Toward a Research Software Security Maturity Model. Heiland,  R., Thomas,  B., Welch,  V., & Jackson,  C. arXiv preprint arXiv:1309.1677, 2013.  bibtex   @article{
 title = {Toward a Research Software Security Maturity Model},
 type = {article},
 year = {2013},
 id = {e37f84c4-4309-3e1d-a3a7-41694dbc8458},
 created = {2017-12-18T21:44:02.666Z},
 file_attached = {false},
 profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d},
 last_modified = {2018-03-12T19:03:10.770Z},
 read = {false},
 starred = {false},
 authored = {true},
 confirmed = {true},
 hidden = {false},
 citation_key = {Heiland2013},
 source_type = {JOUR},
 folder_uuids = {f285719c-254b-42e8-a6fb-527e7c80488b},
 private_publication = {false},
 bibtype = {article},
 author = {Heiland, Randy and Thomas, Betsy and Welch, Von and Jackson, Craig},
 journal = {arXiv preprint arXiv:1309.1677}
} 
Downloads: 0
{"_id":"kKiK9BB3bBDi7uWRv","bibbaseid":"heiland-thomas-welch-jackson-towardaresearchsoftwaresecuritymaturitymodel-2013","downloads":0,"creationDate":"2018-03-12T18:07:03.553Z","title":"Toward a Research Software Security Maturity Model","author_short":["Heiland,  R.","Thomas,  B.","Welch,  V.","Jackson,  C."],"year":2013,"bibtype":"article","biburl":"https://bibbase.org/service/mendeley/42d295c0-0737-38d6-8b43-508cab6ea85d","bibdata":{"title":"Toward a Research Software Security Maturity Model","type":"article","year":"2013","id":"e37f84c4-4309-3e1d-a3a7-41694dbc8458","created":"2017-12-18T21:44:02.666Z","file_attached":false,"profile_id":"42d295c0-0737-38d6-8b43-508cab6ea85d","last_modified":"2018-03-12T19:03:10.770Z","read":false,"starred":false,"authored":"true","confirmed":"true","hidden":false,"citation_key":"Heiland2013","source_type":"JOUR","folder_uuids":"f285719c-254b-42e8-a6fb-527e7c80488b","private_publication":false,"bibtype":"article","author":"Heiland, Randy and Thomas, Betsy and Welch, Von and Jackson, Craig","journal":"arXiv preprint arXiv:1309.1677","bibtex":"@article{\n title = {Toward a Research Software Security Maturity Model},\n type = {article},\n year = {2013},\n id = {e37f84c4-4309-3e1d-a3a7-41694dbc8458},\n created = {2017-12-18T21:44:02.666Z},\n file_attached = {false},\n profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d},\n last_modified = {2018-03-12T19:03:10.770Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Heiland2013},\n source_type = {JOUR},\n folder_uuids = {f285719c-254b-42e8-a6fb-527e7c80488b},\n private_publication = {false},\n bibtype = {article},\n author = {Heiland, Randy and Thomas, Betsy and Welch, Von and Jackson, Craig},\n journal = {arXiv preprint arXiv:1309.1677}\n}","author_short":["Heiland,  R.","Thomas,  B.","Welch,  V.","Jackson,  C."],"biburl":"https://bibbase.org/service/mendeley/42d295c0-0737-38d6-8b43-508cab6ea85d","bibbaseid":"heiland-thomas-welch-jackson-towardaresearchsoftwaresecuritymaturitymodel-2013","role":"author","urls":{},"metadata":{"authorlinks":{}},"downloads":0},"search_terms":["toward","research","software","security","maturity","model","heiland","thomas","welch","jackson"],"keywords":[],"authorIDs":[],"dataSources":["zgahneP4uAjKbudrQ","ya2CyA73rpZseyrZ8","2252seNhipfTmjEBQ"]}