{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T20:31:21Z","timestamp":1730233881047,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,5,24]],"date-time":"2021-05-24T00:00:00Z","timestamp":1621814400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,5,24]],"date-time":"2021-05-24T00:00:00Z","timestamp":1621814400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,5,24]],"date-time":"2021-05-24T00:00:00Z","timestamp":1621814400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,5,24]]},"DOI":"10.1109\/icccsp52374.2021.9465500","type":"proceedings-article","created":{"date-parts":[[2021,6,29]],"date-time":"2021-06-29T16:18:03Z","timestamp":1624983483000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Celestial Learning: Secure eLearning platform using Node-Express"],"prefix":"10.1109","author":[{"given":"Saumya M.","family":"Sinha","sequence":"first","affiliation":[]},{"given":"Vishal P.","family":"Kale","sequence":"additional","affiliation":[]},{"given":"Rutik S.","family":"Sangle","sequence":"additional","affiliation":[]},{"given":"Siddharth R.","family":"Bhoite","sequence":"additional","affiliation":[]},{"given":"Vinayak G.","family":"Kottawar","sequence":"additional","affiliation":[]},{"given":"Pramod B.","family":"Deshmukh","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICIMTech.2018.8528178"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/INCET49848.2020.9154067"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"237","DOI":"10.3390\/app11010237","article-title":"Predicting Student Performance Using Data Mining and Learning Analytics Techniques: A Systematic Literature Review","volume":"11","author":"namoun","year":"2020","journal-title":"Applied Sciences"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1080\/02602938.2019.1697798"},{"key":"ref14","first-page":"588","article-title":"Student academic performance prediction using support vector machine","volume":"6","author":"oloruntoba","year":"2017","journal-title":"International Journal of Engineering Sciences & Research Technology"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.sbspro.2011.04.171"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"2297","DOI":"10.1016\/j.sbspro.2012.05.474","article-title":"Elearning Security Vulnerabilities","volume":"46","author":"costinela-lumini?a","year":"2012","journal-title":"Procedia - Social and Behavioral Sciences"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICALT.2017.110"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICALT.2019.00099"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CIST.2018.8596516"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CSNT.2015.113"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/DeSE.2015.31"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/RTEICT46194.2019.9016786"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.17485\/IJST\/v13i13.307"},{"article-title":"How Online Assessments Help In Campus Recruitment? Youth4Work","year":"2019","author":"jain","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.edurev.2014.05.001"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ECAI.2015.7301225"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CCTES.2018.8674115"},{"key":"ref9","article-title":"Advantages And Disadvantages Of eLearning","author":"clover","year":"2020","journal-title":"Elearning Industry"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.17487\/RFC7519"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/INMIC48123.2019.9022766"},{"key":"ref21","doi-asserted-by":"crossref","DOI":"10.3390\/su9071099","article-title":"A Study on a JWT-Based User Authentication and API Assessment Scheme Using IMEI in a Smart Home Environment","volume":"9","author":"hong","year":"2017","journal-title":"Sustainability"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2016.119"},{"key":"ref23","article-title":"How and when to use JSON Web Tokens for your services","author":"roetman","year":"2017","journal-title":"codecentric AG Blog"}],"event":{"name":"2021 5th International Conference on Computer, Communication and Signal Processing (ICCCSP)","start":{"date-parts":[[2021,5,24]]},"location":"Chennai, India","end":{"date-parts":[[2021,5,25]]}},"container-title":["2021 5th International Conference on Computer, Communication and Signal Processing (ICCCSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9465481\/9465342\/09465500.pdf?arnumber=9465500","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T11:43:01Z","timestamp":1652182981000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9465500\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,24]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/icccsp52374.2021.9465500","relation":{},"subject":[],"published":{"date-parts":[[2021,5,24]]}}}