{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T04:10:33Z","timestamp":1748664633174,"version":"3.41.0"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319238197"},{"type":"electronic","value":"9783319238203"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-23820-3_8","type":"book-chapter","created":{"date-parts":[[2015,9,19]],"date-time":"2015-09-19T14:21:39Z","timestamp":1442672499000},"page":"118-135","source":"Crossref","is-referenced-by-count":7,"title":["Monitoring Electronic Exams"],"prefix":"10.1007","author":[{"given":"Ali","family":"Kassem","sequence":"first","affiliation":[]},{"given":"Yli\u00e8s","family":"Falcone","sequence":"additional","affiliation":[]},{"given":"Pascal","family":"Lafourcade","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,15]]},"reference":[{"key":"8_CR1","unstructured":"Le Figaro: Etudiants: les examens sur tablettes num\u00e9riques appell\u00e9s \u00e0 se multiplier. Press release (2015). http:\/\/goo.gl\/ahxQJD"},{"key":"8_CR2","unstructured":"Copeland, L.: School cheating scandal shakes up atlanta. USA TODAY (2013). http:\/\/goo.gl\/wGr40s"},{"key":"8_CR3","unstructured":"Watson, R.: Student visa system fraud exposed in BBC investigation (2014). http:\/\/www.bbc.com\/news\/uk-26024375"},{"key":"8_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1007\/978-3-642-32759-9_9","volume-title":"FM 2012: Formal Methods","author":"H Barringer","year":"2012","unstructured":"Barringer, H., Falcone, Y., Havelund, K., Reger, G., Rydeheard, D.: Quantified event automata: towards expressive and efficient runtime monitors. In: Giannakopoulou, D., M\u00e9ry, D. (eds.) FM 2012. LNCS, vol. 7436, pp. 68\u201384. Springer, Heidelberg (2012)"},{"key":"8_CR5","unstructured":"Reger, G.: Automata based monitoring and mining of execution traces. Ph.D. thesis, University of Manchester (2014)"},{"key":"8_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"596","DOI":"10.1007\/978-3-662-46681-0_55","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"G Reger","year":"2015","unstructured":"Reger, G., Cruz, H.C., Rydeheard, D.E.: MarQ: monitoring at runtime with QEA. In: Baier, C., Tinelli, C. (eds.) ETAPS 2015. LNCS, vol. 9035, pp. 596\u2013610. Springer, Heidelberg (2015)"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Kassem, A., Falcone, Y., Lafourcade, P.: Monitoring electronic exams. Technical report TR-2015-4, Verimag, Laboratoire d\u2019Informatique de Grenoble Research Report (2015)","DOI":"10.1007\/978-3-319-23820-3_8"},{"key":"8_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1007\/978-3-319-17533-1_35","volume-title":"Information Security Practice and Experience","author":"J Dreier","year":"2015","unstructured":"Dreier, J., Giustolisi, R., Kassem, A., Lafourcade, P., Lenzini, G.: A framework for analyzing verifiability in traditional and electronic exams. In: Lopez, J., Wu, Y. (eds.) ISPEC 2015. LNCS, vol. 9065, pp. 514\u2013529. Springer, Heidelberg (2015)"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Abadi, M., Fournet, C.: Mobile values, new names, and secure communication. In: POPL 2001. ACM, New York (2001)","DOI":"10.1145\/360204.360213"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Blanchet, B.: An efficient cryptographic protocol verifier based on prolog rules. In: CSFW, Cape Breton, Canada, pp. 82\u201396. IEEE Computer Society (2001)","DOI":"10.1109\/CSFW.2001.930138"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Dreier, J., Jonker, H., Lafourcade, P.: Defining verifiability in e-auction protocols. In: 8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS 2013, pp. 547\u2013552, Hangzhou, China (2013)","DOI":"10.1145\/2484313.2484387"},{"key":"8_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1007\/978-3-642-15497-3_24","volume-title":"Computer Security \u2013 ESORICS 2010","author":"S Kremer","year":"2010","unstructured":"Kremer, S., Ryan, M., Smyth, B.: Election verifiability in electronic voting protocols. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 389\u2013404. Springer, Heidelberg (2010)"},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Backes, M., Hritcu, C., Maffei, M.: Automated verification of remote electronic voting protocols in the applied pi-calculus. In: CSF, pp. 195\u2013209 (2008)","DOI":"10.1109\/CSF.2008.26"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Dreier, J., Giustolisi, R., Kassem, A., Lafourcade, P., Lenzini, G., Ryan, P.Y.A.: Formal analysis of electronic exams. In: SECRYPT 2014 - Proceedings of the 11th International Conference on Security and Cryptography, pp. 101\u2013112, Vienna, Austria (2014)","DOI":"10.5220\/0005050901010112"},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"Bartocci, E., Bonakdarpour, B., Falcone, Y.: First international competition on software for runtime verification. In: [19], pp. 1\u20139","DOI":"10.1007\/978-3-319-11164-3_1"},{"key":"8_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1007\/978-3-642-35632-2_22","volume-title":"Runtime Verification","author":"C Colombo","year":"2013","unstructured":"Colombo, C., Pace, G.J.: Fast-forward runtime monitoring \u2014 an industrial case study. In: Qadeer, S., Tasiran, S. (eds.) RV 2012. LNCS, vol. 7687, pp. 214\u2013228. Springer, Heidelberg (2013)"},{"key":"8_CR17","doi-asserted-by":"crossref","unstructured":"Basin, D.A., Caronni, G., Ereth, S., Harvan, M., Klaedtke, F., Mantel, H.: Scalable offline monitoring. In: [19], pp. 31\u201347","DOI":"10.1007\/978-3-319-11164-3_4"},{"key":"8_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/978-3-642-16612-9_9","volume-title":"Runtime Verification","author":"Y Falcone","year":"2010","unstructured":"Falcone, Y.: You should better enforce than verify. In: Barringer, H., Falcone, Y., Finkbeiner, B., Havelund, K., Lee, I., Pace, G., Ro\u015fu, G., Sokolsky, O., Tillmann, N. (eds.) RV 2010. LNCS, vol. 6418, pp. 89\u2013105. Springer, Heidelberg (2010)"},{"key":"8_CR19","series-title":"Lecture Notes in Computer Science","volume-title":"Runtime Verification","year":"2014","unstructured":"Bonakdarpour, B., Smolka, S.A. (eds.): RV 2014. LNCS, vol. 8734. Springer, Heidelberg (2014)"}],"container-title":["Lecture Notes in Computer Science","Runtime Verification"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-23820-3_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T18:33:17Z","timestamp":1748629997000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-23820-3_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319238197","9783319238203"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-23820-3_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}