{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T01:52:37Z","timestamp":1756000357587},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2016,9,12]],"date-time":"2016-09-12T00:00:00Z","timestamp":1473638400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Softw Syst Model"],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1007\/s10270-016-0557-6","type":"journal-article","created":{"date-parts":[[2016,9,12]],"date-time":"2016-09-12T01:50:21Z","timestamp":1473645021000},"page":"1287-1309","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["An approach to clone detection in sequence diagrams and its application to security analysis"],"prefix":"10.1007","volume":"17","author":[{"given":"Manar H.","family":"Alalfi","sequence":"first","affiliation":[]},{"given":"Elizabeth P.","family":"Antony","sequence":"additional","affiliation":[]},{"given":"James R.","family":"Cordy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,12]]},"reference":[{"key":"557_CR1","doi-asserted-by":"crossref","first-page":"258","DOI":"10.1007\/978-3-642-24485-8_19","volume":"6981","author":"B Al-Batran","year":"2011","unstructured":"Al-Batran, B., Sch\u00e4tz, B., Hummel, B.: Semantic clone detection for model-based development of embedded systems. Model Driven Eng. Lang. Syst. 6981, 258\u2013272 (2011)","journal-title":"Model Driven Eng. Lang. Syst."},{"key":"557_CR2","doi-asserted-by":"crossref","unstructured":"Alalfi, M.H., Cordy, J.R., Dean, T.R.: Automated reverse engineering of UML sequence diagrams for dynamic web applications. In: 1st International Workshop on Web Testing, WebTest 2009, pp. 287\u2013294 (2009)","DOI":"10.1109\/ICSTW.2009.8"},{"key":"557_CR3","doi-asserted-by":"crossref","unstructured":"Alalfi, M.H., Cordy, J.R., Dean, T.R.: WAFA: fine-grained dynamic analysis of web applications. In: 11th International Symposium on Web Systems Evolution, WSE 2009, pp. 41\u201350 (2009)","DOI":"10.1109\/WSE.2009.5631226"},{"key":"557_CR4","doi-asserted-by":"crossref","unstructured":"Alalfi, M.H., Cordy, J.R., Dean, T.R.: Automated verification of role-based access control security models recovered from dynamic web applications. In: 14th International Symposium on Web Systems Evolution, WSE 2012, pp. 1\u201310 (2012)","DOI":"10.1109\/WSE.2012.6320525"},{"key":"557_CR5","doi-asserted-by":"crossref","unstructured":"Alalfi, M.H., Cordy, J.R., Dean, T.R.: Recovering role-based access control security models from dynamic web applications. In: 12th International Conference on Web Engineering, ICWE 2012, pp. 121\u2013136 (2012)","DOI":"10.1007\/978-3-642-31753-8_9"},{"key":"557_CR6","doi-asserted-by":"crossref","unstructured":"Alalfi, M.H., Cordy, J.R., Dean, T.R., Stephan, M., Stevenson, A.: Models are code too: near-miss clone detection for Simulink models. In: 28th IEEE International Conference on Software Maintenance, ICSM 2012, pp. 295\u2013304 (2012)","DOI":"10.1109\/ICSM.2012.6405285"},{"key":"557_CR7","doi-asserted-by":"crossref","unstructured":"Antony, E.P., Alalfi, M.H., Cordy, J.R.: An approach to clone detection in behavioural models. In: 20th Working Conference on Reverse Engineering, WCRE 2013, Koblenz, Germany, October 14\u201317, 2013, pp. 472\u2013476 (2013)","DOI":"10.1109\/WCRE.2013.6671325"},{"key":"557_CR8","unstructured":"Brun, C., Pierantonio, A.: Model differences in the Eclipse modelling framework. The European Journal for the Informatics Professional, pp. 29\u201334 (2008)"},{"issue":"3","key":"557_CR9","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1016\/j.scico.2006.04.002","volume":"61","author":"JR Cordy","year":"2006","unstructured":"Cordy, J.R.: The TXL source transformation language. Sci. Comput. Program. 