Toward a Research Software Security Maturity Model. Heiland, R., Thomas, B., Welch, V., & Jackson, C. arXiv preprint arXiv:1309.1677, 2013. bibtex @article{
title = {Toward a Research Software Security Maturity Model},
type = {article},
year = {2013},
id = {e37f84c4-4309-3e1d-a3a7-41694dbc8458},
created = {2017-12-18T21:44:02.666Z},
file_attached = {false},
profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d},
last_modified = {2018-03-12T19:03:10.770Z},
read = {false},
starred = {false},
authored = {true},
confirmed = {true},
hidden = {false},
citation_key = {Heiland2013},
source_type = {JOUR},
folder_uuids = {f285719c-254b-42e8-a6fb-527e7c80488b},
private_publication = {false},
bibtype = {article},
author = {Heiland, Randy and Thomas, Betsy and Welch, Von and Jackson, Craig},
journal = {arXiv preprint arXiv:1309.1677}
}
Downloads: 0
{"_id":"kKiK9BB3bBDi7uWRv","bibbaseid":"heiland-thomas-welch-jackson-towardaresearchsoftwaresecuritymaturitymodel-2013","downloads":0,"creationDate":"2018-03-12T18:07:03.553Z","title":"Toward a Research Software Security Maturity Model","author_short":["Heiland, R.","Thomas, B.","Welch, V.","Jackson, C."],"year":2013,"bibtype":"article","biburl":"https://bibbase.org/service/mendeley/42d295c0-0737-38d6-8b43-508cab6ea85d","bibdata":{"title":"Toward a Research Software Security Maturity Model","type":"article","year":"2013","id":"e37f84c4-4309-3e1d-a3a7-41694dbc8458","created":"2017-12-18T21:44:02.666Z","file_attached":false,"profile_id":"42d295c0-0737-38d6-8b43-508cab6ea85d","last_modified":"2018-03-12T19:03:10.770Z","read":false,"starred":false,"authored":"true","confirmed":"true","hidden":false,"citation_key":"Heiland2013","source_type":"JOUR","folder_uuids":"f285719c-254b-42e8-a6fb-527e7c80488b","private_publication":false,"bibtype":"article","author":"Heiland, Randy and Thomas, Betsy and Welch, Von and Jackson, Craig","journal":"arXiv preprint arXiv:1309.1677","bibtex":"@article{\n title = {Toward a Research Software Security Maturity Model},\n type = {article},\n year = {2013},\n id = {e37f84c4-4309-3e1d-a3a7-41694dbc8458},\n created = {2017-12-18T21:44:02.666Z},\n file_attached = {false},\n profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d},\n last_modified = {2018-03-12T19:03:10.770Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Heiland2013},\n source_type = {JOUR},\n folder_uuids = {f285719c-254b-42e8-a6fb-527e7c80488b},\n private_publication = {false},\n bibtype = {article},\n author = {Heiland, Randy and Thomas, Betsy and Welch, Von and Jackson, Craig},\n journal = {arXiv preprint arXiv:1309.1677}\n}","author_short":["Heiland, R.","Thomas, B.","Welch, V.","Jackson, C."],"biburl":"https://bibbase.org/service/mendeley/42d295c0-0737-38d6-8b43-508cab6ea85d","bibbaseid":"heiland-thomas-welch-jackson-towardaresearchsoftwaresecuritymaturitymodel-2013","role":"author","urls":{},"metadata":{"authorlinks":{}},"downloads":0},"search_terms":["toward","research","software","security","maturity","model","heiland","thomas","welch","jackson"],"keywords":[],"authorIDs":[],"dataSources":["zgahneP4uAjKbudrQ","ya2CyA73rpZseyrZ8","2252seNhipfTmjEBQ"]}