Research Article
Flow Chart Generation-Based Source Code Similarity Detection Using Process Mining
Figure 2
An example of code obfuscation.(a) Source code, (b) source code flow chart, (c) obfuscated code, and (d) obfuscated code flow chart.
(a) |
(b) |
(c) |
(d) |