|
6 | 6 | "title": "Key words for use in RFCs to Indicate Requirement Levels",
|
7 | 7 | "issued": {"date-parts": [[1997]]},
|
8 | 8 | "author": [{"given": "Scott", "family": "Bradner"}]
|
9 |
| -}, |
10 |
| -{ |
11 |
| - "type": "webpage", |
12 |
| - "standard_citation": "url:https://opensource.org/osd", |
13 |
| - "URL": "https://opensource.org/osd", |
14 |
| - "title": "The Open Source Definition, URL: https://opensource.org/osd", |
15 |
| - "author": [{"literal": "Open Source Initiative"}] |
16 |
| -}, |
17 |
| -{ |
18 |
| - "type": "webpage", |
19 |
| - "standard_citation": "url:https://opensource.org/licenses", |
20 |
| - "URL": "https://opensource.org/licenses", |
21 |
| - "title": "Licenses & Standards, URL: https://opensource.org/licenses", |
22 |
| - "author": [{"literal": "Open Source Initiative"}] |
23 |
| -}, |
24 |
| -{ |
25 |
| - "type": "webpage", |
26 |
| - "standard_citation": "url:https://semver.org", |
27 |
| - "URL": "https://semver.org", |
28 |
| - "title": "Semantic Versioning 2.0.0, URL: https://semver.org", |
29 |
| - "author": [{"given": "Tom", "family": "Preston-Werner"}] |
30 |
| -}, |
31 |
| -{ |
32 |
| - "type": "webpage", |
33 |
| - "standard_citation": "url:https://www.owasp.org/images/0/08/OWASP_SCP_Quick_Reference_Guide_v2.pdf", |
34 |
| - "URL": "https://www.owasp.org/images/0/08/OWASP_SCP_Quick_Reference_Guide_v2.pdf", |
35 |
| - "title": "OWASP Secure Coding Practices, Quick Reference Guide, URL: https://www.owasp.org/images/0/08/OWASP_SCP_Quick_Reference_Guide_v2.pdf", |
36 |
| - "issued": {"date-parts": [[2010]]}, |
37 |
| - "author": [{"literal": "The OWASP Foundation"}] |
38 |
| -}, |
39 |
| -{ |
40 |
| - "type": "webpage", |
41 |
| - "standard_citation": "url:https://www.owasp.org/index.php/Source_Code_Analysis_Tools", |
42 |
| - "URL": "https://www.owasp.org/index.php/Source_Code_Analysis_Tools", |
43 |
| - "title": "Source Code Analysis Tools, URL: https://www.owasp.org/index.php/Source_Code_Analysis_Tools", |
44 |
| - "issued": {"date-parts": [[2008]]}, |
45 |
| - "author": [{"literal": "The OWASP Foundation"}] |
46 |
| -}, |
47 |
| -{ |
48 |
| - "type": "webpage", |
49 |
| - "standard_citation": "url:https://www.owasp.org/index.php/Category:Vulnerability_Scanning_Tools", |
50 |
| - "URL": "https://www.owasp.org/index.php/Category:Vulnerability_Scanning_Tools", |
51 |
| - "title": "Dynamic Application Security Testing, URL: https://www.owasp.org/index.php/Category:Vulnerability_Scanning_Tools", |
52 |
| - "issued": {"date-parts": [[2008]]}, |
53 |
| - "author": [{"literal": "The OWASP Foundation"}] |
54 |
| -}, |
55 |
| -{ |
56 |
| - "type": "webpage", |
57 |
| - "standard_citation": "url:https://www.owasp.org/images/2/2e/OWASP_Code_Review_Guide-V1_1.pdf", |
58 |
| - "URL": "https://www.owasp.org/images/2/2e/OWASP_Code_Review_Guide-V1_1.pdf", |
59 |
| - "title": "OWASP Code Review Guide, URL: https://www.owasp.org/images/2/2e/OWASP_Code_Review_Guide-V1_1.pdf", |
60 |
| - "issued": {"date-parts": [[2008]]}, |
61 |
| - "author": [{"literal": "The OWASP Foundation"}]}, |
62 |
| -{ |
63 |
| - "type":"article-journal", |
64 |
| - "publisher":"PeerJ", |
65 |
| - "DOI":"10.7717/peerj-cs.86", |
66 |
| - "page":"e86", |
67 |
| - "source":"Crossref", |
68 |
| - "title":"Software citation principles", |
69 |
| - "volume":2, |
70 |
| - "author":[ |
71 |
| - { |
72 |
| - "ORCID":"http://orcid.org/0000-0002-3957-2474", |
73 |
| - "authenticated-orcid":true, |
74 |
| - "given":"Arfon M.", |
75 |
| - "family":"Smith", |
76 |
| - "sequence":"first", |
77 |
| - "affiliation":[{"name":"GitHub, Inc., San Francisco, California, United States"}] |
78 |
| - }, |
79 |
| - { |
80 |
| - "ORCID":"http://orcid.org/0000-0001-5934-7525", |
81 |
| - "authenticated-orcid":true, |
82 |
| - "given":"Daniel S.", |
83 |
| - "family":"Katz", |
84 |
| - "sequence":"additional", |
85 |
| - "affiliation":[{"name":"National Center for Supercomputing Applications & Electrical and Computer Engineering Department & School of Information Sciences, University of Illinois at Urbana-Champaign, Urbana, Illinois, United States"}] |
86 |
| - }, |
87 |
| - { |
88 |
| - "ORCID":"http://orcid.org/0000-0003-4425-7097", |
89 |
| - "authenticated-orcid":true, |
90 |
| - "given":"Kyle E.", |
91 |
| - "family":"Niemeyer", |
92 |
| - "sequence":"additional", |
93 |
| - "affiliation":[{"name": "School of Mechanical, Industrial, and Manufacturing Engineering, Oregon State University, Corvallis, Oregon, United States"}]} |
94 |
| - ], |
95 |
| - "container-title":"PeerJ Computer Science", |
96 |
| - "language":"en", |
97 |
| - "issued":{"date-parts":[[2016,9,19]]}, |
98 |
| - "standard_citation":"url:http://dx.doi.org/10.7717/peerj-cs.86", |
99 |
| - "URL":"http://dx.doi.org/10.7717/peerj-cs.86", |
100 |
| - "ISSN":"2376-5992", |
101 |
| - "id":"temp_id_7660989779236345" |
102 | 9 | }
|
103 | 10 | ]
|
0 commit comments