Research Article

Flow Chart Generation-Based Source Code Similarity Detection Using Process Mining

Figure 2

An example of code obfuscation.(a) Source code, (b) source code flow chart, (c) obfuscated code, and (d) obfuscated code flow chart.
(a)
(b)
(c)
(d)