References
[1]. Apampa, K. M., Wills, G., & Argles, D. (2010). User security issues in summative e-assessment security. International Journal of Digital Society (IJDS), 1(2), 1-13.
[2]. Assaf, W., Elia, G., Fayyoumi, A., & Taurino, C. (2007, July). Prospects of e-learning: the case of Jordan. In Annual IADIS International Conference on e-Society.
[3]. Babatunde, I. G., Akinyokun, O. C., Kayode, A. B., & Olatunbosun, O. (2011). Adaptive and faster approach to fingerprint minutiae extraction and validation. International Journal of Computer Science and Security (IJCSS), 5(4), 414-424.
[4]. Bal, A., & Acharya, A. (2011, December). Biometric authentication and tracking system for online examination system. In 2011 International Conference on Recent Trends in Information Systems (pp. 209-213). IEEE.
[5]. Chowhan, S., Kulkarni, U. V., & Shinde, G. N. (2011). Iris recognition using modified fuzzy hypersphere neural network with different distance measures. International Journal of Advanced Computer Science and Applications, 2(6).
[6]. Clarke, N. L., Dowland, P., & Furnell, S. M. (2013, June). e-Invigilator: A biometric-based supervision system for e- Assessments. In International Conference on Information Society (i-Society 2013) (pp. 238-242). IEEE.
[7]. Curran, K., Middleton, G., & Doherty, C. (2011). Cheating in exams with technology. International Journal of Cyber Ethics in Education (IJCEE), 1(2), 54-62.
[8]. Eckstein, M. A. (2003). Combating academic fraud: Towards a culture of integrity. International Institute for Educational Planning.
[9]. Fayyoumi, A., & Zarrad, A. (2014). Novel solution based on face recognition to address identity theft and cheating in online examination systems. Advances in Internet of Things, 4(02), 5-12.
[10]. Gathuri, J. W., Luvanda, A., Matende, S., & Kamundi, S. (2014). Impersonation challenges associated with e-assessment of university students. Journal of Information Engineering and Applications, 4(7), 60-68.
[11]. Goswami, S. K., & Basu, S. K. (1991, January). Direct solution of distribution systems. In IEE Proceedings C (Generation, Transmission and Distribution) (Vol. 138, No. 1, pp. 78-88). IET Digital Library.
[12]. Hernández, J. A., Ortiz, A. O., Andaverde, J., & Burlak, G. (2008, March). Biometrics in online assessments: A study th case in high school students. In 18 International Conference on Electronics, Communications and Computers (conielecomp 2008) (pp. 111-116). IEEE.
[13]. Irfan, C. A., Nomura, S., Ouzzane, K., & Fukumura, Y. (2009, June). Face-based access control and invigilation tool for e-learning systems. In 2009 International Conference on Biometrics and Kansei Engineering (pp. 40-44). IEEE.
[14]. Irfan, A. C. M., Takuya, K., Nomura, S., & Yoshimi, F. (2009). An access control system for e-learning management systems. Journal of Medical Informatics & Technologies, 13.
[15]. Iwasokun, G. B., & Akinyokun, O. C. (2016). Singular minutiae points' relationship-based approach to fingerprint matching. Artificial Intelligence Research, 5(1), 78-86.
[16]. Iwasokun, G. B., Akinyokun, O. K., Akinyede, R. O., & Udoh, S. S. (2018). Fingerprint-based authorization platform for electronic-based examination. Journal of Scientific Research & Reports, 12 (6), 1-10.
[17]. Iwasokun, G. B., Akinyokun, O. C., Angaye, C. O., & Olabode, O. (2012). A multi-level model for fingerprint image enhancement. Journal of Pattern Recognition Research, 7(1), 155-174.
[18]. Ketab, S. S., Clarke, N., & Dowland, P. S. (2016). The value of the biometrics in invigilated e-assessments. In Edulearn16, the, International Conference on Education and New Learning Technologies.
[19]. Levy, Y., & Ramim, M. (2007). A theoretical approach for biometrics authentication of e-exams. Chais Conference on Instructional Technologies Research.
[20]. Levy, Y., & Ramim, M. (2009). Initial development of a learners' ratified acceptance of multibiometrics intentions model (RAMIM). Interdisciplinary Journal of ELearning and Learning Objects, 5(1), 379-397.
[21]. Maureen, I. (2016). Virtual examination supervision system for nigerian universities. International Journal of Modern Education & Computer Science, 8(9), 43-50.
[22]. Mothukuri, U. K., Jain, S., & Muralidharan, V. (2012, October). Invigilated online assessment: Various ways to minimize unauthorized help. In 2012 IEEE Symposium on E-Learning, E-Management and E-Services (pp. 1-4). IEEE.
[23]. Noeman, M., & Eric, S. (2010). Face-based einvigilation. Journal of Nursing Education, 49(2).
[24]. Onyesolu, M. O., Ejiofor, V. E., Onyeizu, M. N., & Ugoh, D. (2013). Enhancing Security in a distributed examination using Biometrics and Distributed Firewall System. International Journal of Emerging Technology and Advanced Engineering, 3(9), 65-70.
[25]. Pan, C. C., Yang, K. H., & Lee, T. L. (2004, March). Secure online examination architecture based on distributed firewall. In IEEE International Conference on e- Technology, e-Commerce and e-Service, 2004. EEE'04. 2004 (pp. 533-536). IEEE.
[26]. Ricketts, C., Filmore, P., Lowry, R., & Wilks, S. (2003). How should we measure the costs of computer aided assessment? Proceedings of the 7th Computer Assisted Assessment Conference.
[27]. Rodchua, S., Yiadom-Boakye, G., & Woolsey, R. (2011). Student Verification system for online assessments: bolstering quality and integrity of distance learning. Journal of Industrial Technology, 27(3), 1-8.
[28]. Rovai, A. P. (2000). Online and traditional assessments: What is the difference? The Internet and Higher Education, 3(3), 141-151.
[29]. Rowe, N. C. (2004). Cheating in online student assessment: Beyond plagiarism. Online Journal of Distance Learning Administration, 7(2).
[30]. Sabbah, Y., Saroit, I., & Kotb, A. (2012, March). Synchronous authentication with bimodal biometrics for e-assessment: A theoretical model. In 2012 6th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT) (pp. 139-145). IEEE.
[31]. Sheard, J., & Dick, M. (2003, June). Influences on cheating practice of graduate students in IT courses: What are the factors? In ACM SIGCSE Bulletin (Vol. 35, No. 3, pp. 45-49). ACM.
[32]. Tiwari, C., Hanmandlu, M., & Vasikarla, S. (2015, October). Suspicious face detection based on eye and other facial features movement monitoring. In 2015 IEEE Applied Imagery Pattern Recognition Workshop (AIPR) (pp. 1-8). IEEE.
[33]. Wales, J., & Baraniuk, R. (2008, February). Technology opens the doors to global classrooms. The Weekend Australian Inquirer, 25.
[34]. Weippl, E. R. (2005). Security in E-Learning (Vol. 16). Springer Science & Business Media. Retrieved from http://issep.uni-lu.ac.at/material/weippl.pdf, Accessed 23/05/2010