{"id":"https://openalex.org/W2968129545","doi":"https://doi.org/10.1145/3339252.3340336","title":"Learning Software Security in Context","display_name":"Learning Software Security in Context","publication_year":2019,"publication_date":"2019-08-09","ids":{"openalex":"https://openalex.org/W2968129545","doi":"https://doi.org/10.1145/3339252.3340336","mag":"2968129545"},"language":"en","primary_location":{"id":"doi:10.1145/3339252.3340336","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3339252.3340336","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 14th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5023668857","display_name":"Shao-Fang Wen","orcid":"https://orcid.org/0000-0002-6228-8367"},"institutions":[{"id":"https://openalex.org/I204778367","display_name":"Norwegian University of Science and Technology","ror":"https://ror.org/05xg72x27","country_code":"NO","type":"education","lineage":["https://openalex.org/I204778367"]}],"countries":["NO"],"is_corresponding":true,"raw_author_name":"Shao-Fang Wen","raw_affiliation_strings":["Norwegian University of Science and Technology, Gj\u00f8vik, Norway"],"affiliations":[{"raw_affiliation_string":"Norwegian University of Science and Technology, Gj\u00f8vik, Norway","institution_ids":["https://openalex.org/I204778367"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5035810461","display_name":"Basel Katt","orcid":"https://orcid.org/0000-0002-0177-9496"},"institutions":[{"id":"https://openalex.org/I204778367","display_name":"Norwegian University of Science and Technology","ror":"https://ror.org/05xg72x27","country_code":"NO","type":"education","lineage":["https://openalex.org/I204778367"]}],"countries":["NO"],"is_corresponding":false,"raw_author_name":"Basel Katt","raw_affiliation_strings":["Norwegian University of Science and Technology, Gj\u00f8vik, Norway"],"affiliations":[{"raw_affiliation_string":"Norwegian University of Science and Technology, Gj\u00f8vik, Norway","institution_ids":["https://openalex.org/I204778367"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5023668857"],"corresponding_institution_ids":["https://openalex.org/I204778367"],"apc_list":null,"apc_paid":null,"fwci":0.6783,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.77969485,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"10"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9951000213623047,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9936000108718872,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7682117223739624},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.6429164409637451},{"id":"https://openalex.org/keywords/variety","display_name":"Variety (cybernetics)","score":0.5608190298080444},{"id":"https://openalex.org/keywords/secure-coding","display_name":"Secure coding","score":0.48506560921669006},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.48100408911705017},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.4460137188434601},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.4330563545227051},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.38298845291137695},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.37200069427490234},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.34457117319107056},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.3372035622596741},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.31905341148376465},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.19652864336967468},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.18730303645133972}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7682117223739624},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.6429164409637451},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.5608190298080444},{"id":"https://openalex.org/C22680326","wikidata":"https://www.wikidata.org/wiki/Q7444867","display_name":"Secure coding","level":5,"score":0.48506560921669006},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.48100408911705017},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.4460137188434601},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.4330563545227051},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.38298845291137695},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.37200069427490234},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.34457117319107056},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.3372035622596741},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.31905341148376465},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.19652864336967468},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.18730303645133972},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3339252.3340336","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3339252.3340336","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 14th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W21639580","https://openalex.org/W183478787","https://openalex.org/W1844419451","https://openalex.org/W1985742553","https://openalex.org/W1991355288","https://openalex.org/W1997936823","https://openalex.org/W2001455257","https://openalex.org/W2009035006","https://openalex.org/W2027429247","https://openalex.org/W2045515091","https://openalex.org/W2047751831","https://openalex.org/W2049134908","https://openalex.org/W2072859596","https://openalex.org/W2078087855","https://openalex.org/W2094992363","https://openalex.org/W2099348355","https://openalex.org/W2122025961","https://openalex.org/W2129083809","https://openalex.org/W2133109597","https://openalex.org/W2164372721","https://openalex.org/W2168740635","https://openalex.org/W2251129220","https://openalex.org/W2516966498","https://openalex.org/W2529133275","https://openalex.org/W2782969241","https://openalex.org/W2800968634","https://openalex.org/W2938940497","https://openalex.org/W4205192141","https://openalex.org/W6726469920","https://openalex.org/W7025049859"],"related_works":["https://openalex.org/W2141388993","https://openalex.org/W1978034799","https://openalex.org/W2999607548","https://openalex.org/W2956597637","https://openalex.org/W2044639210","https://openalex.org/W2293245356","https://openalex.org/W23486959","https://openalex.org/W1588942021","https://openalex.org/W1981466760","https://openalex.org/W4225160120"],"abstract_inverted_index":{"Learning":[0],"software":[1,34,56,95,137,185,215],"security":[2,47,63,87,138,143,202,209],"has":[3],"become":[4],"a":[5,15,26,59,132],"complex":[6],"and":[7,25,50,89,117,145,168,207],"difficult":[8,79],"task":[9],"today":[10],"than":[11],"it":[12,30,147],"was":[13],"even":[14],"decade":[16],"ago.":[17],"With":[18],"the":[19,38,44,75,84,91,100,149,182],"increased":[20],"complexity":[21],"of":[22,28,46,62,86],"computer":[23],"systems":[24],"variety":[27,45],"applications,":[29],"is":[31,111,128,159],"hard":[32],"for":[33,80,136,213],"developers":[35,198],"to":[36,41,82,114,148],"master":[37],"expertise":[39],"required":[40,54],"deal":[42],"with":[43,93,109],"concepts,":[48],"methods,":[49],"technologies":[51],"that":[52,99,151,192],"are":[53,66,78,153],"in":[55,69,181],"projects.":[57],"Although":[58],"large":[60],"number":[61],"learning":[64,124,134,157,166,194,205],"materials":[65],"widely":[67],"available":[68],"books,":[70],"open":[71,183],"literature":[72],"or":[73],"on":[74,130,162,170],"Internet,":[76],"they":[77,152],"learners":[81,116,140],"understand":[83],"rationale":[85],"topics":[88],"correlate":[90],"concepts":[92],"real":[94],"scenarios.":[96],"We":[97],"argue":[98],"traditional":[101],"approach,":[102],"which":[103],"usually":[104],"organizes":[105],"knowledge":[106,144,210],"content":[107],"topically,":[108],"security-centric,":[110],"not":[112],"suitable":[113],"motivate":[115],"stimulate":[118],"learners'":[119],"interest.":[120],"To":[121],"tackle":[122],"this":[123,174],"issue,":[125],"our":[126,163,178],"research":[127],"focused":[129],"forging":[131],"contextualized":[133,193],"environment":[135],"where":[139],"can":[141,195],"explore":[142],"relate":[146],"context":[150],"familiar":[154],"with.":[155],"This":[156],"system":[158],"developed":[160],"base":[161],"proposed":[164],"context-based":[165],"approach":[167],"based":[169],"ontological":[171],"technologies.":[172],"In":[173],"paper,":[175],"we":[176],"present":[177],"evaluation":[179],"study":[180],"source":[184],"(OSS)":[186],"development":[187,216],"environment.":[188],"Our":[189],"results":[190],"demonstrate":[191],"help":[196],"OSS":[197],"identify":[199],"their":[200,214],"necessary":[201],"information,":[203],"improve":[204],"efficiency":[206],"make":[208],"more":[211],"meaningful":[212],"tasks":[217]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
