<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Analysis of modern LMS platforms in Kazakhstan: Structure, functionality, cybersecurity⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Berik Akhmetov</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Sergiy Gnatyuk</string-name>
          <email>s.gnatyuk@nau.edu.ua</email>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Bakhytzhan Akhmetov</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Bauyrzhan Tynymbayev</string-name>
          <email>bauyrzhan.tynymbayev@gmail.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Abai Kazakh National Pedagogical University</institution>
          ,
          <addr-line>13 Dostyk ave., 050010 Almaty</addr-line>
          ,
          <country country="KZ">Kazakhstan</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>CSDP-2024: Cyber Security and Data Protection</institution>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>National Aviation University</institution>
          ,
          <addr-line>1 Liubomyra Huzara ave., 03058 Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>Yessenov University</institution>
          ,
          <addr-line>32 Microdistrict, 130000 Aktau</addr-line>
          ,
          <country country="KZ">Kazakhstan</country>
        </aff>
      </contrib-group>
      <fpage>106</fpage>
      <lpage>113</lpage>
      <abstract>
        <p>Today, higher education institutions actively use information platforms (Learning Management System, LMS). The LMS platforms cover many functions in the educational process: organization of the learning process, content management, assessment and feedback, monitoring and reporting, communication and interaction, personalization of learning, administration, and user management. There are many up-to-date approaches to provide effective structure, wide functionality, and cybersecurity issues of LMS platforms. The main objective of this study is to analyze the modern and most popular LMS systems in Kazakhstan (Platonus, Univer, Canvas). The analysis has shown that the most effective system used by Kazakh universities is Canvas LMS. It provides several benefits that make it attractive to educational institutions and corporate users. But the cybersecurity issues should be studied deeply in future works, as it will provide anomaly detection in the information flows.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;cybersecurity</kwd>
        <kwd>functionality</kwd>
        <kwd>structure</kwd>
        <kwd>LMS</kwd>
        <kwd>education</kwd>
        <kwd>academic information</kwd>
        <kwd>AI</kwd>
        <kwd>data leakage 1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>In the modern world, information technologies play a key
role in the functioning of educational institutions. Higher
education institutions actively use information platforms
(Learning Management Systems, LMS) to manage the
educational process, and store and process large amounts of
data on students, teachers, and research. However, as the
volume and importance of data grows, the risk of
unintentional or malicious modification increases. This
raises the need to develop a secure LMS that can withstand
internal and external threats.</p>
      <p>Another key challenge is the processing and analysis of
large amounts of data generated in higher education
institutions. Information about students, study programs,
lecturers, and learning processes is continuously
accumulated in LMS. Innovative methods and tools need to
be developed and applied to efficiently process and analyze
this volume of information.</p>
      <p>The up-to-date LSM should include an optimal set of
security features, utilizing the latest advances in
cybersecurity and AI to detect and prevent anomalies and
threats to data security. This will ensure not only protection
from external and internal cyberattacks but also improve
the efficiency of managing academic and administrative
processes, guaranteeing the integrity and confidentiality of
academic information.
The challenges of digital transformation facing higher
education require the formation of new models of “digital”
organizations with new approaches to the implementation
of all types of activities, basic and auxiliary processes, new
principles of interaction between participants in the
educational process, and new digital services. Under these
conditions, the growing need for secure information
systems for educational institutions is extremely important
and relevant, especially in the context of the increasing
number of cyberattacks and stricter requirements for the
protection of personal data. Preliminary studies have shown
that the existing LMS of educational institutions in
Kazakhstan is not always able to provide an adequate level
of protection against modern threats, which is confirmed by
regular incidents of data leakage.
2. Review of the modern approaches
Solving specific problems related to cybersecurity in
Kazakhstan’s educational institutions involves integrating
procedures and tools with used LMS.</p>
      <p>
        First, research in the application of AI to detect
anomalies in LMS and other information systems shows the
significant potential of AI in detecting and preventing
cyberattacks [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. However, many of these approaches do
not consider the specifics of LMS, which opens the door for
our study.
