{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T02:40:05Z","timestamp":1746412805378,"version":"3.40.4"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319119878"},{"type":"electronic","value":"9783319119885"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-11988-5_25","type":"book-chapter","created":{"date-parts":[[2014,10,8]],"date-time":"2014-10-08T13:15:40Z","timestamp":1412774140000},"page":"265-276","source":"Crossref","is-referenced-by-count":4,"title":["A Bayesian Ensemble Classifier for Source Code Authorship Attribution"],"prefix":"10.1007","author":[{"given":"Matthew F.","family":"Tennyson","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Francisco J.","family":"Mitropoulos","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"25_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1007\/11562382_14","volume-title":"Information Retrieval Technology","author":"Y. Zhao","year":"2005","unstructured":"Zhao, Y., Zobel, J.: Effective and scalable authorship attribution using function words. In: Lee, G.G., Yamada, A., Meng, H., Myaeng, S.-H. (eds.) AIRS 2005. LNCS, vol.\u00a03689, pp. 174\u2013189. Springer, Heidelberg (2005)"},{"issue":"6","key":"25_CR2","doi-asserted-by":"publisher","first-page":"585","DOI":"10.1016\/0167-4048(93)90055-A","volume":"12","author":"E. Spafford","year":"1993","unstructured":"Spafford, E., Weeber, S.: Software forensics: Can we track code to its authors? Computers & Security (COMPSEC)\u00a012(6), 585\u2013595 (1993)","journal-title":"Computers & Security (COMPSEC)"},{"key":"25_CR3","unstructured":"McCabe, D.: Levels of cheating and plagiarism remain high. Technical report, Center for Academic Integrity, Duke University (2005)"},{"key":"25_CR4","unstructured":"Bull, J., Collins, C., Coughlin, E., Sharp, D.: Technical Review of Plagiarism Detection Software Report.Technical report, Joint Information System Committee (2001)"},{"key":"25_CR5","unstructured":"Culwin, F., MacLeod, A., Lancaster, T.: Source Code Plagiarism in UK HE Computing Schools, Issues, Attitudes and Tools.Technical report, South Bank University (2001)"},{"key":"25_CR6","unstructured":"MacDonell, S., Gray, A., MacLennan, G., Sallis, P.: Software forensics for discriminating between program authors. In: Proceedings of the 6th International Conference on Neural Information Processing, pp. 66\u201371 (1999)"},{"issue":"3","key":"25_CR7","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1016\/S0167-4048(97)00005-9","volume":"16","author":"I. Krsul","year":"1997","unstructured":"Krsul, I., Spafford, E.: Authorship analysis: Identifying the author of a program. Computers & Security (COMPSEC)\u00a016(3), 233\u2013257 (1997)","journal-title":"Computers & Security (COMPSEC)"},{"key":"25_CR8","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1016\/S0164-1212(03)00049-9","volume":"72","author":"H. Ding","year":"2004","unstructured":"Ding, H., Samadzadeh, M.: Extraction of java program fingerprints for software authorship identification. The Journal of Systems and Software\u00a072, 49\u201357 (2004)","journal-title":"The Journal of Systems and Software"},{"key":"25_CR9","doi-asserted-by":"crossref","unstructured":"Frantzeskou, G., Stamatatos, E., Gritzalis, S.: Supporting the cybercrime investigation process: Effective discrimination of source code authors based on byte-level information. In: Proceedings of the Second International Conference on E-business and Telecommunication Networks, pp. 283\u2013290 (2005)","DOI":"10.5220\/0001414902830290"},{"key":"25_CR10","series-title":"IFIP AICT","doi-asserted-by":"publisher","first-page":"508","DOI":"10.1007\/0-387-34224-9_59","volume-title":"Artificial Intelligence Applications and Innovations","author":"G. Frantzeskou","year":"2006","unstructured":"Frantzeskou, G., Stamatatos, E., Gritzalis, S., Katsikas, S.: Source code author identification based on n-gram author profiles. In: Maglogiannis, I., Karpouzis, K., Bramer, M. (eds.) Artificial Intelligence Applications and Innovations. IFIP AICT, vol.