Clone detection in 5G-enabled social IoT system using graph semantics and deep learning model

F Ullah, MR Naeem, L Mostarda, SA Shah - International Journal of …, 2021 - Springer
The protection and privacy of the 5G-IoT framework is a major challenge due to the vast
number of mobile devices. Specialized applications running these 5G-IoT systems may be …

Using d-NFGs to identify and eliminate dead code in C# programs

C Kruif - 2022 - essay.utwente.nl
Dead code is any code in a computer program which does not affect the application. It is
prevalent in computer programs, can be harmful and pose significant risks. This research …

Correlation and Performance Estimation of Clone Detection Tools

P Gautam, H Saini - International Journal of Open Source Software …, 2018 - igi-global.com
Over the past few decades, many tools and methods have been proposed by several
researchers to detect clones automatically in programs and software. Nevertheless, it is not …