Impersonation Attack-Defense Tree

3Citations
Citations of this article
18Readers
Mendeley users who have this article in their library.

Abstract

Nowadays, online learning or e-learning has become increasingly popular and evolved. Many academic institutions use the Learning Management System (LMS) as a medium for delivering e-learning. A vital feature in such a system is the electronic examination (e-exam), where verifying student's authentic competence is a challenge. This paper aims to present countermeasures for impersonation attacks. This research was a more focused effort and a continuation of previously owned one and many others found in works of literature. The method of protection is presented in the form of an attack-defense tree model.

Cite

CITATION STYLE

APA

Rosmansyah, Y., Hendarto, I. L. S., & Pratama, D. (2020). Impersonation Attack-Defense Tree. International Journal of Emerging Technologies in Learning, 15(19), 239–246. https://doi.org/10.3991/ijet.v15i19.12699

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free