{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T06:05:04Z","timestamp":1775282704697,"version":"3.50.1"},"reference-count":52,"publisher":"IGI Global","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,1]]},"abstract":"<jats:p>Over the past few years, several software clone detection tools and techniques have been introduced by numerous researchers. The software clone detection techniques and tools are based on their numerous attributes and sub-attributes which make them difficult to complete a comparative study. Therefore, the authors propose a mutation operator-based editing taxonomy for generating different software clone types. In addition, a hypothetical scenario is developed using mutation operator-based editing taxonomy and this hypothetical scenario is used to evaluate various software clone detection techniques and tools. Further, the existing evaluation criterion is extended by the hypothetical scenario which is clearly represented by the analysis of results.<\/jats:p>","DOI":"10.4018\/ijisp.2019010103","type":"journal-article","created":{"date-parts":[[2018,11,23]],"date-time":"2018-11-23T05:52:15Z","timestamp":1542952335000},"page":"30-45","source":"Crossref","is-referenced-by-count":0,"title":["A Mutation Operator-Based Scenario for Evaluating Software Clone Detection Tools and Techniques"],"prefix":"10.4018","volume":"13","author":[{"given":"Pratiksha","family":"Gautam","sequence":"first","affiliation":[{"name":"Jaypee University of Information Technology, Waknaghat, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2957-1491","authenticated-orcid":true,"given":"Hemraj","family":"Saini","sequence":"additional","affiliation":[{"name":"Jayppe University of Information Technology, Waknaghat, India"}]}],"member":"2432","reference":[{"key":"IJISP.2019010103-0","doi-asserted-by":"crossref","unstructured":"Baker, B. S. (1995, July). On finding duplication and near-duplication in large software systems. In Proceedings of 2nd Working Conference onReverse Engineering, Toronto, Ontario, Canada (pp. 86-95). IEEE.","DOI":"10.1109\/WCRE.1995.514697"},{"key":"IJISP.2019010103-1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70720"},{"key":"IJISP.2019010103-2","first-page":"292","article-title":"Measuring clone based reengineering opportunities.","author":"M.Balazinska","year":"1999","journal-title":"Software Metrics Symposium, 1999. Proceedings. Sixth International"},{"key":"IJISP.2019010103-3","doi-asserted-by":"publisher","DOI":"10.1145\/1287624.1287698"},{"key":"IJISP.2019010103-4","unstructured":"Bellon, S. (2002). Vergleich von techniken zur erkennung duplizierten quellcodes [master's thesis]."},{"key":"IJISP.2019010103-5","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70725"},{"key":"IJISP.2019010103-6","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1998.738528"},{"key":"IJISP.2019010103-7","doi-asserted-by":"crossref","unstructured":"Burd, E., & Bailey, J. (2002). Evaluating clone detection tools for use during preventative maintenance. In Proceedings. Second IEEE International Workshop on Source Code Analysis and Manipulation (pp. 36-43). IEEE.","DOI":"10.1109\/SCAM.2002.1134103"},{"key":"IJISP.2019010103-8","unstructured":"Davey, N., Barson, P., Field, S., Frank, R., & Tansley, D. (1995). The development of a software clone detector. International Journal of Applied Software Technology."},{"key":"IJISP.2019010103-9","first-page":"481","article-title":"An approach to identify duplicated web pages.","author":"G. A.Di Lucca","year":"2002","journal-title":"Proceedings 26th Annual International Computer Software and Applications Conference, 2002. COMPSAC \u201902"},{"issue":"1","key":"IJISP.2019010103-10","first-page":"3","article-title":"Function clone detection in web applications: A semiautomated approach.","volume":"3","author":"F.Calefato","year":"2004","journal-title":"Journal of Web Engineering"},{"issue":"2","key":"IJISP.2019010103-11","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1080\/10618600.1993.10474605","article-title":"Dotplot: A program for exploring self-similarity in millions of lines of text and code.","volume":"2","author":"K. W.Church","year":"1993","journal-title":"Journal of Computational and Graphical Statistics"},{"key":"IJISP.2019010103-12","first-page":"1","article-title":"Practical language-independent detection of near-miss clones.","author":"J. R.Cordy","year":"2004","journal-title":"Proceedings of the 2004 conference of the Centre for Advanced Studies on