Securing a Deployment Pipeline | IEEE Conference Publication | IEEE Xplore