{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T04:11:33Z","timestamp":1750824693599,"version":"3.41.0"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319635781"},{"type":"electronic","value":"9783319635798"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-63579-8_22","type":"book-chapter","created":{"date-parts":[[2017,8,2]],"date-time":"2017-08-02T05:02:42Z","timestamp":1501650162000},"page":"282-296","source":"Crossref","is-referenced-by-count":10,"title":["Authorship Identification of Source Codes"],"prefix":"10.1007","author":[{"given":"Chunxia","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Sen","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jiayu","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Zhendong","family":"Niu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,3]]},"reference":[{"key":"22_CR1","doi-asserted-by":"crossref","unstructured":"Kothari, J., Shevertalov, M., Stehle, E., et al.: A probabilistic approach to source code authorship identification. In: 4th International Conference on Information Technology, pp. 243\u2013248 (2007)","DOI":"10.1109\/ITNG.2007.17"},{"issue":"1","key":"22_CR2","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1016\/S0164-1212(03)00049-9","volume":"72","author":"H Ding","year":"2004","unstructured":"Ding, H., Samadzadeh, M.H.: Extraction of java program fingerprints for software authorship identification. J. Syst. Softw. 72(1), 49\u201357 (2004)","journal-title":"J. Syst. Softw."},{"key":"22_CR3","doi-asserted-by":"crossref","unstructured":"Lange, R., Mancoridis, S.: Using code metric histograms and genetic algorithms to perform author identification for software forensics. In: 9th Annual Conference on Genetic and Evolutionary Computation, pp. 2082\u20132089 (2007)","DOI":"10.1145\/1276958.1277364"},{"key":"22_CR4","doi-asserted-by":"crossref","unstructured":"Tennyson, M.F.: On improving authorship attribution of source code. In: International Conference on Digital Forensics and Cyber Crime, pp. 58\u201365 (2012)","DOI":"10.1007\/978-3-642-39891-9_4"},{"key":"22_CR5","unstructured":"Gray, A., Sallis, P., MacDonell, S.: Identified: a dictionary-based system for extracting source code metrics for software forensics. In: International Conference on Software Engineering: Education and Practice, pp. 252\u2013259 (1998)"},{"key":"22_CR6","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1016\/j.knosys.2014.04.025","volume":"66","author":"C Zhang","year":"2014","unstructured":"Zhang, C., Wu, X., Niu, Z., et al.: Authorship identification from unstructured texts. Knowl.-Based Syst. 66, 99\u2013111 (2014)","journal-title":"Knowl.-Based Syst."},{"key":"22_CR7","doi-asserted-by":"crossref","unstructured":"Tennyson, M.F., Mitropoulos, F.J.: A bayesian ensemble classifier for source code authorship attribution. In: International Conference on Similarity Search and Applications, pp. 265\u2013276 (2014)","DOI":"10.1007\/978-3-319-11988-5_25"},{"issue":"3","key":"22_CR8","doi-asserted-by":"crossref","first-page":"538","DOI":"10.1002\/asi.21001","volume":"60","author":"E Stamatatos","year":"2009","unstructured":"Stamatatos, E.: A survey of modern authorship attribution methods. J. Am. Soc. Inf. Sci. Technol. 60(3), 538\u2013556 (2009)","journal-title":"J. Am. Soc. Inf. Sci. Technol."},{"key":"22_CR9","doi-asserted-by":"crossref","first-page":"585","DOI":"10.1016\/0167-4048(93)90055-A","volume":"12","author":"EH Spafford","year":"1993","unstructured":"Spafford, E.H., Weeber, S.A.: Software forensics: tracking code to its authors. Comput. Secur. 12, 585\u2013595 (1993)","journal-title":"Comput. Secur."},{"key":"22_CR10","unstructured":"Software Forensics. http:\/\/en.wikipedia.org\/wiki\/Software_forensics"},{"issue":"3","key":"22_CR11","doi-asserted-by":"crossref","first-page":"330","DOI":"10.1016\/j.patrec.2012.10.027","volume":"34","author":"U Bandara","year":"2013","unstructured":"Bandara, U., Wijayarathna, G.: Source code author identification with unsupervised feature learning. Pattern Recogn. Lett. 34(3), 330\u2013334 (2013)","journal-title":"Pattern Recogn. Lett."},{"key":"22_CR12","doi-asserted-by":"crossref","unstructured":"MacDonell, S., Gray, M., MacLennan, G., Sallis, P.: Software forensics for discriminating between program authors using case-based reasoning, feed-forward neural networks and multiple discriminant analysis. In: 6th International Conference on Neural Information Processing, pp. 66\u201371 (1999)","DOI":"10.1109\/ICONIP.1999.843963"},{"key":"22_CR13","unstructured":"Burrows, S., Tahaghoghi, S.M.M.: Source code authorship attribution using n-grams. In: 12th Australasian Document Computing Symposium, pp. 32\u201339 (2007)"},{"issue":"1","key":"22_CR14","first-page":"1","volume":"44","author":"S Burrows","year":"2014","unstructured":"Burrows, S., Uitdenbogerd, A.L., Turpin, A.: Comparing techniques for authorship attribution of source code. Softw.: Pract. Exp. 44(1), 1\u201332 (2014)","journal-title":"Softw.: Pract. Exp."