Research Article
Flow Chart Generation-Based Source Code Similarity Detection Using Process Mining
Figure 2
An example of code obfuscation.(a) Source code, (b) source code flow chart, (c) obfuscated code, and (d) obfuscated code flow chart.
| (a) |
| (b) |
| (c) |
| (d) |