{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T01:58:49Z","timestamp":1761789529913,"version":"3.43.0"},"reference-count":13,"publisher":"IEEE","license":[{"start":{"date-parts":[[2018,6,1]],"date-time":"2018-06-01T00:00:00Z","timestamp":1527811200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2018,6,1]],"date-time":"2018-06-01T00:00:00Z","timestamp":1527811200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1109\/cybersecpods.2018.8560666","type":"proceedings-article","created":{"date-parts":[[2018,12,6]],"date-time":"2018-12-06T20:24:46Z","timestamp":1544127886000},"page":"1-8","source":"Crossref","is-referenced-by-count":10,"title":["OWASP Top 10 - Do Startups Care?"],"prefix":"10.1109","author":[{"given":"Halldis","family":"S\u03d5hoel","sequence":"first","affiliation":[{"name":"BEKK Consulting, Oslo, NO-0102, Norway"}]},{"given":"Martin Gilje","family":"Jaatun","sequence":"additional","affiliation":[{"name":"SINTEF Digital, Trondheim, NO-7465, Norway"}]},{"given":"Colin","family":"Boyd","sequence":"additional","affiliation":[{"name":"IIK NTNU, Trondheim, Norway"}]}],"member":"263","reference":[{"key":"ref10","first-page":"120","article-title":"Software security maturity in public organisations","volume":"9290","author":"jaatun","year":"2015","journal-title":"Information Security&#x2013;18th International Conference ISC 2015"},{"journal-title":"Building Security In Maturity Model (BSIMM V)","year":"2013","author":"mcgraw","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2011.18"},{"journal-title":"Ulike sikkerhetsniva","year":"0","key":"ref13"},{"key":"ref4","article-title":"Digital srbarhet - sikkert samfunn","author":"lysne","year":"2015","journal-title":"Norges offentlige utredninger Tech Rep"},{"journal-title":"Dyn Statement on 10\/21\/2016 DDoS Attack","year":"0","author":"york","key":"ref3"},{"journal-title":"Stanford University Tech Rep","year":"2012","author":"bau","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.159"},{"journal-title":"About the BSIMM","year":"0","key":"ref8"},{"journal-title":"Top 102013","year":"0","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2006.43"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2016.93"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.4018\/jsse.2010070105"}],"event":{"name":"2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)","start":{"date-parts":[[2018,6,11]]},"location":"Glasgow, UK","end":{"date-parts":[[2018,6,12]]}},"container-title":["2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8537418\/8560662\/08560666.pdf?arnumber=8560666","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T18:39:39Z","timestamp":1754332779000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8560666\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/cybersecpods.2018.8560666","relation":{},"subject":[],"published":{"date-parts":[[2018,6]]}}}