Emerging eLearning Technologies and Applications
(ICETA), 2015 13th International Conference on,
pages 1–6. IEEE.
Bergadano, F., Gunetti, D., and Picardi, C. (2002). User au-
thentication through keystroke dynamics. ACM Trans-
actions on Information and System Security (TISSEC),
5(4):367–397.
Bohl, O., Scheuhase, J., Sengler, R., and Winand, U. (2002).
The sharable content object reference model (scorm)-
a critical review. In Computers in education, 2002.
proceedings. international conference on, pages 950–
951. IEEE.
Bours, P. (2012). Continuous keystroke dynamics: A dif-
ferent perspective towards biometric evaluation. In-
formation Security Technical Report, 17(1):36–43.
Bours, P. and Mondal, S. (2015). Continuous authentication
with keystroke dynamics. Norwegian Information Se-
curity Laboratory NISlab, pages 41–58.
Cordier, A., Derbel, F., and Mille, A. (2015). Observing a
web based learning activity: a knowledge oriented ap-
proach. Research Report tweak am fd ac 01, LIRIS
UMR CNRS 5205.
Davoudi, H. and Kabir, E. (2010). Modification of the rel-
ative distance for free text keystroke authentication.
In Telecommunications (IST), 2010 5th International
Symposium on, pages 547–551. IEEE.
Fayyoumi, A. and Zarrad, A. (2014). Novel solution based
on face recognition to address identity theft and cheat-
ing in online examination systems. Advances in Inter-
net of Things, 4(02):5.
Flior, E. and Kowalski, K. (2010). Continuous biomet-
ric user authentication in online examinations. In
2010 seventh International Conference on informa-
tion technology: new generations, pages 488–492.
IEEE.
Gamboa, H. and Fred, A. (2004). A behavioral biometric
system based on human-computer interaction. In Pro-
ceedings of SPIE, volume 5404, pages 381–392.
Harris, S. and Seaborne, A. (2013). SPARQL 1.1 Query
Language. W3c Recommendation, W3C.
Hernandez-Ortega, J., Daza, R., Morales, A., Fierrez, J.,
and Ortega-Garcia, J. (2019). edbb: Biometrics
and behavior for assessing remote education. arXiv
preprint arXiv:1912.04786.
Jagadamba, G., Sheeba, R., Brinda, K., Rohini, K., and
Pratik, S. (2020). Adaptive e-learning authentication
and monitoring. In 2020 2nd International Confer-
ence on Innovative Mechanisms for Industry Applica-
tions (ICIMIA), pages 277–283. IEEE.
Kang, P. and Cho, S. (2015). Keystroke dynamics-based
user authentication using long and free text strings
from various input devices. Information Sciences,
308(Supplement C):72 – 93.
Kolakowska, A. (2011). User authentication based on
keystroke dynamics analysis. Computer Recognition
Systems 4, pages 667–675.
Maas, A., Heather, C., Do, C. T., Brandman, R., Koller, D.,
and Ng, A. (2014). Offering verified credentials in
massive open online courses. Ubiquity, 2014(May):2.
Matyas, V. and Riha, Z. (2003). Toward reliable user au-
thentication through biometrics. IEEE Security & Pri-
vacy, 99(3):45–49.
Mille, A., Champin, P.-A., Cordier, A., Georgeon, O., and
Lefevre, M. (2013). Trace-Based Reasoning - Model-
ing interaction traces for reasoning on experiences. In
McCarthy, P., editor, The 26th International FLAIRS
Conference, pages 1–15, United States.
Mondal, S. and Bours, P. (2013). Continuous authentication
using mouse dynamics. In Biometrics Special Inter-
est Group (BIOSIG), 2013 International Conference
of the, pages 1–12. IEEE.
Mondal, S. and Bours, P. (2017). A study on continuous
authentication using a combination of keystroke and
mouse biometrics. Neurocomputing, 230:1–22.
Morales, A. and Fierrez, J. (2015). Keystroke biometrics
for student authentication: A case study. In Proceed-
ings of the 2015 ACM Conference on Innovation and
Technology in Computer Science Education, ITiCSE
’15, pages 337–337, New York, NY, USA. ACM.
O’Gorman, L. (2003). Comparing passwords, tokens, and
biometrics for user authentication. Proceedings of the
IEEE, 91(12):2021–2040.
Pleva, M., Bours, P., Hladek, D., and Juhar, J. (2016).
Using current biometrics technologies for authentica-
tion in e-learning assessment. In Emerging eLearning
Technologies and Applications (ICETA), 2016 Inter-
national Conference on, pages 269–274. IEEE.
Pusara, M. (2007). An examination of user behavior for user
re-authentication. PhD thesis, Purdue University.
Rabuzin, K., Baca, M., and Sajko, M. (2006). E-learning:
Biometrics as a security factor. In 2006 International
Multi-Conference on Computing in the Global Infor-
mation Technology-(ICCGI’06), pages 64–64. IEEE.
Ramu, T. and Arivoli, T. (2013). A framework of secure
biometric based online exam authentication: An alter-
native to traditional exam. Int J Sci Eng Res, 4(11):52–
60.
Ross, A. and Jain, A. (2003). Information fusion in biomet-
rics. Pattern recognition letters, 24(13):2115–2125.
Shen, C., Cai, Z., Guan, X., Du, Y., and Maxion, R. A.
(2013). User authentication through mouse dynam-
ics. IEEE Transactions on Information Forensics and
Security, 8(1):16–30.
Shepherd, S. (1995). Continuous authentication by analy-
sis of keyboard typing characteristics. In European
Convention on Security and Detection, 1995., pages
111–114. IET.
Traor
´
e, I., Nakkabi, Y., Saad, S., Sayed, B., Ardigo, J. D.,
and de Faria Quinan, P. M. (2017). Ensuring online
exam integrity through continuous biometric authen-
tication. In Information Security Practices, pages 73–
81. Springer.
Zhong, Y., Deng, Y., and Jain, A. K. (2012). Keystroke
dynamics for user authentication. In Computer Vision
and Pattern Recognition Workshops (CVPRW), 2012
IEEE Computer Society Conference on, pages 117–
123. IEEE.
Trace-Based Authentication Biometric for On-Line Education
161