{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T21:04:20Z","timestamp":1773522260168,"version":"3.50.1"},"reference-count":14,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,10,13]],"date-time":"2024-10-13T00:00:00Z","timestamp":1728777600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,10,13]],"date-time":"2024-10-13T00:00:00Z","timestamp":1728777600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,10,13]]},"DOI":"10.1109\/fie61694.2024.10893015","type":"proceedings-article","created":{"date-parts":[[2025,2,26]],"date-time":"2025-02-26T18:43:35Z","timestamp":1740595415000},"page":"1-9","source":"Crossref","is-referenced-by-count":3,"title":["Analysis of Software Vulnerabilities Introduced in Programming Submissions Across Curriculum at Two Higher Education Institutions"],"prefix":"10.1109","author":[{"given":"Andrew","family":"Sanders","sequence":"first","affiliation":[{"name":"School of Computer and Cyber Science, Augusta University,Augusta,USA"}]},{"given":"Gursimran Singh","family":"Walia","sequence":"additional","affiliation":[{"name":"School of Computer and Cyber Science, Augusta University,Augusta,USA"}]},{"given":"Andrew","family":"Allen","sequence":"additional","affiliation":[{"name":"Georgia Southern University,Department of Computer Science,Statesboro,USA"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"DBIR report 2023 - master\u2019s guide"},{"key":"ref2","volume-title":"Department of Homeland Security, US-CERT. Software assurance"},{"key":"ref3","article-title":"A. f. C. M. A. Joint Task Force on Computing Curricula and 1. C. Society","volume-title":"Computer Science Curricula 2013: Curriculum Guidelines for Undergraduate Degree Programs in Computer Science","year":"2013"},{"key":"ref4","volume-title":"Accreditation changes | ABET"},{"key":"ref5","volume-title":"Veracode survey research identifies cybersecurity skills gap causes and cures","author":"Zorabedian"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"111150","DOI":"10.1016\/j.jss.2021.111150","article-title":"Understanding security vulnerabilities in student code: A case study in a non-security course","volume":"185","author":"Yilmaz","year":"2022","journal-title":"Journal of Systems and Software"},{"issue":"1","key":"ref7","doi-asserted-by":"crossref","first-page":"8","DOI":"10.53735\/cisse.v11i1.179","article-title":"Assessing common software vulnerabilities in undergraduate computer science assignments","volume":"11","author":"Sanders","year":"2024","journal-title":"Journal of The Colloquium for Information Systems Security Education"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"103009","DOI":"10.1016\/j.jnca.2021.103009","article-title":"The rise of software vulnerability: Taxonomy of software vulnerabilities detection and machine learning approaches","volume":"179","author":"Hanif","year":"2021","journal-title":"Journal of Network and Computer Applications"},{"key":"ref9","volume-title":"CWE - frequently asked questions (FAQ)"},{"key":"ref10","volume-title":"CWE - 2022 CWE top 25 most dangerous software weaknesses"},{"key":"ref11","volume-title":"Home | CVE. [Online]"},{"key":"ref12","volume-title":"NVD - home"},{"issue":"2","key":"ref13","first-page":"33","article-title":"Assessing java coding vulnerabilities in undergraduate software engineering education by using open source vulnerability analysis tools","volume":"4","author":"Hu","year":"2017","journal-title":"Journal of The Colloquium for Information Systems Security Education"},{"key":"ref14","volume-title":"Sonar Source. Issues"}],"event":{"name":"2024 IEEE Frontiers in Education Conference (FIE)","location":"Washington, DC, USA","start":{"date-parts":[[2024,10,13]]},"end":{"date-parts":[[2024,10,16]]}},"container-title":["2024 IEEE Frontiers in Education Conference (FIE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10892093\/10892810\/10893015.pdf?arnumber=10893015","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,27]],"date-time":"2025-02-27T09:36:38Z","timestamp":1740648998000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10893015\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,13]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/fie61694.2024.10893015","relation":{},"subject":[],"published":{"date-parts":[[2024,10,13]]}}}