![]() | Monter d'un niveau |
Gauthier, F., Lavoie, T., & Merlo, E. (décembre 2013). Uncovering access control weaknesses and flaws with security-discordant software clones [Communication écrite]. 29th Annual Computer Security Applications Conference, New Orleans, LA, USA. Lien externe
Lavoie, T., & Merlo, E. (mai 2013). How much really changes? A case study of firefox version evolution using a clone detector [Communication écrite]. 7th International Workshop on Software Clones (IWSC 2013), San Francisco, CA, USA. Lien externe
Merlo, E., Lavoie, T., Potvin, P., & Busnel, P. (mai 2013). Large scale multi-language clone analysis in a telecommunication industrial setting [Communication écrite]. 7th International Workshop on Software Clones (IWSC 2013), San Francisco, CA, USA. Lien externe