Open-source tools and benchmarks for code-clone detection: past, present, and future trends

A Walker, T Cerny, E Song - ACM SIGAPP Applied Computing Review, 2020 - dl.acm.org
A fragment of source code that is identical or similar to another is a code-clone. Code-clones
make it difficult to maintain applications as they create multiple points within the code that …

Detection and classification of malicious JavaScript via attack behavior modelling

Y Xue, J Wang, Y Liu, H Xiao, J Sun… - Proceedings of the …, 2015 - dl.acm.org
Existing malicious JavaScript (JS) detection tools and commercial anti-virus tools mostly use
feature-based or signature-based approaches to detect JS malware. These tools are weak …

A study of different distance metrics in the TOPSIS method

B Kizielewicz, J Więckowski, J Wątrobski - … of the 13th KES-IDT 2021 …, 2021 - Springer
To improve the decision-making process, more and more systems are being developed
based on a group of multi-criteria decision analysis (MCDA) methods. Each method is based …

Phishing kits source code similarity distribution: A case study

E Merlo, M Margier, GV Jourdan… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
Attackers (“phishers”) typically deploy source code in some host website to impersonate a
brand or in general a situation in which a user is expected to provide some personal …

Uncovering access control weaknesses and flaws with security-discordant software clones

F Gauthier, T Lavoie, E Merlo - Proceedings of the 29th annual computer …, 2013 - dl.acm.org
Software clone detection techniques identify fragments of code that share some level of
syntactic similarity. In this study, we investigate security-sensitive clone clusters: clusters of …

Capacity of unmanned aerial vehicle assisted data collection in wireless sensor networks

Z Wei, Q Chen, S Liu, H Wu - IEEE Access, 2020 - ieeexplore.ieee.org
Due to the flexibility and mobility, unmanned aerial vehicle (UAV) can work as a movable
sink to receive the data collected by sensors in wireless sensor networks (WSNs). This …

Inferring repository file structure modifications using nearest-neighbor clone detection

T Lavoie, F Khomh, E Merlo… - 2012 19th Working …, 2012 - ieeexplore.ieee.org
During the re-engineering of legacy software systems, a good knowledge of the history of
past modifications on the system is important to recover the design of the system and …

Automatic on-orbit geometric calibration framework for geostationary optical satellite imagery using open access data

Y Dong, D Fan, Q Ma, S Ji, H Ouyang - International Journal of …, 2019 - Taylor & Francis
Due to a variety of factors, long-term on-orbit geometric calibrations must be performed on
the geostationary optical satellite to meet the subsequent high-precision geometric …

Assessing lexical similarity between short sentences of source code based on granularity

H Kaur, R Maini - International Journal of Information Technology, 2019 - Springer
Detecting similarity between two source code bases or inside one code base has many
applications in the area of plagiarism detection and reused code which is manageable for …

A case study of TTCN-3 test scripts clone analysis in an industrial telecommunication setting

T Lavoie, M Mérineau, E Merlo, P Potvin - Information and Software …, 2017 - Elsevier
Context: This paper presents a novel experiment focused on detecting and analyzing clones
in test suites written in TTCN-3, a standard telecommunication test script language, for …