A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is
In this research paper, authors designed a new methodology which is termed as "A Hybrid Technique for software code clone detection by using Token Based and Line Based Approach" (HTSCCDUToL i A) whose ... Type 1, Type 2 and Type 3 clones etc. This newly designed methodology working is based on two different types of software cloning approaches viz. Line based Approach and Token Based Approach. ... Heejo Lee and Hakjoo Oh, "A Scalable Approach for Vulnerable Code Clone Discovery", IEEE Symposium on Security & Privacy", Korea University, 2017, Korea.  Sukhpreet Kaur and Manpreet Kaur," Code Clone ...doi:10.26483/ijarcs.v9i2.5568 fatcat:vakhsih2u5cnrpouij3e7iyaza
Maxine Garcia from Edanz Group (https://en-author-services.edanz.com/ac) for editing a draft of this manuscript. ... Yujie Gu and all the reviewers for their helpful advice on this manuscript. We thank Dr. ...  proposed a scalable approach called VUDDY for code clone vulnerability detection. ...doi:10.1109/access.2021.3065872 fatcat:fh6ysdrcqvawpay6s767i3na2u
If a bug is identified in one segment of code, all the similar segments need to be checked for the same bug. ... Therefore, in this paper, we comprehensively inspect the latest tools and techniques utilized for the detection of code clones. ...  present Vuddy, a scalable approach for vulnerable code clone discovery. ...doi:10.1109/access.2019.2918202 fatcat:yffzco4o6jdgllswhd6m6j444e
Then, inspired by our study, we propose the first automated approach, named TRACER, to find patches for an OSS vulnerability from multiple sources. ... Our extensive evaluation has indicated that i) TRACER finds patches for up to 273.8% more CVEs than existing heuristic-based approaches while achieving a significantly higher F1-score by up to 116.8%; ... Oh, “Vuddy: A scalable approach 29th ACM SIGSOFT International Symposium on Software Testing and for vulnerable code clone discovery,” in Proceedings of the IEEE Analysis, 2020 ...arXiv:2112.02240v1 fatcat:cdvmcmzrgjhxjlpmrahle3eoa4