Fig. 1From: Towards the application of recommender systems to secure codingSystem architectureBack to article page