Collaborative research"},{"key":"IJISP.2019010103-13","doi-asserted-by":"crossref","unstructured":"Ducasse, S., Rieger, M., & Demeyer, S. (1999). A language independent approach for detecting duplicated code. In Proceedings IEEE International Conference on Software Maintenance (ICSM'99) (pp. 109-118). IEEE.","DOI":"10.1109\/ICSM.1999.792593"},{"key":"IJISP.2019010103-14","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-009-9074-y"},{"key":"IJISP.2019010103-15","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-3433-6_79"},{"key":"IJISP.2019010103-16","doi-asserted-by":"crossref","unstructured":"Hummel, B., Juergens, E., Heinemann, L., & Conradt, M. (2010, September). Index-based code clone detection: incremental, distributed, scalable. In 2010 IEEE International Conference on Software Maintenance (ICSM) (pp. 1-9). IEEE.","DOI":"10.1109\/ICSM.2010.5609665"},{"key":"IJISP.2019010103-17","first-page":"96","article-title":"Deckard: Scalable and accurate tree-based detection of code clones.","author":"L.Jiang","year":"2007","journal-title":"Proceedings of the 29th international conference on Software Engineering"},{"key":"IJISP.2019010103-18","first-page":"32","article-title":"Visualizing textual redundancy in legacy source.","author":"J. H.Johnson","year":"1994","journal-title":"Proceedings of the 1994 conference of the Centre for Advanced Studies on Collaborative research"},{"key":"IJISP.2019010103-19","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1019480"},{"key":"IJISP.2019010103-20","unstructured":"Kamiya, T. (2008). The official CCFinderX website. Retrieved from http:\/\/www.ccfinder.net\/ccfinderx.html"},{"key":"IJISP.2019010103-21","doi-asserted-by":"crossref","unstructured":"Komondoor, R., & Horwitz, S. (2001, July). Using slicing to identify duplication in source code. In International Static Analysis Symposium (pp. 40-56). Springer Berlin Heidelberg.","DOI":"10.1007\/3-540-47764-0_3"},{"key":"IJISP.2019010103-22","doi-asserted-by":"publisher","DOI":"10.1007\/BF00126960"},{"key":"IJISP.2019010103-23","unstructured":"Koschke, R. (2007). Survey of research on software clones. In Dagstuhl Seminar Proceedings. Schloss Dagstuhl-Leibniz-Zentrum f\u00fcr Informatik."},{"key":"IJISP.2019010103-24","doi-asserted-by":"crossref","unstructured":"Koschke, R., Falke, R., & Frenzel, P. (2006, October). Clone detection using abstract syntax suffix trees. In 13th Working Conference on Reverse Engineering WCRE'06 (pp. 253-262). IEEE.","DOI":"10.1109\/WCRE.2006.18"},{"key":"IJISP.2019010103-25","doi-asserted-by":"crossref","unstructured":"Krinke, J. (2001). Identifying similar code with program dependence graphs. In Proceedings. Eighth Working Conference on Reverse Engineering (pp. 301-309). IEEE.","DOI":"10.1109\/WCRE.2001.957835"},{"key":"IJISP.2019010103-26","doi-asserted-by":"crossref","unstructured":"Lague, B., Proulx, D., Mayrand, J., Merlo, E. M., & Hudepohl, J. (1997, October). Assessing the benefits of incorporating function clone detection in a development process. In Proceedings International Conference on Software Maintenance (pp. 314-321). IEEE.","DOI":"10.1109\/ICSM.1997.624264"},{"key":"IJISP.2019010103-27","doi-asserted-by":"crossref","unstructured":"Lee, S., & Jeong, I. (2005, October). SDD: high performance code clone detection system for large scale source code. In Companion to the 20th annual ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications (pp. 140-141). ACM.","DOI":"10.1145\/1094855.1094903"},{"key":"IJISP.2019010103-28","doi-asserted-by":"crossref","unstructured":"Leit\u00e3o, A. M. (2003, September). Detection of redundant code using R\/sup 2\/D\/sup 2. In Proceedings Third IEEE International Workshop onSource Code Analysis and Manipulation (pp. 183-192). IEEE.","DOI":"10.1109\/SCAM.2003.1238044"},{"key":"IJISP.2019010103-29","first-page":"106","article-title":"Very-large scale code clone analysis and visualization of open source programs using distributed CCFinder: D-CCFinder.","author":"S.Livieri","year":"2007","journal-title":"Proceedings of the 29th international conference on Software Engineering"},{"key":"IJISP.2019010103-30","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.28"},{"key":"IJISP.2019010103-31","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150522"},{"key":"IJISP.2019010103-32","unstructured":"Manber, U. (1994, January). Finding similar files in a large file system. In Usenix Winter (Vol. 94, pp. 1-10)."