Understanding developer security archetypes

Files in this item

This item appears in the following Collection(s)

This accepted manuscript is licensed under a Creative Commons Attribution 4.0 License; Copyright published version: © 2021 IEEE Except where otherwise noted, this item's license is described as This accepted manuscript is licensed under a Creative Commons Attribution 4.0 License; Copyright published version: © 2021 IEEE
This website uses cookies. By using this website, you consent to the use of cookies in accordance with the UCC Privacy and Cookies Statement. For more information about cookies and how you can disable them, visit our Privacy and Cookies statement