},{"key":"22_CR15","doi-asserted-by":"crossref","unstructured":"Bandara, U., Wijayarathna, G.: Deep neural networks for source code author identification. In: International Conference on Neural Information Processing, pp. 368\u2013375 (2013)","DOI":"10.1007\/978-3-642-42042-9_46"},{"key":"22_CR16","doi-asserted-by":"crossref","unstructured":"Frantzeskou, G., Stamatatos, E., Gritzalis, S.: Supporting the cybercrime investigation process: effective discrimination of source code authors based on byte-level information. In: 2nd International Conference on E-business and Telecommunication Networks, pp. 163\u2013173 (2005)","DOI":"10.1007\/978-3-540-75993-5_14"},{"key":"22_CR17","doi-asserted-by":"crossref","unstructured":"Frantzeskou, G., Gritzalis, S., MacDonell, S.G.: Source code authorship analysis for supporting the cybercrime investigation process. In: 1st International Conference on E-business and Telecommunication Networks, pp. 85\u201392 (2004)","DOI":"10.5220\/0001390300850092"},{"key":"22_CR18","unstructured":"Krsul, I.: Authorship analysis: identifying the author of a program. Technical report TR-94-030, Purdue University (1994)"},{"issue":"2","key":"22_CR19","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1002\/spe.750","volume":"37","author":"S Burrows","year":"2007","unstructured":"Burrows, S., Tahaghoghi, S.M.M., Zobel, J.: Efficient plagiarism detection for large code repositories. Softw.-Pract. Exp. 37(2), 151\u2013175 (2007)","journal-title":"Softw.-Pract. Exp."},{"key":"22_CR20","doi-asserted-by":"crossref","unstructured":"Burrows, S., Uitdenbogerd, A.L., Turpin, A.: Temporally robust software features for authorship attribution. In: 33rd Annual International Computer Software and Applications Conference, pp. 599\u2013606 (2009)","DOI":"10.1109\/COMPSAC.2009.85"},{"key":"22_CR21","unstructured":"Burrows, S.: Source code authorship attribution. Ph.D. thesis. RMIT University, Melbourne, Australia (2010)"},{"key":"22_CR22","doi-asserted-by":"crossref","unstructured":"Burrows, S., Uitdenbogerd, A.L., Turpin, A.: Application of information retrieval techniques for source code authorship attribution. In: 14th International Conference on Database Systems for Advanced Applications, pp. 699\u2013713 (2009)","DOI":"10.1007\/978-3-642-00887-0_61"},{"issue":"1","key":"22_CR23","first-page":"1","volume":"6","author":"G Frantzeskou","year":"2007","unstructured":"Frantzeskou, G., Stamatatos, E., Gritzalis, S., et al.: Identifying authorship by byte-level n-grams: the source code author profile (SCAP) method. Int. J. Digit. Evid. 6(1), 1\u201318 (2007)","journal-title":"Int. J. Digit. Evid."},{"issue":"3","key":"22_CR24","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1016\/S0167-4048(97)00005-9","volume":"16","author":"I Krsul","year":"1997","unstructured":"Krsul, I., Spafford, E.H.: Authorship analysis: identifying the author of a program. Comput. Secur. 16(3), 233\u2013257 (1997)","journal-title":"Comput. Secur."},{"issue":"3","key":"22_CR25","first-page":"50","volume":"23","author":"BS Elenbogen","year":"2008","unstructured":"Elenbogen, B.S., Seliya, N.: Detecting outsourced student programming assignments. J. Comput. Sci. Coll. 23(3), 50\u201357 (2008)","journal-title":"J. Comput. Sci. Coll."},{"key":"22_CR26","doi-asserted-by":"crossref","unstructured":"Shevertalov, M., Kothari, J., Stehle, E., Mancoridis, S.: On the use of discretised source code metrics for author identification. In: 1st International Symposium on Search Based Software Engineering, pp. 69\u201378 (2009)","DOI":"10.1109\/SSBSE.2009.18"},{"key":"22_CR27","unstructured":"N-gram. http:\/\/en.wikipedia.org\/wiki\/N-gram"},{"key":"22_CR28","unstructured":"Platt, J.: Sequential minimal optimization: a fast algorithm for training support vector machines (1998). http:\/\/citeseerx.ist.psu.edu\/viewdoc\/summary?doi=10.1.1.55.560"},{"key":"22_CR29","unstructured":"Sequential minimal optimization. http:\/\/en.wikipedia.org\/wiki\/Sequential_minimal_optimization"},{"key":"22_CR30","unstructured":"Sequential minimal optimization. http:\/\/blog.csdn.net\/yclzh0522\/article\/details\/6900707"}],"container-title":["Lecture Notes in Computer Science","Web and Big Data"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-63579-8_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T19:55:53Z","timestamp":1750794953000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-63579-8_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319635781","9783319635798"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-63579-8_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}