{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T00:05:10Z","timestamp":1773792310745,"version":"3.50.1"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,12,10]],"date-time":"2022-12-10T00:00:00Z","timestamp":1670630400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,12,10]],"date-time":"2022-12-10T00:00:00Z","timestamp":1670630400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,12,10]]},"DOI":"10.1109\/icsai57119.2022.10005488","type":"proceedings-article","created":{"date-parts":[[2023,1,9]],"date-time":"2023-01-09T21:28:16Z","timestamp":1673299696000},"page":"1-7","source":"Crossref","is-referenced-by-count":8,"title":["Survey of Online Exam Proctoring Model to Detect Cheating Behavior based on Face Recognition"],"prefix":"10.1109","author":[{"given":"Sucianna Ghadati","family":"Rabiha","sequence":"first","affiliation":[{"name":"Bina Nusantara University,BINUS Graduate Program &#x2013; Computer Science.,Computer Science Department,Jakarta,Indonesia,11480"}]},{"given":"Iman Herwidiana","family":"Kartowisastro","sequence":"additional","affiliation":[{"name":"Bina Nusantara University,Faculty of Engineering,Computer Science Department, BINUS Graduate Program &#x2013; Computer Science. Computer Engineering Department,Jakarta,Indonesia,11480"}]},{"given":"Reina","family":"Setiawan","sequence":"additional","affiliation":[{"name":"Bina Nusantara University,School of Computer Science,Computer Science Department, BINUS Graduate Program &#x2013; Computer Science. Computer Science Department,Jakarta,Indonesia,11480"}]},{"given":"Widodo","family":"Budiharto","sequence":"additional","affiliation":[{"name":"Bina Nusantara University,BINUS Graduate Program &#x2013; Computer Science.,Computer Science Department,Jakarta,Indonesia,11480"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/tmm.2017.2656064"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.14569\/ijacsa.2017.080425"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/icodse.2016.7936145"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/access.2021.3079375"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.jebo.2020.12.004"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SysCoBIoTS48768.2019.9028027"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445294"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssaho.2021.100132"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.chbr.2020.100033"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.07.102"},{"key":"ref11","volume-title":"Behavioral detection of cheating in online examination","author":"Korman","year":"2010"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/icoict.2017.8074679"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/iciccs48265.2020.9120966"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/icalt.2008.184"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.4236\/ait.2014.42002"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.11591\/eecsi.v4.1038"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/siu53274.2021.9477950"},{"key":"ref18","article-title":"Guidelines for performing systematic literature reviews in software engineering","volume-title":"Tech. report, Ver. 2.3 EBSE Tech. Report. EBSE","author":"Keele","year":"2007"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3385209.3385231"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3421682.3421692"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3460418.3479323"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/icbaie52039.2021.9389967"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/iceei47359.2019.8988786"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/iccci50826.2021.9402553"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/apwimob51111.2021.9435232"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-05532-5_37"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-64352-6_11"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-33-4673-4_56"}],"event":{"name":"2022 8th International Conference on Systems and Informatics (ICSAI)","location":"Kunming, China","start":{"date-parts":[[2022,12,10]]},"end":{"date-parts":[[2022,12,12]]}},"container-title":["2022 8th International Conference on Systems and Informatics (ICSAI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10005314\/10005319\/10005488.pdf?arnumber=10005488","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,9]],"date-time":"2024-02-09T04:54:39Z","timestamp":1707454479000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10005488\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,10]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/icsai57119.2022.10005488","relation":{},"subject":[],"published":{"date-parts":[[2022,12,10]]}}}