61(3), 190\u2013210 (2006)","journal-title":"Sci. Comput. Program."},{"key":"557_CR10","doi-asserted-by":"crossref","unstructured":"Cordy, J.R., Roy, C.K.: The NICAD clone detector. In: 19th IEEE International Conference on Program Comprehension, ICPC 2011, pp 219\u2013220 (2011)","DOI":"10.1109\/ICPC.2011.26"},{"issue":"4","key":"557_CR11","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1023\/A:1025801405075","volume":"10","author":"TR Dean","year":"2003","unstructured":"Dean, T.R., Cordy, J.R., Malton, A.J., Schneider, K.A.: Agile parsing in TXL. Autom. Softw. Eng. 10(4), 311\u2013336 (2003)","journal-title":"Autom. Softw. Eng."},{"key":"557_CR12","doi-asserted-by":"crossref","unstructured":"Farhadi, M.R., Fung, B.C.M., Charland, P., Debbabi, M.: BinClone: detecting code clones in malware. In: 8th International Conference on Software Security and Reliability, SERE 2014, pp. 78\u201387 (2014)","DOI":"10.1109\/SERE.2014.21"},{"key":"557_CR13","doi-asserted-by":"crossref","unstructured":"Gauthier, F., Lavoie, T., Merlo, E.: Uncovering access control weaknesses and flaws with security-discordant software clones. In: 29th Annual Computer Security Applications Conference, ACSAC 2013, pp. 209\u2013218 (2013)","DOI":"10.1145\/2523649.2523650"},{"key":"557_CR14","unstructured":"Karademir, S., Dean, T., Leblanc, S.: Using clone detection to find malware in Acrobat files. In: 23rd Conference of the Center for Advanced Studies on Collaborative Research, CASCON 2013, pp. 70\u201380 (2013)"},{"key":"557_CR15","doi-asserted-by":"crossref","unstructured":"Liu, H., Ma, Z., Zhang, L., Shao, W.: Detecting duplications in sequence diagrams based on suffix trees. In: 13th Asia-Pacific Software Engineering Conference, APSEC 2006, pp. 269\u2013276 (2006)","DOI":"10.1109\/APSEC.2006.32"},{"key":"557_CR16","doi-asserted-by":"crossref","unstructured":"Martin, D., Cordy, J.R.: Towards web services tagging by similarity detection. In: The Smart Internet, pp. 216\u2013233 (2010)","DOI":"10.1007\/978-3-642-16599-3_15"},{"key":"557_CR17","first-page":"54","volume":"2007","author":"S Nejati","year":"2007","unstructured":"Nejati, S., Sabetzadeh, M., Chechik, M., Easterbrook, S., Zave, P.: Matching and merging of statecharts specifications. Int. Conf. Softw. Eng. ICSE 2007, 54\u201364 (2007)","journal-title":"Int. Conf. Softw. Eng. ICSE"},{"key":"557_CR18","unstructured":"OWASP. Forced browsing. https:\/\/www.owasp.org\/index.php\/Forced_browsing . Accessed Nov 2013"},{"key":"557_CR19","doi-asserted-by":"crossref","unstructured":"Rattan, D., Bhatia, R., Singh, M.: Model clone detection based on tree comparison. IEEE India Conference, INDICON 2012, pp. 1041\u20131046 (2012)","DOI":"10.1109\/INDCON.2012.6420770"},{"key":"557_CR20","doi-asserted-by":"crossref","unstructured":"Roy, C.K., Cordy, J.R.: NICAD: accurate detection of near-miss intentional clones using flexible pretty-printing and code normalization. In: 16th International Conference on Program Comprehension, pp. 172\u2013181 (2008)","DOI":"10.1109\/ICPC.2008.41"},{"issue":"7","key":"557_CR21","doi-asserted-by":"crossref","first-page":"470","DOI":"10.1016\/j.scico.2009.02.007","volume":"74","author":"CK Roy","year":"2009","unstructured":"Roy, C.K., Cordy, J.R., Koschke, R.: Comparison and evaluation of code clone detection techniques and tools: a qualitative approach. Sci. Comput. Program. 74(7), 470\u2013495 (2009)","journal-title":"Sci. Comput. Program."