|
4 | 4 | "standard_citation": "url:https://www.ietf.org/rfc/rfc2119.txt",
|
5 | 5 | "URL": "https://www.ietf.org/rfc/rfc2119.txt",
|
6 | 6 | "title": "Key words for use in RFCs to Indicate Requirement Levels",
|
7 |
| - "issued": { |
8 |
| - "date-parts": [ |
9 |
| - [ |
10 |
| - 1997 |
11 |
| - ] |
12 |
| - ] |
13 |
| - }, |
14 |
| - "author": [ |
15 |
| - { |
16 |
| - "given": "Scott", |
17 |
| - "family": "Bradner" |
18 |
| - } |
19 |
| - ] |
20 |
| -}, |
21 |
| -{ |
22 |
| - "type": "report", |
23 |
| - "standard_citation": "url:https://owncloud.indigo-datacloud.eu/index.php/s/yDklCrWjKnjutVA", |
24 |
| - "URL": "https://owncloud.indigo-datacloud.eu/index.php/s/yDklCrWjKnjutVA", |
25 |
| - "title": "INDIGO-DataCloud collaboration, Initial Plan for Software Management and Pilot Services", |
26 |
| - "issued": { |
27 |
| - "date-parts": [ |
28 |
| - [ |
29 |
| - 2015 |
30 |
| - ] |
31 |
| - ] |
32 |
| - }, |
33 |
| - "author": [ |
34 |
| - { |
35 |
| - "literal": "Members of the INDIGO-DataCloud collaboration" |
36 |
| - } |
37 |
| - ] |
| 7 | + "issued": {"date-parts": [[1997]]}, |
| 8 | + "author": [{"given": "Scott", "family": "Bradner"}] |
38 | 9 | },
|
39 | 10 | {
|
40 | 11 | "type": "webpage",
|
41 | 12 | "standard_citation": "url:https://opensource.org/osd",
|
42 | 13 | "URL": "https://opensource.org/osd",
|
43 | 14 | "title": "The Open Source Definition, URL: https://opensource.org/osd",
|
44 |
| - "author": [ |
45 |
| - { |
46 |
| - "literal": "Open Source Initiative" |
47 |
| - } |
48 |
| - ] |
| 15 | + "author": [{"literal": "Open Source Initiative"}] |
49 | 16 | },
|
50 | 17 | {
|
51 | 18 | "type": "webpage",
|
52 | 19 | "standard_citation": "url:https://opensource.org/licenses",
|
53 | 20 | "URL": "https://opensource.org/licenses",
|
54 | 21 | "title": "Licenses & Standards, URL: https://opensource.org/licenses",
|
55 |
| - "author": [ |
56 |
| - { |
57 |
| - "literal": "Open Source Initiative" |
58 |
| - } |
59 |
| - ] |
| 22 | + "author": [{"literal": "Open Source Initiative"}] |
60 | 23 | },
|
61 | 24 | {
|
62 | 25 | "type": "webpage",
|
63 | 26 | "standard_citation": "url:https://semver.org",
|
64 | 27 | "URL": "https://semver.org",
|
65 | 28 | "title": "Semantic Versioning 2.0.0, URL: https://semver.org",
|
66 |
| - "author": [ |
67 |
| - { |
68 |
| - "given": "Tom", |
69 |
| - "family": "Preston-Werner" |
70 |
| - } |
71 |
| - ] |
| 29 | + "author": [{"given": "Tom", "family": "Preston-Werner"}] |
72 | 30 | },
|
73 | 31 | {
|
74 | 32 | "type": "webpage",
|
75 | 33 | "standard_citation": "url:https://www.owasp.org/images/0/08/OWASP_SCP_Quick_Reference_Guide_v2.pdf",
|
76 | 34 | "URL": "https://www.owasp.org/images/0/08/OWASP_SCP_Quick_Reference_Guide_v2.pdf",
|
77 | 35 | "title": "OWASP Secure Coding Practices, Quick Reference Guide, URL: https://www.owasp.org/images/0/08/OWASP_SCP_Quick_Reference_Guide_v2.pdf",
|
78 |
| - "issued": { |
79 |
| - "date-parts": [ |
80 |
| - [ |
81 |
| - 2010 |
82 |
| - ] |
83 |
| - ] |
84 |
| - }, |
85 |
| - "author": [ |
86 |
| - { |
87 |
| - "literal": "The OWASP Foundation" |
88 |
| - } |
89 |
| - ] |
| 36 | + "issued": {"date-parts": [[2010]]}, |
| 37 | + "author": [{"literal": "The OWASP Foundation"}] |
90 | 38 | },
|
91 | 39 | {
|
92 | 40 | "type": "webpage",
|
93 | 41 | "standard_citation": "url:https://www.owasp.org/index.php/Source_Code_Analysis_Tools",
|
94 | 42 | "URL": "https://www.owasp.org/index.php/Source_Code_Analysis_Tools",
|
95 | 43 | "title": "Source Code Analysis Tools, URL: https://www.owasp.org/index.php/Source_Code_Analysis_Tools",
|
96 |
| - "author": [ |
97 |
| - { |
98 |
| - "literal": "The OWASP Foundation" |
99 |
| - } |
100 |
| - ] |
| 44 | + "issued": {"date-parts": [[2008]]}, |