},{"key":"IJISP.2019010103-33","doi-asserted-by":"crossref","unstructured":"Marcus, A., & Maletic, J. I. (2001, November). Identification of high-level concept clones in source code. In Proceedings 16th Annual International Conference on Automated Software Engineering (ASE 2001) (pp. 107-114). IEEE.","DOI":"10.1109\/ASE.2001.989796"},{"key":"IJISP.2019010103-34","doi-asserted-by":"crossref","unstructured":"Mayrand, J., Leblanc, C., & Merlo, E. (1996, November). Experiment on the Automatic Detection of Function Clones in a Software System Using Metrics. In ICSM (Vol. 96, p. 244).","DOI":"10.1109\/ICSM.1996.565012"},{"key":"IJISP.2019010103-35","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2011.03.007"},{"key":"IJISP.2019010103-36","doi-asserted-by":"crossref","unstructured":"Patenaude, J. F., Merlo, E., Dagenais, M., & Lagu\u00eb, B. (1999). Extending software quality assessment techniques to java systems. In Proceedings Seventh International Workshop on Program Comprehension (pp. 49-56). IEEE.","DOI":"10.1109\/WPC.1999.777743"},{"key":"IJISP.2019010103-37","year":"2007"},{"key":"IJISP.2019010103-38","doi-asserted-by":"crossref","unstructured":"Gautam, P., & Saini, H. (2017). A Hybrid Approach for Detection of Type-1 Software Clones. Paper presented at 4th IEEE International Conference on Signal Processing, Computing and Control (ISPCC), September 21-23. IEEE.","DOI":"10.1109\/ISPCC.2017.8269689"},{"key":"IJISP.2019010103-39","year":"2016"},{"key":"IJISP.2019010103-40","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2013.01.008"},{"issue":"115","key":"IJISP.2019010103-41","first-page":"64","article-title":"A survey on software clone detection research.","volume":"541","author":"C. K.Roy","year":"2007","journal-title":"Queen\u2019s School of Computing TR"},{"key":"IJISP.2019010103-42","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2008.42"},{"key":"IJISP.2019010103-43","doi-asserted-by":"crossref","unstructured":"Roy, C. K., & Cordy, J. R. (2008, June). NICAD: Accurate detection of near-miss intentional clones using flexible pretty-printing and code normalization. In The 16th IEEE International Conference on Program Comprehension ICPC 2008 (pp. 172-181). IEEE.","DOI":"10.1109\/ICPC.2008.41"},{"key":"IJISP.2019010103-44","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2009.02.007"},{"key":"IJISP.2019010103-45","doi-asserted-by":"crossref","unstructured":"Sheneamer, A., & Kalita, J. (2016). A Survey of Software Clone Detection Techniques. International Journal of Computer Applications.","DOI":"10.5120\/ijca2016908896"},{"key":"IJISP.2019010103-46","doi-asserted-by":"publisher","DOI":"10.1145\/1185448.1185597"},{"key":"IJISP.2019010103-47","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2002.1183002"},{"key":"IJISP.2019010103-48","doi-asserted-by":"crossref","unstructured":"Van Rysselberghe, F., & Demeyer, S. (2004, September). Evaluating clone detection techniques from a refactoring perspective. In Proceedings 19th International Conference on Automated Software Engineering (pp. 336-339). IEEE.","DOI":"10.1109\/ASE.2004.1342759"},{"key":"IJISP.2019010103-49","doi-asserted-by":"crossref","unstructured":"Wahler, V., Seipel, D., Wolff, J., & Fischer, G. (2004, September). Clone detection in source code by frequent itemset techniques. In Fourth IEEE International Workshop on Source Code Analysis and Manipulation (pp. 128-135). IEEE.","DOI":"10.1109\/SCAM.2004.6"},{"key":"IJISP.2019010103-50","doi-asserted-by":"crossref","unstructured":"Wettel, R., & Marinescu, R. (2005, September). Archeology of code duplication: Recovering duplication chains from small duplication fragments. In Seventh International Symposium on Symbolic and Numeric Algorithms for Scientific Computing SYNASC 2005 (pp. 8-pp). IEEE.","DOI":"10.1109\/SYNASC.2005.20"},{"key":"IJISP.2019010103-51","doi-asserted-by":"publisher","DOI":"10.1002\/spe.4380210706"}],"container-title":["International Journal of Information Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=218844","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T05:22:57Z","timestamp":1775280177000},"score":1,"resource":{"primary":{"URL":"http:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJISP.2019010103"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2019,1]]},"references-count":52,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.4018\/ijisp.2019010103","relation":{},"ISSN":["1930-1650","1930-1669"],"issn-type":[{"value":"1930-1650","type":"print"},{"value":"1930-1669","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,1]]}}}