References
- D. Komosny and S. U. Rehman, "A Method for Cheating Indication in Unproctored On-Line Exams," Sensors, vol. 22, no. 2, pp. 1-18, 2022, doi: 10.3390/s22020654.
- O. Salah, Ahmad; Moselhi, "Risk identification and assessment for engineering procurement construction management projects using fuzzy set theory," Can. J. Civ. Eng., 2016.
- F. D. Culcleasure, "Risk management: A study of current practices at North Carolina's private colleges and universities," Capella Univ., 2005.
- B. Almarri, F. Alraheb, S. Alramis, N. Almilad, E. Aldahasi, and A. Ali, "Security Risk Management of an Educational Institution: Case Study," Int. J. Comput. Sci. Netw. Secur., vol. 21, no. 3, pp. 172-176, 2021.
- I. V. Anikin, "Information security risks assessment in telecommunication network of the university," IEEE, pp. 1-4, 2016.
- A. Rosmansyah, Yusep and Ritonga, Mora and Hardi, "An Attack-Defense Tree on e-Exam System," Int. J. Emerg. Technol. Learn., vol. 14, pp. 251--260, 2019. https://doi.org/10.3991/ijet.v14i23.11088
- Y. Raanan, "Risk management in higher education: do we need it?," Risk Manag. High. Educ., pp. 1000--1007, 2008.
- W. S. & L. Brown, Computer Security, Principles and Practice. 2017.
- J. Vacca, Cyber Security and IT Infrastructure Protection. 2013.