      </p>
      <p>0000-0001-9695-4543 (B. Akhmetov); 0000-0003-4992-0564
(S. Gnatyuk); 0000-0001-5622-2233 (B. Akhmetov); 0000-0002-3213-1203
(B. Tynymbayev)
© 2024 Copyright for this paper by its authors. Use permitted under
Creative Commons License Attribution 4.0 International (CC BY 4.0).
Second, many of the project managers’ works mentioned
above stand out by developing decision support systems
based on different mathematical apparatus for analyzing
anomaly and cyberattack trait data. These approaches can
be adapted and extended in our project to create more
efficient and specialized anomaly detection tools.</p>
      <p>
        The third area is related to the integration of teacherless
ML to analyze information from LMS databases. Techniques
such as ML can detect abnormal behavior patterns without
first identifying the parameters of normal behavior. Current
research emphasizes the importance of adapting these
methods to the specificity of data in educational
environments [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
      <p>
        The fourth direction of the research includes the
development of mechanisms to ensure the security of the
LMS, using genetic algorithms to determine the most
effective set of security features. Genetic algorithms allow
for optimization of the process of selecting protection
means adapted to specific conditions and threats, which is
confirmed by studies in the field of cybersecurity [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ].
      </p>
      <p>
        The fifth unique feature is the integration of the
anomaly detection system with the Power BI platform to
provide the results of data processing in the form of digital
analytics and visualizations [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. This will allow university
administrations to effectively monitor and analyze the
security of information flows.
      </p>
      <p>
        The sixth direction of the research includes a
comprehensive study of the level of personal data
cybersecurity in the developed prototype of the LMS [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
This will make it possible to assess the effectiveness of the
implemented security features and anomaly detection
mechanisms.
      </p>
      <p>
        The seventh direction is related to the assessment of the
effectiveness and potential of the application of the
developed prototype in the real conditions of Kazakhstani
universities [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. This will make it possible to determine the
real value and applicability of the proposed solutions.
      </p>
      <p>
        The eighth direction includes the formation of
recommendations based on the results obtained to improve
the degree of information security and cybersecurity of
universities in Kazakhstan [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
      </p>
    </sec>
    <sec id="sec-2">
      <title>3. Statement of a research problem</title>
      <p>The global goal of the project is to develop and implement
a prototype of a secure LMS for a higher education
institution, incorporating AI techniques to detect anomalies
in data, improve cybersecurity optimize educational
processes, and increase their efficiency.</p>
      <p>To achieve the global goal, it is necessary to start with
the study and analysis of the existing information flows of
the university and the formation of terms of reference,
including requirements for functionality, security, and
interface of the system. Also, it is important to define the
indicators collected in LMS of Kazakhstan universities
(Platonus, Univer, Canvas).</p>
      <p>From this viewpoint, the main objective of this study is
to analyze the modern and most popular LMS systems in
Kazakhstan by criteria of structure, functionality, and
cybersecurity.</p>
    </sec>
    <sec id="sec-3">
      <title>4. Main part of the research study</title>
      <p>4.1. Analysis of the main tasks of up-to-date</p>
      <sec id="sec-3-1">
        <title>LMS platforms</title>
        <p>The LMS are key tools for organizing, managing, and
supporting the learning process in educational institutions
and businesses. The main tasks of LMS systems include a
variety of functions that contribute to the effective training
and development of users. Below are the examples of
architecture as well as the main tasks of LMS systems:
The main tasks of LMS systems are the following:
1. Organization of the learning process:
– Structuring of training courses: LMSs allow you
to create, organize, and structure training courses,
including modules, lectures, assignments, and other
learning materials.
– Learning planning: Provide the ability to
schedule training sessions, including class
schedules, and deadlines for assignments and
assessments.
2. Content management:
– Uploading and storing materials: LMSs provide
the ability to upload and store a variety of learning
materials, such as videos, audio, texts, presentations,
and more.
– Content organization: Cataloging and
organizing content to provide easy access and
navigation for users.
3. Assessment and feedback:
– Testing and assessment: LMSs provide tools for
creating tests, quizzes, and other methods of
assessing knowledge.
– Automatic grading: Automating the process of
grading tests and assignments, allowing you to
quickly and efficiently assess user knowledge.
– Feedback: Provide feedback to students on their
performance and progress.
