{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T16:53:57Z","timestamp":1725468837346},"reference-count":7,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387342238"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/0-387-34224-9_59","type":"book-chapter","created":{"date-parts":[[2006,8,25]],"date-time":"2006-08-25T14:54:56Z","timestamp":1156517696000},"page":"508-515","source":"Crossref","is-referenced-by-count":37,"title":["Source Code Author Identification Based on N-gram Author Profiles"],"prefix":"10.1007","author":[{"given":"Georgia","family":"Frantzeskou","sequence":"first","affiliation":[]},{"given":"Efstathios","family":"Stamatatos","sequence":"additional","affiliation":[]},{"given":"Stefanos","family":"Gritzalis","sequence":"additional","affiliation":[]},{"given":"Sokratis","family":"Katsikas","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"59_CR1","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1016\/S0164-1212(03)00049-9","volume":"72","author":"H. Ding","year":"2004","unstructured":"B Ding, H., Samadzadeh, M., H., Extraction of Java program fingerprints for software authorship identification, The Journal of Systems and Software, Volume 72, Issue 1, Pages 49\u201357 June 2004.","journal-title":"The Journal of Systems and Software"},{"key":"59_CR2","unstructured":"Frantzeskou, G., Stamatatos, E., Gritzalis, S., Supporting the cybercrime investigation process: Effective discrimination of source code based on byte level information, in Proc. 2nd International Conference on e-business and Telecommunications Networks (ICETE05), 2005."},{"key":"59_CR3","unstructured":"Keselj, V., Peng, F., Cercone, N., Thomas, C, N-gram based author profiles for authorship attribution, In Proc. Pacific Association for Computational Linguistics 2003."},{"key":"59_CR4","unstructured":"Keselj, V.,. Perl package Text::N-grams http:\/\/www.cs.dal.ca\/~vlado\/srcperl\/N-grams or http:\/\/search.cpan.org\/author\/VL ADO\/Text-N-grams-0.03\/N-grams.pm. 2003."},{"key":"59_CR5","unstructured":"Krsul, I., and Spafford, E. H, Authorship analysis: Identifying the author of a program, In Proc. 8th National Information Systems Security Conference, pages 514\u2013524, National Institute of Standards and Technology, 1995."},{"key":"59_CR6","unstructured":"Krsul, I., and Spafford, E. H., 1996, Authorship analysis: Identifying the author of a program, Technical Report TR-96-052, 1996."},{"key":"59_CR7","first-page":"113","volume":"10","author":"S.G. MacDonell","year":"2001","unstructured":"MacDonell, S.G, and Gray, A.R. Software forensics applied to the task of discriminating between program authors. Journal of Systems Research and Information Systems 10: 113\u2013127 (2001).","journal-title":"Journal of Systems Research and Information Systems"}],"container-title":["IFIP International Federation for Information Processing","Artificial Intelligence Applications and Innovations"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/0-387-34224-9_59.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T05:23:49Z","timestamp":1619501029000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/0-387-34224-9_59"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387342238"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/0-387-34224-9_59","relation":{},"subject":[]}}