Research Article

Modelling Features-Based Birthmarks for Security of End-to-End Communication System

Figure 1

Software features and their subfeatures.