4. Monitoring and reporting:
– Progress tracking: LMSs allow you to track
users’ progress in training courses, including
module completion, test scores, and assignment
completion.
– Analytics and reporting: Generate reports on
user activity, course performance, and other metrics
to analyze the learning process.
5. Communication and interaction:
– Forums and discussions: LMSs provide tools for
organizing forums, discussion panels, and group
discussions.
– Notifications and alerts: Notification systems to
inform users about new materials, schedule
changes, and other important events.
– Webinars and online meetings: Integration with
webinar and online meeting tools.
6. Personalization of learning:
– Individualized learning trajectories: LMSs can
customize individualized learning paths for users
based on their needs and knowledge level.
– Adaptive learning: The use of adaptive
technologies to customize the learning process to
the individual needs and progress of the user.
7. Administration and user management:
– User management: Registering, managing roles,
and access of users in different parts of the system.
– User support: Providing technical support and
assistance to LMS users.</p>
        <p>The main tasks of LMS systems cover a wide range of
functions aimed at supporting and improving the learning
process. From content organization and management to
assessment, monitoring, personalization, and
communication, LMSs provide a comprehensive approach to
learning that allows for efficient use of resources and high
learning outcomes.</p>
      </sec>
      <sec id="sec-3-2">
        <title>4.2. Cybersecurity of LMS systems</title>
        <p>The main aspects of cybersecurity of LMS systems include
the following issues:
1. Authentication and authorization
– Multi-factor authentication (MFA): The use of
multiple factors to verify a user’s identity
(password, biometrics, tokens).
– Role-based access control (RBAC): Role-based
access control that allows you to control who has
access to what resources.
2. Data encryption
– Data at Rest Encryption: Use encryption
algorithms to protect data stored on servers.
– Data in Transit Encryption: Ensures the security
of data transmitted over the network by using
TLS/SSL protocols.
3. Protection against malicious software
– Anti-virus software: Using antivirus solutions to
protect servers and endpoints from malware.
– Intrusion detection and prevention systems
(IDS/IPS): Monitoring network activity to detect and
prevent unauthorized activity.
4. Code and development security
– Regular security testing: Conducting
penetration tests and code analysis to identify and
fix vulnerabilities.
– Secure software development: Utilizing security
best practices during software development,
including code reviews and static code analysis.
5. Access and identity management
– Access control: Ensure that only authorized
users have access to sensitive data and functions.</p>
        <p>Logging and monitoring: Maintaining detailed event
logs and continuous monitoring to detect anomalous
activity.</p>
      </sec>
      <sec id="sec-3-3">
        <title>4.3. LMS in Kazakh Universities</title>
        <sec id="sec-3-3-1">
          <title>1) Univer</title>
          <p>
            The LMS Univer [
            <xref ref-type="bibr" rid="ref8">8</xref>
            ] is an important part of the
educational infrastructure of some universities in
Kazakhstan. This system (Fig. 2) is used to organize distance
learning and provides a wide range of tools for students and
teachers.
The main functions of the LMS Univer are the following:
1) Course management:
– Creating and administering training courses,
including uploading materials, organizing modules,
and testing.
– Integration with other platforms, such as
Moodle, which allows you to effectively use both
systems.
2) Monitoring and evaluation:
– Track student progress, record grades, and
analyze results.
– Automatic grading of tests and assignments,
which simplifies the work of teachers and increases
the accuracy of grades.
3) Communication and interaction:
– Tools for communication between students and
teachers, including forums, chats, and video
conferencing.
– Possibility to organize webinars and online
classes.
4) Administrative functions:
– Manage student records, class schedules, and
other administrative tasks.
– Support for the work of the Admissions Office,
including managing applications and registration of
new students.
5) Integration with other systems:
– Supports integration with platforms such as
Microsoft Teams, Google Meet, and other tools to
ensure an integrated approach to learning.
– This system ensures high efficiency in
organizing the educational process, allowing
teachers to focus on course content and students to
learn.
