Fig. 4From: Adaptive security monitoring for next-generation routersSample software diversity in C: copying a string version 2Back to article page