Fig. 6From: Adaptive security monitoring for next-generation routersSoftware diversity illustration: different instruction sequences for the same protocol - version 2 [28]Back to article page