| 45 | + "author": [{"literal": "The OWASP Foundation"}] |
101 | 46 | },
|
102 | 47 | {
|
103 | 48 | "type": "webpage",
|
104 | 49 | "standard_citation": "url:https://www.owasp.org/index.php/Category:Vulnerability_Scanning_Tools",
|
105 | 50 | "URL": "https://www.owasp.org/index.php/Category:Vulnerability_Scanning_Tools",
|
106 | 51 | "title": "Dynamic Application Security Testing, URL: https://www.owasp.org/index.php/Category:Vulnerability_Scanning_Tools",
|
107 |
| - "author": [ |
108 |
| - { |
109 |
| - "literal": "The OWASP Foundation" |
110 |
| - } |
111 |
| - ] |
| 52 | + "issued": {"date-parts": [[2008]]}, |
| 53 | + "author": [{"literal": "The OWASP Foundation"}] |
112 | 54 | },
|
113 | 55 | {
|
114 | 56 | "type": "webpage",
|
115 | 57 | "standard_citation": "url:https://www.owasp.org/images/2/2e/OWASP_Code_Review_Guide-V1_1.pdf",
|
116 | 58 | "URL": "https://www.owasp.org/images/2/2e/OWASP_Code_Review_Guide-V1_1.pdf",
|
117 | 59 | "title": "OWASP Code Review Guide, URL: https://www.owasp.org/images/2/2e/OWASP_Code_Review_Guide-V1_1.pdf",
|
118 |
| - "issued": { |
119 |
| - "date-parts": [ |
120 |
| - [ |
121 |
| - 2008 |
122 |
| - ] |
123 |
| - ] |
124 |
| - }, |
125 |
| - "author": [ |
126 |
| - { |
127 |
| - "literal": "The OWASP Foundation" |
128 |
| - } |
129 |
| - ] |
130 |
| -}, |
| 60 | + "issued": {"date-parts": [[2008]]}, |
| 61 | + "author": [{"literal": "The OWASP Foundation"}]}, |
131 | 62 | {
|
132 | 63 | "type":"article-journal",
|
133 | 64 | "publisher":"PeerJ",
|
|
143 | 74 | "given":"Arfon M.",
|
144 | 75 | "family":"Smith",
|
145 | 76 | "sequence":"first",
|
146 |
| - "affiliation":[ |
147 |
| - { |
148 |
| - "name":"GitHub, Inc., San Francisco, California, United States" |
149 |
| - } |
150 |
| - ] |
| 77 | + "affiliation":[{"name":"GitHub, Inc., San Francisco, California, United States"}] |
151 | 78 | },
|
152 | 79 | {
|
153 | 80 | "ORCID":"http://orcid.org/0000-0001-5934-7525",
|
154 | 81 | "authenticated-orcid":true,
|
155 | 82 | "given":"Daniel S.",
|
156 | 83 | "family":"Katz",
|
157 | 84 | "sequence":"additional",
|
158 |
| - "affiliation":[ |
159 |
| - { |
160 |
| - "name":"National Center for Supercomputing Applications & Electrical and Computer Engineering Department & School of Information Sciences, University of Illinois at Urbana-Champaign, Urbana, Illinois, United States" |
161 |
| - } |
162 |
| - ] |
| 85 | + "affiliation":[{"name":"National Center for Supercomputing Applications & Electrical and Computer Engineering Department & School of Information Sciences, University of Illinois at Urbana-Champaign, Urbana, Illinois, United States"}] |
163 | 86 | },
|
164 | 87 | {
|
165 | 88 | "ORCID":"http://orcid.org/0000-0003-4425-7097",
|
166 | 89 | "authenticated-orcid":true,
|
167 | 90 | "given":"Kyle E.",
|
168 | 91 | "family":"Niemeyer",
|
169 | 92 | "sequence":"additional",
|
170 |
| - "affiliation":[ |
171 |
| - { |
172 |
| - "name":"School of Mechanical, Industrial, and Manufacturing Engineering, Oregon State University, Corvallis, Oregon, United States" |
173 |
| - } |
174 |
| - ] |
175 |
| - } |
| 93 | + "affiliation":[{"name": "School of Mechanical, Industrial, and Manufacturing Engineering, Oregon State University, Corvallis, Oregon, United States"}]} |
176 | 94 | ],
|
177 | 95 | "container-title":"PeerJ Computer Science",
|
178 | 96 | "language":"en",
|
179 | 97 | "issued":{"date-parts":[[2016,9,19]]},
|
180 |
| - "standard_citation":"http://dx.doi.org/10.7717/peerj-cs.86", |
| 98 | + "standard_citation":"url:http://dx.doi.org/10.7717/peerj-cs.86", |
181 | 99 | "URL":"http://dx.doi.org/10.7717/peerj-cs.86",
|
182 | 100 | "ISSN":"2376-5992",
|
183 | 101 | "id":"temp_id_7660989779236345"
|
|
0 commit comments