},{"issue":"7","key":"557_CR22","doi-asserted-by":"crossref","first-page":"470","DOI":"10.1016\/j.scico.2009.02.007","volume":"74","author":"CK Roy","year":"2009","unstructured":"Roy, C.K., Cordy, J.R., Koschke, R.: Comparison and evaluation of code clone detection techniques and tools: a qualitative approach. Sci. Comput. Program. 74(7), 470\u2013495 (2009)","journal-title":"Sci. Comput. Program."},{"key":"557_CR23","unstructured":"Rubin, J., Chechik, M.: From products to product lines using model matching and refactoring. In: 2nd International Workshop on Model-Driven Software Product Line Engineering, MAPLE 2010, pp. 155\u2013162 (2010)"},{"key":"557_CR24","doi-asserted-by":"crossref","unstructured":"Rubin, J., Chechik, M.: Combining related products into product lines. In: 15th International Conference on Fundamental Approaches to Software Engineering, FASE 2012, pp. 285\u2013300 (2012)","DOI":"10.1007\/978-3-642-28872-2_20"},{"key":"557_CR25","unstructured":"Shapland, R.: Forced browsing: understanding and halting simple browser attacks. http:\/\/www.computerweekly.com\/answer\/Forced-browsing-Understanding-and-halting-simple-browser-attacks . Accessed Dec 2013"},{"key":"557_CR26","unstructured":"Stephan, M., Cordy, J.R.: A survey of methods and applications of model comparison. Technical Report 2011-582 Review 2, Queen\u2019s University (2011)"},{"key":"557_CR27","first-page":"199","volume":"2009","author":"H St\u00f6rrle","year":"2009","unstructured":"St\u00f6rrle, H.: VMQL: a generic visual model query language. IEEE Symp. Vis. Lang. Hum. Cent. Comput. VL\/HCC 2009, 199\u2013206 (2009)","journal-title":"IEEE Symp. Vis. Lang. Hum. Cent. Comput. VL\/HCC"},{"key":"557_CR28","doi-asserted-by":"crossref","unstructured":"St\u00f6rrle, H.: Towards clone detection in UML domain models. In: VIII Nordic Workshop on Model-Driven Software Engineering, ECSA 2010 workshops, pp. 285\u2013293 (2010)","DOI":"10.1145\/1842752.1842805"},{"issue":"2","key":"557_CR29","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1007\/s10270-011-0217-9","volume":"12","author":"H St\u00f6rrle","year":"2013","unstructured":"St\u00f6rrle, H.: Towards clone detection in UML domain models. Softw. Syst. Model. 12(2), 307\u2013329 (2013)","journal-title":"Softw. Syst. Model."},{"key":"557_CR30","unstructured":"St\u00f6rrle, H.: MACH 5 hypersonic. http:\/\/www2.compute.dtu.dk\/~rvac\/hypersonic\/ . Accessed Feb 2015"},{"key":"557_CR31","doi-asserted-by":"crossref","unstructured":"Svajlenko, J., Roy, C.K.: Evaluating clone detection tools with bigclonebench. In: 2015 IEEE International Conference on Software Maintenance and Evolution, ICSME 2015, Bremen, Germany, September 29\u2013October 1, 2015, pp. 131\u2013140 (2015)","DOI":"10.1109\/ICSM.2015.7332459"},{"key":"557_CR32","unstructured":"WatirCraft. Watir. http:\/\/watir.com . Accessed Nov 2014"}],"container-title":["Software &amp; Systems Modeling"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10270-016-0557-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10270-016-0557-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10270-016-0557-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,13]],"date-time":"2019-09-13T11:04:54Z","timestamp":1568372694000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10270-016-0557-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9,12]]},"references-count":32,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2018,10]]}},"alternative-id":["557"],"URL":"https:\/\/doi.org\/10.1007\/s10270-016-0557-6","relation":{},"ISSN":["1619-1366","1619-1374"],"issn-type":[{"value":"1619-1366","type":"print"},{"value":"1619-1374","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,9,12]]}}}