A First Look into Software Security Practices in Bangladesh. Shrestha, A., Sharma, T., Saha, P., Ahmed, S. I., & Al-Ameen, M. N. ACM J. Comput. Sustain. Soc., 1(1):8:1–8:24, 2023.
Paper doi bibtex @article{shrestha_first_2023,
title = {A {First} {Look} into {Software} {Security} {Practices} in {Bangladesh}},
volume = {1},
url = {https://doi.org/10.1145/3616383},
doi = {10.1145/3616383},
number = {1},
journal = {ACM J. Comput. Sustain. Soc.},
author = {Shrestha, Ankit and Sharma, Tanusree and Saha, Pratyasha and Ahmed, Syed Ishtiaque and Al-Ameen, Mahdi Nasrullah},
year = {2023},
pages = {8:1--8:24},
}
Downloads: 0
{"_id":"mYDBZ94sjEdGYh6Jq","bibbaseid":"shrestha-sharma-saha-ahmed-alameen-afirstlookintosoftwaresecuritypracticesinbangladesh-2023","author_short":["Shrestha, A.","Sharma, T.","Saha, P.","Ahmed, S. I.","Al-Ameen, M. N."],"bibdata":{"bibtype":"article","type":"article","title":"A First Look into Software Security Practices in Bangladesh","volume":"1","url":"https://doi.org/10.1145/3616383","doi":"10.1145/3616383","number":"1","journal":"ACM J. Comput. Sustain. Soc.","author":[{"propositions":[],"lastnames":["Shrestha"],"firstnames":["Ankit"],"suffixes":[]},{"propositions":[],"lastnames":["Sharma"],"firstnames":["Tanusree"],"suffixes":[]},{"propositions":[],"lastnames":["Saha"],"firstnames":["Pratyasha"],"suffixes":[]},{"propositions":[],"lastnames":["Ahmed"],"firstnames":["Syed","Ishtiaque"],"suffixes":[]},{"propositions":[],"lastnames":["Al-Ameen"],"firstnames":["Mahdi","Nasrullah"],"suffixes":[]}],"year":"2023","pages":"8:1–8:24","bibtex":"@article{shrestha_first_2023,\n\ttitle = {A {First} {Look} into {Software} {Security} {Practices} in {Bangladesh}},\n\tvolume = {1},\n\turl = {https://doi.org/10.1145/3616383},\n\tdoi = {10.1145/3616383},\n\tnumber = {1},\n\tjournal = {ACM J. Comput. Sustain. Soc.},\n\tauthor = {Shrestha, Ankit and Sharma, Tanusree and Saha, Pratyasha and Ahmed, Syed Ishtiaque and Al-Ameen, Mahdi Nasrullah},\n\tyear = {2023},\n\tpages = {8:1--8:24},\n}\n\n\n\n","author_short":["Shrestha, A.","Sharma, T.","Saha, P.","Ahmed, S. I.","Al-Ameen, M. N."],"key":"shrestha_first_2023","id":"shrestha_first_2023","bibbaseid":"shrestha-sharma-saha-ahmed-alameen-afirstlookintosoftwaresecuritypracticesinbangladesh-2023","role":"author","urls":{"Paper":"https://doi.org/10.1145/3616383"},"metadata":{"authorlinks":{}}},"bibtype":"article","biburl":"https://bibbase.org/zotero-group/meghnaravikumar/6002600","dataSources":["6ZntABukGCcPP7d5R","SF4xy4zpFdtzauNky"],"keywords":[],"search_terms":["first","look","software","security","practices","bangladesh","shrestha","sharma","saha","ahmed","al-ameen"],"title":"A First Look into Software Security Practices in Bangladesh","year":2023}