Fig. 3From: Adaptive security monitoring for next-generation routersSample software diversity in C: copying a string version 1Back to article page