\u00a0204, pp. 508\u2013515. Springer, Heidelberg (2006)"},{"key":"25_CR11","doi-asserted-by":"crossref","unstructured":"Frantzeskou, G., Stamatatos, E., Gritzalis, S., Katsikas, S.: Effective identification of source code authors using byte-level information. In: Proceedings of the Twenty-Eighth International Conference on Software Engineering, pp. 893\u2013896 (2006)","DOI":"10.1145\/1134285.1134445"},{"issue":"1","key":"25_CR12","first-page":"1","volume":"6","author":"G. Frantzeskou","year":"2007","unstructured":"Frantzeskou, G., Stamatatos, E., Gritzalis, S., Chaski, C., Howald, B.: Identifying authorship by byte-level n-grams: The source code author profile (SCAP) method. International Journal of Digital Evidence\u00a06(1), 1\u201318 (2007)","journal-title":"International Journal of Digital Evidence"},{"issue":"3","key":"25_CR13","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1016\/j.jss.2007.03.004","volume":"81","author":"G. Frantzeskou","year":"2008","unstructured":"Frantzeskou, G., MacDonell, S.G., Stamatatos, E., Gritzalis, S.: Examining the significance of high-level programming features in source code author classification. Journal of Systems and Software\u00a081(3), 447\u2013460 (2008)","journal-title":"Journal of Systems and Software"},{"key":"25_CR14","unstructured":"Burrows, S., Tahaghoghi, S.: Source code authorship attribution using n-grams. In: Proceedings of the 12th Australasian Document Computing Symposium, pp. 32\u201339 (2007)"},{"key":"25_CR15","unstructured":"Burrows, S.: Source Code Authorship Attribution. Doctoral thesis, RMIT University, Melbourne, Victoria, Australia (2010)"},{"issue":"1","key":"25_CR16","first-page":"1","volume":"44","author":"S. Burrows","year":"2014","unstructured":"Burrows, S., Uitdenbogerd, A., Turpin, A.: Comparing techniques for authorship attribution of source code. Software: Practice and Experience\u00a044(1), 1\u201332 (2014)","journal-title":"Software: Practice and Experience"},{"key":"25_CR17","doi-asserted-by":"crossref","unstructured":"Lange, R., Mancoridis, S.: Using code metric histograms and genetic algorithms to perform author identification for software forensics. In: Proceedings of the 9th Annual Conference on Genetic and Evolutionary Computation, pp. 2082\u20132089 (2007)","DOI":"10.1145\/1276958.1277364"},{"key":"25_CR18","doi-asserted-by":"crossref","unstructured":"Kothari, J., Shevertalov, M., Stehle, E., Mancoridis, S.: A probabilistic approach to source code authorship identification. In: Proceedings of the Fourth International Conference on Information Technology, pp. 243\u2013248 (2007)","DOI":"10.1109\/ITNG.2007.17"},{"issue":"3","key":"25_CR19","first-page":"50","volume":"23","author":"B. Elenbogen","year":"2008","unstructured":"Elenbogen, B., Seliya, N.: Detecting outsourced student programming assignments. Journal of Computing Sciences in Colleges\u00a023(3), 50\u201357 (2008)","journal-title":"Journal of Computing Sciences in Colleges"},{"key":"25_CR20","doi-asserted-by":"crossref","unstructured":"Shevertalov, M., Kothari, J., Stehle, E., Mancoridis, S.: On the use of discretized source code metrics for author identification. In: Proceedings of the 1st International Symposium on Search Based Software Engineering, pp. 69\u201378 (2009)","DOI":"10.1109\/SSBSE.2009.18"},{"key":"25_CR21","doi-asserted-by":"crossref","unstructured":"Tennyson, M.: A Replicated Comparative Study of Source Code Authorship Attribution. In: Proceedings of the International Workshop on Replication in Empirical Software Engineering Research, pp. 76\u201383 (2013)","DOI":"10.1109\/RESER.2013.12"},{"key":"25_CR22","doi-asserted-by":"crossref","unstructured":"Tennyson, M., Mitropoulos, F.: Choosing a Profile Length in the SCAP Method of Source Code Authorship Attribution. In: 2014 Proceedings of the IEEE Southeastcon (2014)","DOI":"10.1109\/SECON.2014.6950705"},{"key":"25_CR23","doi-asserted-by":"crossref","unstructured":"Tennyson, M., Mitropoulos, F.: Improving the Burrows Method of Source Code Authorship Attribution. In: Proceedings of the IADIS International Conference on Applied Computing, pp. 3\u20139 (2013)","DOI":"10.1109\/SECON.2014.6950705"},{"key":"25_CR24","doi-asserted-by":"crossref","unstructured":"Robertson, S., Walker, S.: Okapi\/Keenbow at TREC-8. In: Proceedings of the 8th Text Retrieval Conference, pp. 151\u2013162 (1999)","DOI":"10.6028\/NIST.SP.500-246.web-microsoft"}],"container-title":["Lecture Notes in Computer Science","Similarity Search and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11988-5_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T02:00:36Z","timestamp":1746410436000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-11988-5_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319119878","9783319119885"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11988-5_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}