-
1
-
-
38049025697
-
Final fantasy—securing on-line gaming with trusted computing
-
In, B. Xiao, L. Yang, J. Ma, C. Muller-Schloer, Y. Hua, (Eds), Berlin, Springer Berlin Heidelberg
-
Balfe, S. & Mohammed, A. (2007). Final fantasy—securing on-line gaming with trusted computing. In B. Xiao, L. Yang, J. Ma, C. Muller-Schloer & Y. Hua (Eds), Autonomic and trusted computing Vol. 4610 (pp. 123–134). Berlin: Springer Berlin Heidelberg.
-
(2007)
Autonomic and trusted computing
, vol.4610
, pp. 123-134
-
-
Balfe, S.1
Mohammed, A.2
-
2
-
-
84977757601
-
-
Pittsburgh PA, US Government Printing Office
-
Barkley, J. (1994). Security in open systems. Pittsburgh PA: US Government Printing Office.
-
(1994)
Security in open systems
-
-
Barkley, J.1
-
3
-
-
0002348308
-
What the student does: teaching for enhanced learning
-
Biggs, J. (1999). What the student does: teaching for enhanced learning. Higher Education Research & Development, 18, 1, 57–75. doi: 10.1080/0729436990180105.
-
(1999)
Higher Education Research & Development
, vol.18
, Issue.1
, pp. 57-75
-
-
Biggs, J.1
-
4
-
-
0346289571
-
Sustainable assessment: rethinking assessment for the learning society
-
Boud, D. (2000). Sustainable assessment: rethinking assessment for the learning society. Studies in Continuing Education, 22, 2, 151–167. doi: 10.1080/713695728.
-
(2000)
Studies in Continuing Education
, vol.22
, Issue.2
, pp. 151-167
-
-
Boud, D.1
-
5
-
-
45849127987
-
Feedback enhances the positive effects and reduces the negative effects of multiple-choice testing
-
Butler, A. & Roediger, H. (2008). Feedback enhances the positive effects and reduces the negative effects of multiple-choice testing. Memory & Cognition, 36, 3, 604–616. doi: 10.3758/mc.36.3.604.
-
(2008)
Memory & Cognition
, vol.36
, Issue.3
, pp. 604-616
-
-
Butler, A.1
Roediger, H.2
-
6
-
-
77951711838
-
Trust, distrust and their impact on assessment reform
-
Carless, D. (2009). Trust, distrust and their impact on assessment reform. Assessment & Evaluation in Higher Education, 34, 1, 79–89. doi: 10.1080/02602930801895786.
-
(2009)
Assessment & Evaluation in Higher Education
, vol.34
, Issue.1
, pp. 79-89
-
-
Carless, D.1
-
7
-
-
84901196946
-
The examined life: perspectives of lower primary school students in Hong Kong
-
Carless, D. & Lam, R. (2012). The examined life: perspectives of lower primary school students in Hong Kong. Education, 3–13, 1–17. doi: 10.1080/03004279.2012.689988.
-
(2012)
Education
, vol.3-13
, pp. 1-17
-
-
Carless, D.1
Lam, R.2
-
8
-
-
84906787845
-
Linguistic analysis of extended examination answers: differences between on-screen and paper-based, high- and low-scoring answers
-
Charman, M. (2014). Linguistic analysis of extended examination answers: differences between on-screen and paper-based, high- and low-scoring answers. British Journal of Educational Technology, 45, 5, 834–843. doi: 10.1111/bjet.12100.
-
(2014)
British Journal of Educational Technology
, vol.45
, Issue.5
, pp. 834-843
-
-
Charman, M.1
-
9
-
-
84890859099
-
Assessment might dictate the curriculum, but what dictates assessment?
-
Dawson, P., Bearman, M., Boud, D. J., Hall, M., Molloy, E. K., Bennett, S. et al (2013). Assessment might dictate the curriculum, but what dictates assessment? Teaching & Learning Inquiry: The ISSOTL Journal, 1, 1, 107–111. doi: 10.2979/teachlearninqu.1.1.107.
-
(2013)
Teaching & Learning Inquiry: The ISSOTL Journal
, vol.1
, Issue.1
, pp. 107-111
-
-
Dawson, P.1
Bearman, M.2
Boud, D.J.3
Hall, M.4
Molloy, E.K.5
Bennett, S.6
-
10
-
-
84977759136
-
-
Retrieved April 24, 2014, from
-
Digabi (2014). Digabi OS. Retrieved April 24, 2014, from https://digabi.fi/tekniikka/digabi-os/
-
(2014)
Digabi OS
-
-
-
12
-
-
84892384144
-
-
Regensburg, Germany. Retrieved 28 March, 2014, from
-
Gruhn, M. & Muller, T. (2013). On the practicability of cold boot attackseighth international conference on availability, reliability and security (pp. 390–397). Regensburg, Germany. Retrieved 28 March, 2014, from http://www1.cs.fau.de/filepool/projects/coldboot/fares_coldboot.pdf. doi: 10.1109/ARES.2013.52.
