M. Bishop, J. Dai, M. Dark, I. Ngambeki, P. Nico et al., Evaluating secure programming knowledge, IFIP World Conference on Information Security Education, pp.51-62, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01690973

K. Chandrasekar, G. Cleary, O. Cox, and B. Gorman, , 2017.

H. Chi, E. L. Jones, and J. Brown, Teaching Secure Coding Practices to STEM Students, Proceedings of the 2013 on InfoSecCD '13 Information Security Curriculum Development Conference -InfoS-ecCD '13 pp, pp.42-48, 2013.

S. Chung, L. Hansel, Y. Bai, E. Moore, C. Taylor et al., What approaches work best for teaching secure coding practices?, HUIC Education & STEM Conference, 2014.

A. Conklin and G. White, A graduate level assessment course: A model for safe vulnerability assessments, Proceedings of the 9th Colloquium for Information Systems Security Education, vol.6, 2005.

M. Dark, I. Ngambeki, M. Bishop, and S. Belcher, A Secure Programming Clinic! Proceeding of the 19th Colloquium for Information System Security Education, 2015.

M. Dark, L. Stuart, I. Ngambeki, and M. Bishop, Effect of the secure programming clinic on learners' secure programming practices, Journal of The Colloquium for Information System Security Education, vol.4, pp.18-18, 2016.

G. Deepa and P. S. Thilagam, Securing web applications from injection and logic vulnerabilities: Approaches and challenges, Information and Software Technology, vol.74, pp.160-180, 2016.

T. P. Florian and J. P. Zimmerman, Understanding by Design , Moodle , and Blended Learning : A Secondary School Case Study, MERLOT Journal of Online Learning and Teaching, vol.11, issue.1, pp.120-128, 2015.

X. Li and Y. Xue, A survey on server-side approaches to securing web applications, ACM Computing Surveys (CSUR), vol.46, issue.4, p.54, 2014.

B. Lunt, M. Sabin, A. Hala, J. Impagliazzo, and M. Zhang, Information Technology Curricula, 2017.

B. M. Lunt, J. J. Ekstrom, and E. Lawson, Curriculum guidelines for undergraduate degree programs in Information Technology, 2008.

V. S. Mdunyelwa, J. F. Niekerk, and L. A. Futcher, Secure coding practices in the software development capstone projects, Eleventh International Symposium on Human Aspects of Information Security & Assurance, HAISA 2017, pp.282-291, 2017.

, OWASP: OWASP Top, vol.10, 2017.

, Towards information security behavioural compliance, OWASP: The OWASP Foundation, vol.23, pp.191-198, 2004.

J. Zhu, J. Xie, H. R. Lipford, and B. Chu, Supporting secure programming in web applications through interactive static analysis, Journal of Advanced Research, vol.5, issue.4, pp.449-462, 2014.