{"id":"https://openalex.org/W2489065509","doi":"https://doi.org/10.1109/mipro.2016.7522272","title":"Systems and software assurance \u2014 A model Cyber Security course","display_name":"Systems and software assurance \u2014 A model Cyber Security course","publication_year":2016,"publication_date":"2016-05-01","ids":{"openalex":"https://openalex.org/W2489065509","doi":"https://doi.org/10.1109/mipro.2016.7522272","mag":"2489065509"},"language":"en","primary_location":{"id":"doi:10.1109/mipro.2016.7522272","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mipro.2016.7522272","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 39th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5064353476","display_name":"Vladan Jovanovi\u0107","orcid":"https://orcid.org/0000-0002-3512-5001"},"institutions":[{"id":"https://openalex.org/I39815113","display_name":"Georgia Southern University","ror":"https://ror.org/04agmb972","country_code":"US","type":"education","lineage":["https://openalex.org/I39815113"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"V. Jovanovic","raw_affiliation_strings":["Computer Sciences Department, Georgia Southern University, Statesboro, USA"],"affiliations":[{"raw_affiliation_string":"Computer Sciences Department, Georgia Southern University, Statesboro, USA","institution_ids":["https://openalex.org/I39815113"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5109985508","display_name":"James Harris","orcid":null},"institutions":[{"id":"https://openalex.org/I39815113","display_name":"Georgia Southern University","ror":"https://ror.org/04agmb972","country_code":"US","type":"education","lineage":["https://openalex.org/I39815113"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"J. K. Harris","raw_affiliation_strings":["Computer Sciences Department, Georgia Southern University, Statesboro, USA"],"affiliations":[{"raw_affiliation_string":"Computer Sciences Department, Georgia Southern University, Statesboro, USA","institution_ids":["https://openalex.org/I39815113"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5064353476"],"corresponding_institution_ids":["https://openalex.org/I39815113"],"apc_list":null,"apc_paid":null,"fwci":1.327,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.86033931,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":"4","issue":null,"first_page":"923","last_page":"927"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13295","display_name":"Safety Systems Engineering in Autonomy","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/2213","display_name":"Safety, Risk, Reliability and Quality"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.7001691460609436},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6235336065292358},{"id":"https://openalex.org/keywords/certification","display_name":"Certification","score":0.5846419930458069},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.5808775424957275},{"id":"https://openalex.org/keywords/certified-information-systems-security-professional","display_name":"Certified Information Systems Security Professional","score":0.5499366521835327},{"id":"https://openalex.org/keywords/information-assurance","display_name":"Information assurance","score":0.5392379760742188},{"id":"https://openalex.org/keywords/engineering-management","display_name":"Engineering management","score":0.5035869479179382},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.48170238733291626},{"id":"https://openalex.org/keywords/software-development-process","display_name":"Software development process","score":0.429115355014801},{"id":"https://openalex.org/keywords/capability-maturity-model-integration","display_name":"Capability Maturity Model Integration","score":0.4135562777519226},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.3893621861934662},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.356869637966156},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.25580307841300964},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.24955403804779053},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.2155502736568451},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10398736596107483}],"concepts":[{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.7001691460609436},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6235336065292358},{"id":"https://openalex.org/C46304622","wikidata":"https://www.wikidata.org/wiki/Q374814","display_name":"Certification","level":2,"score":0.5846419930458069},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.5808775424957275},{"id":"https://openalex.org/C169537543","wikidata":"https://www.wikidata.org/wiki/Q1056312","display_name":"Certified Information Systems Security