-
(2013)
On the practicability of cold boot attackseighth international conference on availability, reliability and security (pp. 390–397)
-
-
Gruhn, M.1
Muller, T.2
-
13
-
-
84977759432
-
-
Retrieved 24 April, 2014, from
-
HakShop (2014). HakShop—USB rubber ducky deluxe. Retrieved 24 April, 2014, from https://hakshop.myshopify.com/products/usb-rubber-ducky-deluxe
-
(2014)
HakShop—USB rubber ducky deluxe
-
-
-
14
-
-
66149173689
-
Lest we remember: cold-boot attacks on encryption keys
-
Halderman, J. A., Schoen, S. D., Heninger, N., Clarkson, W., Paul, W., Calandrino, J. A. et al (2009). Lest we remember: cold-boot attacks on encryption keys. Communications of the ACM, 52, 5, 91–98. doi: 10.1145/1506409.1506429.
-
(2009)
Communications of the ACM
, vol.52
, Issue.5
, pp. 91-98
-
-
Halderman, J.A.1
Schoen, S.D.2
Heninger, N.3
Clarkson, W.4
Paul, W.5
Calandrino, J.A.6
-
15
-
-
84913543532
-
Arguing again for e-exams in high stakes examinations
-
In, H. Carter, M. Gosper, J. Hedberg, (Eds), Sydney, Australia, ascilite
-
Hillier, M. & Fluck, A. (2013). Arguing again for e-exams in high stakes examinations. In H. Carter, M. Gosper & J. Hedberg (Eds), Electric dreams. proceedings ascilite 2013 Sydney (pp. 385–396). Sydney, Australia. ascilite.
-
(2013)
Electric dreams. proceedings ascilite 2013 Sydney
, pp. 385-396
-
-
Hillier, M.1
Fluck, A.2
-
16
-
-
84977759448
-
The mobile execution environment: a secure and non-intrusive approach to implement a bring your own device policy for laptops
-
In, T. Williams, M. Johnstone, C. Valli, (Eds), Perth, Western Australia, Security Research Institute, Edith Cowan University
-
James, P. & Griffiths, D. (2012). The mobile execution environment: a secure and non-intrusive approach to implement a bring your own device policy for laptops. In T. Williams, M. Johnstone & C. Valli (Eds), 10th Australian information security management conference (pp. 100–109). Perth, Western Australia: Security Research Institute, Edith Cowan University.
-
(2012)
10th Australian information security management conference
, pp. 100-109
-
-
James, P.1
Griffiths, D.2
-
17
-
-
84873705875
-
To write or to type? The effects of handwriting and word-processing on the written style of examination essays
-
Mogey, N. & Hartley, J. (2013). To write or to type? The effects of handwriting and word-processing on the written style of examination essays. Innovations in Education and Teaching International, 50, 1, 85–93. doi: 10.1080/14703297.2012.748334.
-
(2013)
Innovations in Education and Teaching International
, vol.50
, Issue.1
, pp. 85-93
-
-
Mogey, N.1
Hartley, J.2
-
18
-
-
84863209313
-
Students' choices between typing and handwriting in examinations
-
Mogey, N., Cowan, J., Paterson, J. & Purcell, M. (2012). Students' choices between typing and handwriting in examinations. Active Learning in Higher Education, 13, 2, 117–128. doi: 10.1177/1469787412441297.
-
(2012)
Active Learning in Higher Education
, vol.13
, Issue.2
, pp. 117-128
-
-
Mogey, N.1
Cowan, J.2
Paterson, J.3
Purcell, M.4
-
19
-
-
84890858258
-
A contribution to the history of assessment: how a conversation simulator redeems Socratic method
-
Nelson, R. & Dawson, P. (2014). A contribution to the history of assessment: how a conversation simulator redeems Socratic method. Assessment & Evaluation in Higher Education, 39, 2, 195–204. doi: 10.1080/02602938.2013.798394.
-
(2014)
Assessment & Evaluation in Higher Education
, vol.39
, Issue.2
, pp. 195-204
-
-
Nelson, R.1
Dawson, P.2
-
20
-
-
84949517770
-
Cold boot attack tools for Linux
-
Retrieved October 13, 2014, from
-
Rankin, K. (2009). Cold boot attack tools for Linux. Linux Journal, Retrieved October 13, 2014, from http://www.linuxjournal.com/magazine/cold-boot-attack-tools-linux
-
(2009)
Linux Journal
-
-
Rankin, K.1
-
24
-
-
84977749434
-
-
Trondheim, Norway, Norwegian University of Science and Technology, Retrieved 25 April, 2014, from
-
Wendel, E. (2012). Cheating in online games: a case study of bots and bot-detection in browser-based multiplayer games. Trondheim, Norway: Norwegian University of Science and Technology. Retrieved 25 April, 2014, from http://www.diva-portal.org/smash/record.jsf?pid=diva2:570786
-
(2012)
Cheating in online games: a case study of bots and bot-detection in browser-based multiplayer games
-
-
Wendel, E.1
|