{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,28]],"date-time":"2025-02-28T05:23:09Z","timestamp":1740720189439,"version":"3.38.0"},"reference-count":39,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,10,13]],"date-time":"2024-10-13T00:00:00Z","timestamp":1728777600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,10,13]],"date-time":"2024-10-13T00:00:00Z","timestamp":1728777600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2235224,2235976"],"award-info":[{"award-number":["2235224,2235976"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,10,13]]},"DOI":"10.1109\/fie61694.2024.10893584","type":"proceedings-article","created":{"date-parts":[[2025,2,26]],"date-time":"2025-02-26T18:43:35Z","timestamp":1740595415000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["Utilizing Real-World Software Vulnerabilities to Enhance Secure Programming Education"],"prefix":"10.1109","author":[{"given":"Denise","family":"Daniels","sequence":"first","affiliation":[{"name":"Virginia State University,Petersburg,Virginia,U.S.A."}]},{"given":"Joon Suk","family":"Lee","sequence":"additional","affiliation":[{"name":"Virginia State University,Petersburg,Virginia,U.S.A."}]},{"given":"Hui","family":"Chen","sequence":"additional","affiliation":[{"name":"CUNY Brooklyn College,Brooklyn,New York,U.S.A."}]},{"given":"Kostadin","family":"Damevski","sequence":"additional","affiliation":[{"name":"Virginia Commonwealth University,Richmond,Virginia,U.S.A."}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEET52601.2021.00034"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom50675.2020.00055"},{"volume-title":"Software assurance","year":"2020","key":"ref3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-80865-5_6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3372782.3406266"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.62"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2021.111150"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1037\/0022-0663.88.4.715"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1080\/00220973.2017.1380589"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2330601.2330629"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.4135\/9781483394534"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.4324\/9780203224342"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3328778.3366816"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(20)30017-8"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/2.735847"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CSEETW.2006.24"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.139"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.43"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2538862.2538939"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-13293-8_18"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3159450.3162366"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.139"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2897441"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1177\/0735633117708816"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2018.2888784"},{"issue":"1","key":"ref26","first-page":"7","article-title":"A laboratory for hands-on cyber threat hunting education","volume-title":"Journal of The Colloquium for Information Systems Security Education","volume":"7","author":"Wei","year":"2020"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2445196.2445396"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3422337.3450358"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3478431.3499391"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1080\/15536548.2012.10845664"},{"volume-title":"CWE-20: Improper input validation","year":"2022","key":"ref31"},{"volume-title":"Common vulnerability scoring system v3.0: Specification document","year":"2023","key":"ref32"},{"volume-title":"Cve-2022-36082 detail","year":"2023","key":"ref33"},{"volume-title":"Cyber4all input validation module","year":"2023","key":"ref34"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1080\/03054985.2012.731208"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1207\/s15327752jpa4601_16"},{"key":"ref37","volume-title":"Experimental and quasi-experimental designs for generalized causal inference","volume":"1195","author":"Cook","year":"2002"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1037\/13620-004"},{"issue":"1","key":"ref39","first-page":"11","article-title":"Five-point likert items: t test versus mann-whitney-wilcoxon (addendum added october 2012)","volume":"15","author":"De Winter","year":"2019","journal-title":"Practical Assessment, Research, and Evaluation"}],"event":{"name":"2024 IEEE Frontiers in Education Conference (FIE)","start":{"date-parts":[[2024,10,13]]},"location":"Washington, DC, USA","end":{"date-parts":[[2024,10,16]]}},"container-title":["2024 IEEE Frontiers in Education Conference (FIE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10892093\/10892810\/10893584.pdf?arnumber=10893584","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,27]],"date-time":"2025-02-27T10:03:15Z","timestamp":1740650595000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10893584\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,13]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/fie61694.2024.10893584","relation":{},"subject":[],"published":{"date-parts":[[2024,10,13]]}}}