An approach to clone detection in sequence diagrams and its application to security analysis.
Manar H. AlalfiElizabeth P. AntonyJames R. CordyPublished in: Softw. Syst. Model. (2018)
Keyphrases
- security analysis
- sequence diagrams
- clone detection
- linux kernel
- petri net
- string matching
- security requirements
- software reuse
- smart card
- public key
- intermediate representation
- software systems
- encryption scheme
- test cases
- regression testing
- dependency graph
- artificial intelligence
- source code
- query processing
- multi agent