{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:38:49Z","timestamp":1750307929075,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2006,9,22]],"date-time":"2006-09-22T00:00:00Z","timestamp":1158883200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,9,22]]},"DOI":"10.1145\/1231047.1231052","type":"proceedings-article","created":{"date-parts":[[2007,4,5]],"date-time":"2007-04-05T19:41:00Z","timestamp":1175802060000},"page":"19-23","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Secure software engineering teaching modules"],"prefix":"10.1145","author":[{"given":"James","family":"Walden","sequence":"first","affiliation":[{"name":"Northern Kentucky University, Highland Heights, KY"}]},{"given":"Charles E.","family":"Frank","sequence":"additional","affiliation":[{"name":"Northern Kentucky University, Highland Heights, KY"}]}],"member":"320","published-online":{"date-parts":[[2006,9,22]]},"reference":[{"volume-title":"Proceedings of the 37th SIGCSE Technical Symposium on Computer Science Education","year":"2006","author":"Frank C.","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","unstructured":"Howard M. and LeBlanc D. Writing Secure Code 2nd edition Microsoft Press 2003.   Howard M. and LeBlanc D. Writing Secure Code 2 nd edition Microsoft Press 2003."},{"volume-title":"McGraw-Hill\/Osborne","year":"2005","author":"Howard M.","key":"e_1_3_2_1_3_1"},{"volume-title":"Microsoft Press","year":"2006","author":"Howard M.","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","unstructured":"McGraw G. Software Security Addison-Wesley 2006.   McGraw G. Software Security Addison-Wesley 2006."},{"key":"e_1_3_2_1_6_1","unstructured":"Microsoft Threat Analysis and Modeling Tool http:\/\/msdn.microsoft.com\/security\/securecode\/threatmodelin g\/default.aspx.  Microsoft Threat Analysis and Modeling Tool http:\/\/msdn.microsoft.com\/security\/securecode\/threatmodelin g\/default.aspx."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1975.9939"},{"key":"e_1_3_2_1_8_1","unstructured":"Secure Software Engineering Seminar website http:\/\/www.nku.edu\/~waldenj 1\/classes\/2006\/spring\/csc593\/.  Secure Software Engineering Seminar website http:\/\/www.nku.edu\/~waldenj 1\/classes\/2006\/spring\/csc593\/."},{"volume-title":"Microsoft Press","year":"2004","author":"Swiderski F.","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","unstructured":"The Open Web Application Security Project (OWASP) website http:\/\/www.owasp.org\/index.jsp.  The Open Web Application Security Project (OWASP) website http:\/\/www.owasp.org\/index.jsp."},{"key":"e_1_3_2_1_11_1","unstructured":"The Open Web Application Security Project (OWASP) \"A Guide to Building Secure Web Applications and Web Services\" 2.0 Black Hat Edition 2005.  The Open Web Application Security Project (OWASP) \"A Guide to Building Secure Web Applications and Web Services\" 2.0 Black Hat Edition 2005."},{"key":"e_1_3_2_1_12_1","unstructured":"The Open Web Application Security Project (OWASP) WebGoat website http:\/\/www.owasp.org\/software\/webgoat.html.  The Open Web Application Security Project (OWASP) WebGoat website http:\/\/www.owasp.org\/software\/webgoat.html."},{"key":"e_1_3_2_1_13_1","unstructured":"The Open Web Application Security Project (OWASP) WebScarab website http:\/\/www.owasp.org\/software\/webscarab.html.  The Open Web Application Security Project (OWASP) WebScarab website http:\/\/www.owasp.org\/software\/webscarab.html."},{"volume-title":"Addison-Wesley","year":"2001","author":"Viega J.","key":"e_1_3_2_1_14_1"}],"event":{"name":"InfoSecCD06: 2006 Information Security Curriculum Development Conference","acronym":"InfoSecCD06","location":"Kennesaw Georgia"},"container-title":["Proceedings of the 3rd annual conference on Information security curriculum development"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1231047.1231052","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1231047.1231052","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:51:53Z","timestamp":1750258313000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1231047.1231052"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,9,22]]},"references-count":14,"alternative-id":["10.1145\/1231047.1231052","10.1145\/1231047"],"URL":"https:\/\/doi.org\/10.1145\/1231047.1231052","relation":{},"subject":[],"published":{"date-parts":[[2006,9,22]]},"assertion":[{"value":"2006-09-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}