Latest version: v0.2.3
The information on this page was curated by experts in our Cybersecurity Intelligence Team.
Simulation of rooted phylogenetic trees under a given Multi-Type Birth–Death model (with or without Contact Tracing).
No known vulnerabilities found
Has known vulnerabilities