          </p>
          <p>The LMS Univer combines the following structural
modules:


























</p>
        </sec>
        <sec id="sec-3-3-2">
          <title>2) Platonus</title>
          <p>
            The Platonus LMS [
            <xref ref-type="bibr" rid="ref9">9</xref>
            ] is one of the leading educational
platforms in Kazakhstan (Fig. 3). It is widely used in
universities and colleges to automate and optimize the
learning process.
The main features and benefits of the Platonus LMS are the
following:
The LMS Platonus combines the following structural
modules:
1) Automation of the educational process:
– Platonus allows you to automate the planning
and management of academic calendars, class
schedules, exams, and state certifications.
– The system supports credit-based learning
technology, which ensures efficient distribution of
academic disciplines and teacher workload.
2) Course and content management:
– The platform provides the ability to create and
administer training courses, upload training
materials, and conduct tests.
– Integration with other systems, such as Moodle,
provides a wide range of learning opportunities.
3) Transparency and control:
– Maintaining electronic journals and information
on grades increases the transparency of the learning
process and reduces the risk of corruption.
– The system supports appeals after exams and
tests, ensuring the fairness of assessment.
4) Monitoring and reporting:
– Platonus allows you to track students’ progress,
and generate reports on their performance and
other statistical information.
– Integration with a unified higher education
management system for centralized data
accounting.
5) Communication and learning support:
– The system provides tools for communication
between students and teachers, including electronic
messaging and document exchange.
– It supports distance learning, allowing you to
reach a wide audience and provide flexibility in the
learning process.
– Platonus is also actively used in medical schools,
where it is adapted to the specifics of medical
education, including the management of research
activities and clinical practices.
































          </p>
          <p>Information about the university
Faculties
Specialties/GOP
Teachers
University staff
Students
Applicants
Parents
Orders+Extracts from orders
Transcript
Graduates
Discipline catalogs
Training cases
Calendar
Curricula
Learning streams
Journal of grades and attendance
State certification
Records
Summary sheets
Summary sheets for the whole period
Schedule
Testing
GPA calculator
Preparatory Department
Card file of trainees
Military department
Questionnaire for user
Reports
Publications of university teachers
Messages
Announcements



















</p>
          <p>Library
Online registration for disciplines
Composition of appeal commissions of
examination sessions
Employment of graduates
Distribution of graduates
File storage
Military records
Electronic bulletins (online signing of bulletins in
the system)
Intermediate certification online
Distribution of academic load
Online registration of applicants
Practical training of students
Control over the fulfillment of graduation works
Integration with the system of checking for
borrowings
Antiplagiarism/StrikePlagiarism/Turnitin
Online proctoring. Integration with AeroExam
Online Proctoring. Integration with Examus
Dormitory
Dormitory. Autodistribution of places
Service center for students/dropouts/ graduates














</p>
          <p>SMS notification of system users
Integration with MS Active Directory
Integration with MS Teams
Integration with Power BI
Generating reports (analytics) in
intelligence format
Checking written works (for borrowings)
Minor
Settings
Distribution of faculty disciplines
Education documents constructor
Integration with 1C: Accounting Office
Online registration for applicants
Testing for applicants
Reading data from ID card</p>
          <p>Tasks.</p>
        </sec>
        <sec id="sec-3-3-3">
          <title>3) Canvas LMS</title>
          <p>
            The Canvas LMS [
            <xref ref-type="bibr" rid="ref10">10</xref>
            ] was developed by Instructure
company, it’s a powerful LMS (Fig. 4) that is actively used
in many countries around the world, including Kazakhstan.
Canvas LMS offers a wide range of tools and features that
help educational institutions effectively organize and
manage the learning process.
          </p>
          <p>Business
Canvas LMS is actively used in various educational institutions
in Kazakhstan to organize distance learning, ensure the
continuity of the educational process, and support modern
teaching methods. It helps universities and schools in
Kazakhstan to implement innovative approaches to teaching,
providing students and teachers with all the necessary tools for
effective interaction and learning.</p>
          <p>The main features of Canvas LMS are the following:
1) Integration with other systems:
– Canvas integrates seamlessly with student
management systems (SIS) and hundreds of external
educational applications, making it a versatile
solution for any type of educational institution.
