{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T12:50:38Z","timestamp":1742993438021,"version":"3.40.3"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319181165"},{"type":"electronic","value":"9783319181172"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-18117-2_48","type":"book-chapter","created":{"date-parts":[[2015,4,9]],"date-time":"2015-04-09T08:56:54Z","timestamp":1428569814000},"page":"643-654","source":"Crossref","is-referenced-by-count":3,"title":["Identification of Original Document by Using Textual Similarities"],"prefix":"10.1007","author":[{"given":"Prasha","family":"Shrestha","sequence":"first","affiliation":[]},{"given":"Thamar","family":"Solorio","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"48_CR1","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1145\/1084805.1084812","volume":"34","author":"Y.L. Simmhan","year":"2005","unstructured":"Simmhan, Y.L., Plale, B., Gannon, D.: A survey of data provenance in e-Science. SIGMOD Rec.\u00a034, 31\u201336 (2005)","journal-title":"SIGMOD Rec."},{"key":"48_CR2","unstructured":"Muniswamy-Reddy, K.K., Macko, P., Seltzer, M.: Provenance for the cloud. In: Proceedings of the 8th USENIX Conference on File and Storage Technologies, FAST 2010, pp. 15\u201314. USENIX Association, Berkeley (2010)"},{"key":"48_CR3","unstructured":"Muniswamy-Reddy, K.K., Holland, D.A., Braun, U., Seltzer, M.: Provenance-aware storage systems. In: Proceedings of the Annual Conference on USENIX 2006 Annual Technical Conference, ATEC 2006, p. 4. USENIX Association, Berkeley (2006)"},{"key":"48_CR4","doi-asserted-by":"publisher","first-page":"851","DOI":"10.1111\/j.1556-4029.2007.00488.x","volume":"52","author":"R.L. Green","year":"2007","unstructured":"Green, R.L., Watling, R.J.: Trace element fingerprinting of australian ocher using laser ablation inductively coupled plasma-mass spectrometry (LA-ICP-MS) for the provenance establishment and authentication of indigenous art*. Journal of Forensic Sciences\u00a052, 851\u2013859 (2007)","journal-title":"Journal of Forensic Sciences"},{"key":"48_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"700","DOI":"10.1007\/978-3-642-12116-6_59","volume-title":"Computational Linguistics and Intelligent Text Processing","author":"C. Grozea","year":"2010","unstructured":"Grozea, C., Popescu, M.: Who\u2019s the thief? Automatic detection of the direction of plagiarism. In: Gelbukh, A. (ed.) CICLing 2010. LNCS, vol.\u00a06008, pp. 700\u2013710. Springer, Heidelberg (2010)"},{"key":"48_CR6","unstructured":"Stamatatos, E.: Intrinsic plagiarism detection using character n-gram profiles. In: 3rd PAN Workshop Uncovering Plagiarism, Authorship and Social Software Misuse, vol.\u00a02, p. 38 (2009)"},{"key":"48_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"696","DOI":"10.1007\/978-3-642-00958-7_69","volume-title":"Advances in Information Retrieval","author":"A. Barr\u00f3n-Cede\u00f1o","year":"2009","unstructured":"Barr\u00f3n-Cede\u00f1o, A., Rosso, P.: On automatic plagiarism detection based on n-grams comparison. In: Boughanem, M., Berrut, C., Mothe, J., Soule-Dupuy, C. (eds.) ECIR 2009. LNCS, vol.\u00a05478, pp. 696\u2013700. Springer, Heidelberg (2009)"},{"key":"48_CR8","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/s10579-010-9115-y","volume":"45","author":"B. Stein","year":"2011","unstructured":"Stein, B., Lipka, N., Prettenhofer, P.: Intrinsic plagiarism analysis. Language Resources and Evaluation\u00a045, 63\u201382 (2011)","journal-title":"Language Resources and Evaluation"},{"key":"48_CR9","doi-asserted-by":"crossref","unstructured":"Koppel, M., Schler, J.: Authorship verification as a one-class classification problem. In: Proceedings of the Twenty-First International Conference on Machine Learning, p. 62. ACM (2004)","DOI":"10.1145\/1015330.1015448"},{"key":"48_CR10","unstructured":"Guthrie, D., Guthrie, L., Allison, B., Wilks, Y.: Unsupervised anomaly detection. In: Proceedings of the 20th International Joint Conference on Artifical Intelligence, IJCAI 2007, pp. 1624\u20131628. Morgan Kaufmann Publishers Inc., San Francisco (2007)"},{"key":"48_CR11","doi-asserted-by":"publisher","first-page":"538","DOI":"10.1002\/asi.21001","volume":"60","author":"E. Stamatatos","year":"2009","unstructured":"Stamatatos, E.: A survey of modern authorship attribution methods. Journal of the American Society for Information Science and Technology\u00a060, 538\u2013556 (2009)","journal-title":"Journal of the American Society for Information Science and Technology"},{"key":"48_CR12","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1002\/asi.22954","volume":"65","author":"M. Koppel","year":"2014","unstructured":"Koppel, M., Winter, Y.: Determining if two documents are written by the same author. Journal of the Association for Information Science and Technology\u00a065, 178\u2013187 (2014)","journal-title":"Journal of the Association for Information Science and Technology"},{"key":"48_CR13","first-page":"997","volume-title":"Coling 2010: Posters","author":"M. Potthast","year":"2010","unstructured":"Potthast, M., Stein, B., Barr\u00f3n-Cede\u00f1o, A., Rosso, P.: An evaluation framework for plagiarism detection. In: Coling 2010: Posters, pp. 997\u20131005. Coling 2010 Organizing Committee, Beijing (2010)"}],"container-title":["Lecture Notes in Computer Science","Computational Linguistics and Intelligent Text Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-18117-2_48","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,31]],"date-time":"2023-01-31T02:40:41Z","timestamp":1675132841000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-18117-2_48"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319181165","9783319181172"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-18117-2_48","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}