{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T03:05:45Z","timestamp":1729652745475,"version":"3.28.0"},"reference-count":45,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,5]]},"DOI":"10.1109\/mipro.2016.7522272","type":"proceedings-article","created":{"date-parts":[[2016,8,5]],"date-time":"2016-08-05T17:41:29Z","timestamp":1470418889000},"page":"923-927","source":"Crossref","is-referenced-by-count":0,"title":["Systems and software assurance \u2014 A model Cyber Security course"],"prefix":"10.1109","author":[{"given":"V.","family":"Jovanovic","sequence":"first","affiliation":[]},{"given":"J. K.","family":"Harris","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"The CISSP and CAP Preparation Guide","year":"2007","author":"krutz","key":"ref39"},{"journal-title":"Security Engineering","year":"2008","author":"anderson","key":"ref38"},{"journal-title":"DRAFT","article-title":"Automation Support for Security Control Assessment","year":"2016","key":"ref33"},{"journal-title":"Guidelins on Securty and Privacy in Public Cloud Computing","year":"2011","key":"ref32"},{"journal-title":"Information Security Continuous Montiroring (ISCM) for Federal Information Systems and Organizations","year":"2011","key":"ref31"},{"journal-title":"Technical Guide to Information Security Testing and Assessment","year":"0","key":"ref30"},{"key":"ref37","article-title":"System Assumace- Beyond Vulnerabilities","author":"mansurov","year":"2010","journal-title":"MK"},{"key":"ref36","article-title":"Information Security Risk Assessment Toolkit","author":"talabis","year":"2013","journal-title":"Elsevier"},{"journal-title":"Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations","year":"2015","key":"ref35"},{"journal-title":"Security and systems engineering","year":"2014","key":"ref34"},{"year":"0","key":"ref10"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1108\/14635779710174963","article-title":"ISO 9001 standard and software quality improvement","volume":"4","author":"jovanovic","year":"1999","journal-title":"Benchmarking for Quality Management & Technology"},{"journal-title":"Minimum Security Requirements for Federal Information and Information Systems","year":"2008","key":"ref11"},{"key":"ref12","article-title":"Java Coding Guidelines","author":"long","year":"2014","journal-title":"Addison Wesley"},{"journal-title":"Software Security - Building Security In","year":"2006","author":"mc graw","key":"ref13"},{"key":"ref14","article-title":"Security Assessment Using NSA IAM","author":"mills","year":"2004","journal-title":"Syngress"},{"article-title":"Evaluating Efectiveness of Microsoft Treat Modeling Tool","year":"0","author":"williams","key":"ref15"},{"journal-title":"Core Software Security","year":"2014","author":"ransome","key":"ref16"},{"key":"ref17","article-title":"Security Controls, Evaluation, Testing, and Assessment Handbook","author":"johnson","year":"2016","journal-title":"Elsevier"},{"key":"ref18","article-title":"Secure and Resilient Software","author":"merkow","year":"2012","journal-title":"CRC"},{"key":"ref19","article-title":"Security Pattems- Integrating Security and System Engineering","author":"schumacher","year":"2006","journal-title":"J Wiley"},{"journal-title":"r1 Guide for Mapping Types of Information and Information Systems to Security Categories","year":"2008","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1201\/b18465"},{"journal-title":"Perfomance Measurement Guide for Informatin Securitty","year":"2008","key":"ref27"},{"key":"ref3","article-title":"Treat Modeling: Design for Security","author":"shostak","year":"2014","journal-title":"J Wiley"},{"journal-title":"National Information Assurnace (IA) Training Standard for Information Systems Security Officers","year":"2004","key":"ref6"},{"journal-title":"Security Considerations in the System Development Life Cycle","year":"2008","key":"ref29"},{"key":"ref5","article-title":"High -Assurance Design- Architecting Secure and Reliable Enterpsise Applications","author":"berg","year":"2006","journal-title":"Addison Wesley"},{"journal-title":"Information Assurance Workforce Improvement Program","year":"2015","key":"ref8"},{"journal-title":"National Information Assurance (IA) Training Standard for Risk Analysts","year":"2005","key":"ref7"},{"key":"ref2","article-title":"Effective Application of Software Failure Modes Effects Analysis","author":"neufelder","year":"2014","journal-title":"Soft Rel"},{"key":"ref9","article-title":"Engineering a better software organization","author":"shoemaker","year":"2001","journal-title":"Quest"},{"journal-title":"All-In-One CISSP Certification Exam Guide","year":"2014","author":"conclin","key":"ref1"},{"journal-title":"Guide for Developing Security Plans for Federal Informatin Systems","year":"2006","key":"ref20"},{"year":"2015","key":"ref45"},{"journal-title":"Guide for Conducting Risk Assessments","year":"2012","key":"ref22"},{"journal-title":"Enginering Principles for Information Security (A Baseline for Achieving Security)","year":"2004","key":"ref21"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/1414558.1414598"},{"journal-title":"Managing Risk and Information Security","year":"2011","key":"ref24"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/1456625.1456630"},{"journal-title":"Guide for Applying the Risk Management Framework to Federal Information Systems","year":"2010","key":"ref23"},{"key":"ref44","first-page":"759","article-title":"Computer Science Curriculum 2013- An Example","author":"jovanovic","year":"2013","journal-title":"MIPRO"},{"journal-title":"Assessing Security and Privacy Controls in federal Informatin Systems and Organizations","year":"2014","key":"ref26"},{"key":"ref43","first-page":"41","article-title":"Teachnig storage infrastucture management and security","author":"jovanovic","year":"0"},{"journal-title":"Security and Privacy Controls for Federal Information Systems and Organizations","year":"2013","key":"ref25"}],"event":{"name":"2016 39th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","start":{"date-parts":[[2016,5,30]]},"location":"Opatija, Croatia","end":{"date-parts":[[2016,6,3]]}},"container-title":["2016 39th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7513176\/7522093\/07522272.pdf?arnumber=7522272","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T20:04:25Z","timestamp":1498334665000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7522272\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5]]},"references-count":45,"URL":"https:\/\/doi.org\/10.1109\/mipro.2016.7522272","relation":{},"subject":[],"published":{"date-parts":[[2016,5]]}}}