2) Mobile access:
– The platform supports mobile applications for
students, teachers, and parents, allowing users to
interact with the system from any device at any
time.
3) Personalization of learning:
– Canvas provides the ability to create individual
learning paths using adaptive learning features and
personalized recommendations.
4) Interactive content:
– The system supports the creation of interactive
video content through Canvas Studio, which allows
you to turn passive learning into active interaction.
5) Analytics and reporting:
– Canvas provides advanced analytics and
reporting capabilities to help track student
performance and course effectiveness.
6) Security and accessibility:
– The platform provides a high level of data
security and meets international accessibility
standards, making it reliable and convenient for all
users.</p>
        </sec>
        <sec id="sec-3-3-4">
          <title>Comparative analysis of LMS platforms</title>
          <p>Table 1 provides a comparative analysis of the LMS
systems under consideration by the main characteristics
that are important for Kazakh and other universities. For the
comparison the following features were used: Flexibility
(possibility to change by needs of the university), Free
access (availability of the free version of the platform), Wide
use (use in various universities in Kazakhstan and other
states), Scalability (possibility to increase number of users
and databases), Remote study (support of the distant
learning), Mobile version (availability of the iOS-based,
Android-based and other mobile platforms), Integration
(possibility to integration with other educational and
research platforms as well as instrumental tools like Google
Drive, Microsoft Office 365), Cloud storage (data saving in
cloud storage), Cybersecurity (support the tools and
procedures for data confidentiality, integrity, and
availability), Update (constantly being updated to integrate
the latest technologies and features to improve the learning
process).</p>
          <p>LMS/Features
Flexibility
Free access
Wide use
Scalability
Remote study
Mobile version
Integration
Cloud storage
Cybersecurity
Update</p>
          <p>Univer
+/+
+/+/+</p>
          <p>Platonus
+/+
+/+
+/+/+</p>
          <p>Canvas
+
+/+
+
+
+
+
+
+
+</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>5. Conclusions</title>
      <p>A study of LMS systems most commonly used by
universities in Kazakhstan has shown that the most
effective system is Canvas LMS. It provides several benefits
that make it attractive to educational institutions and
corporate users. Here are some of the key benefits of Canvas
LMS:</p>
      <p>It is known for its simple and intuitive interface
that makes it easy to use for both teachers and
students. The interface is easily adaptable to
different types of courses and teaching methods.
It has powerful mobile applications for Android
and iOS that allow users to access their courses
from anywhere. This ensures continuous access to
learning materials and communication with
instructors and students.</p>
      <p>Canvas LMS integrates seamlessly with a variety
of external applications and tools through the LTI
(Learning Tools Interoperability) standard. This
includes integration with tools from Google,
Microsoft, and many others, allowing you to create
comprehensive learning solutions.</p>
      <p>Provides teachers with a variety of tools for
creating and editing learning materials. This
includes video lectures, interactive exercises,
quizzes, discussion forums, and other types of
learning content.</p>
      <p>Provides advanced analytics and reporting
capabilities that allow you to track student
progress, course performance, and assignment
completion. This data can be used to improve
curricula and increase student success.</p>
      <p>Supports a variety of learning formats, including
blended learning, fully online courses, and
traditional classroom learning. This allows
institutions to easily adapt the system to their
specific needs.</p>
      <p>Provides a variety of tools for communication
between students and teachers, such as messages,
discussion forums, video conferencing, and group
projects. This promotes active interaction and
collaboration within the learning process.</p>
      <p>Meets high standards of data security and privacy,
ensuring the protection of users’ personal
information. The system also meets various
regulatory requirements, making it a reliable
choice for educational institutions in different
countries.</p>
      <p>Further research will be devoted to a thorough analysis
of Canvas LMS information flows, as well as cybersecurity
issues of the platform (threats, vulnerabilities, risks, etc.).</p>
    </sec>
    <sec id="sec-5">
      <title>Acknowledgments</title>
      <p>This work is carried out within the framework of research
grant №AP22787045 “Development of a prototype of a
secure university information system using artificial
intelligence methods to detect anomalies in data”
(20242026), funded by the Ministry of Science and Higher
Education of the Republic of Kazakhstan.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>R.</given-names>
            <surname>Chalapathy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Chawla</surname>
          </string-name>
          ,
          <source>Deep Learning for Anomaly Detection: A Survey</source>
          (
          <year>2019</year>
          ). doi:
          <volume>10</volume>
          .48550/arXiv.
