Fig. 9From: Towards the application of recommender systems to secure codingFinding safe code that is most similar to the user’s codeBack to article page