{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T06:31:34Z","timestamp":1725431494857},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,3]]},"DOI":"10.1109\/educon.2013.6530168","type":"proceedings-article","created":{"date-parts":[[2013,6,25]],"date-time":"2013-06-25T14:54:46Z","timestamp":1372172086000},"page":"608-611","source":"Crossref","is-referenced-by-count":3,"title":["Software and Web applications security: state-of-the-art courseware and learning paradigm"],"prefix":"10.1109","author":[{"given":"A. V.","family":"Uskov","sequence":"first","affiliation":[]}],"member":"263","reference":[{"journal-title":"2012 Application Security Trends","year":"0","key":"15"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/IEDEC.2013.6526763"},{"journal-title":"How to Break Web Software Functional and Security Testing of Web Applications and Web Services","year":"2006","author":"andrews","key":"13"},{"journal-title":"Why You Should Learn by Doing","year":"0","author":"kruger","key":"14"},{"journal-title":"Computer Security Principles and Practice","year":"2011","author":"stalling","key":"11"},{"journal-title":"Counter Hack Reloaded A Step-by-step Guide to Computer Attacks and Effective Defenses","year":"2006","author":"skoudis","key":"12"},{"journal-title":"U S Public Companies' Perceptions of Risk and their Risk Mitigation Strategies Featuring Findings from the Chubb 2012 Public Company Risk Survey","year":"0","key":"3"},{"journal-title":"2010-2011 CSI Computer Crime and Security Survey","year":"0","key":"2"},{"journal-title":"Report by Ponemon Institute","article-title":"2012 cost of cyber crime study: United states","year":"0","key":"1"},{"journal-title":"Hacking The Art of Exploitation","year":"2008","author":"erickson","key":"10"},{"journal-title":"The Tangled Web A Guide to Securing Modem Web Applications","year":"2011","author":"zalewski","key":"7"},{"journal-title":"The Web Application Hacker's Handbook Discovering and Exploiting Security Flaws","year":"2011","author":"stuttard","key":"6"},{"journal-title":"Graduate Concentration in Software","year":"0","key":"5"},{"journal-title":"Undergraduate Concentration in Software","year":"0","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2006.43"},{"journal-title":"Practical Malware Analysis The Hands-On Guide to Dissecting Malicious Softwar","year":"2012","author":"sikorski","key":"8"}],"event":{"name":"2013 IEEE Global Engineering Education Conference (EDUCON)","start":{"date-parts":[[2013,3,13]]},"location":"Berlin","end":{"date-parts":[[2013,3,15]]}},"container-title":["2013 IEEE Global Engineering Education Conference (EDUCON)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6522574\/6530074\/06530168.pdf?arnumber=6530168","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T23:07:55Z","timestamp":1490224075000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6530168\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,3]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/educon.2013.6530168","relation":{},"subject":[],"published":{"date-parts":[[2013,3]]}}}