Professional","level":5,"score":0.5499366521835327},{"id":"https://openalex.org/C2780795517","wikidata":"https://www.wikidata.org/wiki/Q6030997","display_name":"Information assurance","level":3,"score":0.5392379760742188},{"id":"https://openalex.org/C110354214","wikidata":"https://www.wikidata.org/wiki/Q6314146","display_name":"Engineering management","level":1,"score":0.5035869479179382},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.48170238733291626},{"id":"https://openalex.org/C180152950","wikidata":"https://www.wikidata.org/wiki/Q2904257","display_name":"Software development process","level":4,"score":0.429115355014801},{"id":"https://openalex.org/C182406803","wikidata":"https://www.wikidata.org/wiki/Q428361","display_name":"Capability Maturity Model Integration","level":5,"score":0.4135562777519226},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.3893621861934662},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.356869637966156},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.25580307841300964},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.24955403804779053},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.2155502736568451},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10398736596107483},{"id":"https://openalex.org/C117110713","wikidata":"https://www.wikidata.org/wiki/Q3394676","display_name":"Network security policy","level":4,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/mipro.2016.7522272","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mipro.2016.7522272","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 39th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.49000000953674316,"display_name":"Responsible consumption and production","id":"https://metadata.un.org/sdg/12"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W580740044","https://openalex.org/W588383646","https://openalex.org/W1540128794","https://openalex.org/W2015004885","https://openalex.org/W2034505557","https://openalex.org/W2062583740","https://openalex.org/W2072022686","https://openalex.org/W2533632459","https://openalex.org/W4205192141","https://openalex.org/W4230431416","https://openalex.org/W4234305476","https://openalex.org/W4236250034","https://openalex.org/W4253735918","https://openalex.org/W6632472795","https://openalex.org/W6816646562","https://openalex.org/W6996496787"],"related_works":["https://openalex.org/W2181836895","https://openalex.org/W2126565110","https://openalex.org/W95670554","https://openalex.org/W2620669617","https://openalex.org/W1591068956","https://openalex.org/W2053934721","https://openalex.org/W2128220755","https://openalex.org/W2153984519","https://openalex.org/W2621764726","https://openalex.org/W2378226372"],"abstract_inverted_index":{"In":[0],"this":[1,148],"paper":[2],"we":[3],"present":[4],"a":[5,30,130,136],"model":[6],"Cyber":[7,114],"Security":[8,81,90,103,115,159],"course":[9,26,66,95,149],"primarily":[10,55],"designed":[11],"to":[12,34,68],"address":[13],"the":[14,36,40,57,69,79,87,113,118,145,152],"educational":[15],"and":[16,52,60,86,135,160],"training":[17],"needs":[18],"for":[19,49,76,158],"developing":[20],"secure":[21],"software":[22],"intensive":[23],"systems.":[24],"The":[25,65,94],"is":[27,97],"designed,":[28],"within":[29],"Computer":[31],"Science":[32],"curriculum,":[33],"satisfy":[35],"national":[37],"requirements":[38],"of":[39,72,123,139,154,162],"Information":[41,89],"Assurance":[42,156],"Workforce":[43],"Improvement":[44],"Program":[45],"(per":[46],"DoD8570.01-Mfrom":[47],"11.10.2015),":[48],"Tiers":[50],"II":[51],"III":[53],"jobs,":[54],"in":[56],"Systems":[58],"Architecture":[59,104],"Engineering":[61,91],"(IASAE)":[62],"specialty":[63],"areas.":[64],"maps":[67],"knowledge":[70],"bases":[71],"two":[73],"approved":[74],"Certifications":[75],"IASAE,":[77],"namely":[78],"Certified":[80,88],"Software":[82,163,169],"Lifecycle":[83],"Professional":[84,92],"(CSSLP)":[85],"(ISSEP).":[93],"content":[96],"focused":[98],"on":[99,112],"four":[100],"key":[101],"elements:":[102],"Analysis":[105,173],"with":[106],"Treat":[107],"Modeling,":[108],"Risk":[109],"Assessment":[110],"based":[111],"Framework":[116],"(and":[117],"NIST":[119],"SP":[120],"800":[121],"series":[122],"guidelines),":[124],"Secure":[125,140],"Development":[126],"Life":[127],"Cycle":[128],"under":[129],"process":[131],"improvement":[132],"framework":[133],"CMMI,":[134],"standardized":[137],"set":[138],"Coding":[141],"best":[142],"practices.":[143],"At":[144],"graduate":[146],"level,":[147],"also":[150],"addresses":[151],"making":[153],"formal":[155],"Cases":[157],"Safety":[161],"Intensive":[164],"Systems,":[165],"as":[166,168],"well":[167],"Failure":[170],"Mode":[171],"Effect":[172],"(FMEA).":[174]},"counts_by_year":[{"year":2018,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
