An approach to clone detection in sequence diagrams and its application to security analysis. Alalfi, M. H., Antony, E. P., & Cordy, J. R. Softw. Syst. Model., 17(4):1287–1309, 2018. Paper doi bibtex 1 download @article{DBLP:journals/sosym/AlalfiAC18,
author = {Manar H. Alalfi and
Elizabeth P. Antony and
James R. Cordy},
title = {An approach to clone detection in sequence diagrams and its application
to security analysis},
journal = {Softw. Syst. Model.},
volume = {17},
number = {4},
pages = {1287--1309},
year = {2018},
url = {https://doi.org/10.1007/s10270-016-0557-6},
doi = {10.1007/S10270-016-0557-6},
timestamp = {Mon, 28 Aug 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/sosym/AlalfiAC18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 1
{"_id":"7MKkubv2Hq4RGGyxb","bibbaseid":"alalfi-antony-cordy-anapproachtoclonedetectioninsequencediagramsanditsapplicationtosecurityanalysis-2018","authorIDs":["4fdK8DFhrjpifuSFR","8sk37xqL7eqWDyoKr","C5A8Tqvwg6ujKkf8g","NPMgnuNnBGNvaqQ6z","RYzxG2au8GskAksXz","ff63nmQSfuYXzAxrf","gKHoRLQbfvZ8YkBE5","jd4EhtRNHKgCr7myY","x9JwHGytBnCP2mnuZ"],"author_short":["Alalfi, M. H.","Antony, E. P.","Cordy, J. R."],"bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["Manar","H."],"propositions":[],"lastnames":["Alalfi"],"suffixes":[]},{"firstnames":["Elizabeth","P."],"propositions":[],"lastnames":["Antony"],"suffixes":[]},{"firstnames":["James","R."],"propositions":[],"lastnames":["Cordy"],"suffixes":[]}],"title":"An approach to clone detection in sequence diagrams and its application to security analysis","journal":"Softw. Syst. Model.","volume":"17","number":"4","pages":"1287–1309","year":"2018","url":"https://doi.org/10.1007/s10270-016-0557-6","doi":"10.1007/S10270-016-0557-6","timestamp":"Mon, 28 Aug 2023 01:00:00 +0200","biburl":"https://dblp.org/rec/journals/sosym/AlalfiAC18.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@article{DBLP:journals/sosym/AlalfiAC18,\n author = {Manar H. Alalfi and\n Elizabeth P. Antony and\n James R. Cordy},\n title = {An approach to clone detection in sequence diagrams and its application\n to security analysis},\n journal = {Softw. Syst. Model.},\n volume = {17},\n number = {4},\n pages = {1287--1309},\n year = {2018},\n url = {https://doi.org/10.1007/s10270-016-0557-6},\n doi = {10.1007/S10270-016-0557-6},\n timestamp = {Mon, 28 Aug 2023 01:00:00 +0200},\n biburl = {https://dblp.org/rec/journals/sosym/AlalfiAC18.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Alalfi, M. H.","Antony, E. P.","Cordy, J. R."],"key":"DBLP:journals/sosym/AlalfiAC18","id":"DBLP:journals/sosym/AlalfiAC18","bibbaseid":"alalfi-antony-cordy-anapproachtoclonedetectioninsequencediagramsanditsapplicationtosecurityanalysis-2018","role":"author","urls":{"Paper":"https://doi.org/10.1007/s10270-016-0557-6"},"metadata":{"authorlinks":{}},"downloads":1},"bibtype":"article","biburl":"https://dblp.org/pid/49/2794.bib","creationDate":"2020-03-14T22:07:38.926Z","downloads":1,"keywords":[],"search_terms":["approach","clone","detection","sequence","diagrams","application","security","analysis","alalfi","antony","cordy"],"title":"An approach to clone detection in sequence diagrams and its application to security analysis","year":2018,"dataSources":["kFhnZvM2M4gH47q7m","sruHQc7MdEddqHEe4"]}