th symposium on Trends in Functional Programming"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/JSTSP.2017.2692389"},{"key":"ref22","first-page":"176","article-title":"Termweighting learning via genetic programming for text classification. Knowledge-Based Systems","volume":"83","author":"escalante","year":"2015"},{"key":"ref21","article-title":"Free Typed Text Using Keystroke Dynamics for Continuous Authentication","volume":"8735","author":"pinto","year":"2014","journal-title":"Communications and Multimedia Security CMS 2014 Lecture Notes in Computer Science"},{"key":"ref23","article-title":"Plac-plagi: Definition, prevention and detection","author":"n\u00fa\u00f1ez","year":"2011","journal-title":"Second Institutional Seminar for UOC instructors"}],"event":{"name":"2018 17th International Conference on Information Technology Based Higher Education and Training (ITHET)","start":{"date-parts":[[2018,4,26]]},"location":"Olhao","end":{"date-parts":[[2018,4,28]]}},"container-title":["2018 17th International Conference on Information Technology Based Higher Education and Training (ITHET)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8411559\/8424615\/08424805.pdf?arnumber=8424805","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T05:06:09Z","timestamp":1643173569000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8424805\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/ithet.2018.8424805","relation":{},"subject":[],"published":{"date-parts":[[2018,4]]}}}