          <year>1901</year>
          .
          <volume>03407</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>L.</given-names>
            <surname>Ruff</surname>
          </string-name>
          , et al.,
          <article-title>A Unifying Review of Deep and Shallow Anomaly Detection</article-title>
          ,
          <source>Proceedings of the IEEE 109(5)</source>
          (
          <year>2021</year>
          )
          <fpage>756</fpage>
          -
          <lpage>795</lpage>
          . doi:
          <volume>10</volume>
          .1109/JPROC.
          <year>2021</year>
          .
          <volume>305</volume>
          2449.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>P.</given-names>
            <surname>Harper</surname>
          </string-name>
          ,
          <string-name>
            <surname>J.</surname>
          </string-name>
          <article-title>DeFranco, A Genetic Algorithm for Cybersecurity Decision Support, Appl</article-title>
          . Sci.
          <volume>11</volume>
          (
          <issue>9</issue>
          ) (
          <year>2021</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>R.</given-names>
            <surname>Sallam</surname>
          </string-name>
          , et al.,
          <source>The Augmented Analytics and Business Intelligence Market</source>
          (
          <year>2021</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>M.</given-names>
            <surname>Alazab</surname>
          </string-name>
          , et al.,
          <source>Cybersecurity and Artificial Intelligence: Recent Advances, Future Development, and Research Challenges</source>
          (
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>W.</given-names>
            <surname>Huang</surname>
          </string-name>
          ,
          <string-name>
            <surname>K.</surname>
          </string-name>
          <article-title>MacCallum, Security Issues in Online Learning and Countermeasures: A Systematic Review of the Literature (</article-title>
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>O.</given-names>
            <surname>Zawacki-Richter</surname>
          </string-name>
          , et al.,
          <source>Systematic Review of Research on Artificial Intelligence Applications in Higher Education-where are the Educators?</source>
          (
          <year>2019</year>
          ).
          <source>doi: 10.1186/s41239-019-0171-0.</source>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Balogh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Turčáni</surname>
          </string-name>
          ,
          <article-title>Possibilities of Modelling WebBased Education Using IF-THEN Rules and Fuzzy Petri Nets in LMS</article-title>
          ,
          <source>Communications in Computer and Information Science</source>
          <volume>251</volume>
          (
          <year>2011</year>
          ). doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>642</fpage>
          -25327-
          <issue>0</issue>
          _
          <fpage>9</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          <article-title>[9] Univer 2.0 LMS System</article-title>
          . URL: https://univer.kaznu.kz/user/login
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>[10] Platonus University LMS System. URL: https://platonus.kz/products/platonus-university</mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Canvas</surname>
            <given-names>LMS</given-names>
          </string-name>
          <string-name>
            <surname>System. URL</surname>
          </string-name>
          : https://www.instructure.com/canvas
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Hu</surname>
          </string-name>
          , et al.,
          <source>Method of Searching Birationally Equivalent Edwards Curves Over Binary Fields, Advances in Intelligent Systems and Computing</source>
          <volume>754</volume>
          (
          <year>2019</year>
          )
          <fpage>309</fpage>
          -
          <lpage>319</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>319</fpage>
          -91008-6_
          <fpage>31</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>R.</given-names>
            <surname>Odarchenko</surname>
          </string-name>
          , et al.,
          <source>Traffic Offload Improved Method for 4G/5G Mobile Network Operator, 14th International Conf. on Advanced Trends in Radioelectronics</source>
          , Telecommunications and Computer Engineering (TCSET-
          <year>2018</year>
          ) (
          <year>2018</year>
          )
          <fpage>1051</fpage>
          -
          <lpage>1054</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Hu</surname>
          </string-name>
          , et al.,
          <source>Method for Cyber Threats Detection and Identification in Modern Cloud Services</source>
          , Lecture
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>