{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T02:22:48Z","timestamp":1775010168069,"version":"3.50.1"},"reference-count":35,"publisher":"Elsevier BV","issue":"3","license":[{"start":{"date-parts":[[1997,1,1]],"date-time":"1997-01-01T00:00:00Z","timestamp":852076800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers &amp; Security"],"published-print":{"date-parts":[[1997,1]]},"DOI":"10.1016\/s0167-4048(97)00005-9","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T23:00:05Z","timestamp":1027638005000},"page":"233-257","source":"Crossref","is-referenced-by-count":93,"title":["Authorship analysis: identifying the author of a program"],"prefix":"10.1016","volume":"16","author":[{"given":"Ivan","family":"Krsul","sequence":"first","affiliation":[]},{"given":"Eugene H.","family":"Spafford","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0167-4048(97)00005-9_BIB1","series-title":"Practical Unix Security","author":"Garfinkel","year":"1992"},{"key":"10.1016\/S0167-4048(97)00005-9_BIB2","series-title":"TV Idea of Authorship in America","author":"Dauber","year":"1990"},{"issue":"6","key":"10.1016\/S0167-4048(97)00005-9_BIB3","doi-asserted-by":"crossref","first-page":"585","DOI":"10.1016\/0167-4048(93)90055-A","article-title":"Software forensics: can we track code to its authors?","volume":"12","author":"Weeber","year":"1993","journal-title":"Computers and Security"},{"key":"10.1016\/S0167-4048(97)00005-9_BIB4","article-title":"Authorhip analysis: identifying the author of a program","author":"Krsul","year":"1994"},{"key":"10.1016\/S0167-4048(97)00005-9_BIB5","series-title":"The Shakespeare Controversy","author":"Hope","year":"1992"},{"key":"10.1016\/S0167-4048(97)00005-9_BIB6","series-title":"Seventeenth Annual ACM Computer Science Conference Proceedings","first-page":"320","article-title":"Programming style authorship analysis","author":"Oman","year":"1989"},{"issue":"1","key":"10.1016\/S0167-4048(97)00005-9_BIB7","doi-asserted-by":"crossref","DOI":"10.1145\/66093.66095","article-title":"The internet worm program: an analysis","volume":"19","author":"Spafford","year":"1989","journal-title":"Computer Communication Review"},{"key":"10.1016\/S0167-4048(97)00005-9_BIB8","article-title":"The internet worm program: an analysis","author":"Spafford","year":"1988"},{"issue":"1","key":"10.1016\/S0167-4048(97)00005-9_BIB9","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1016\/0167-4048(93)90013-U","article-title":"Beyond preliminary analysis of the WANK and OILZ worms: a case study of malicious code","volume":"12","author":"Longstaff","year":"1993","journal-title":"Computers and Security"},{"key":"10.1016\/S0167-4048(97)00005-9_BIB10","series-title":"Venetia","author":"Disraeli","year":"1837"},{"key":"10.1016\/S0167-4048(97)00005-9_BIB11","first-page":"501","article-title":"Was the Earl of Oxford the true Shakespeare?","volume":"38","author":"Elliot","year":"1991","journal-title":"Notes and Queries"},{"issue":"8","key":"10.1016\/S0167-4048(97)00005-9_BIB12","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1145\/988241.988245","article-title":"Measurements of program similarity in identical task environments","volume":"19","author":"Berghel","year":"1984","journal-title":"ACM SIGPLAN Notices"},{"key":"10.1016\/S0167-4048(97)00005-9_BIB13","series-title":"Proceedings of the International Conference of Data Engineering","first-page":"534","article-title":"Program complexity and programming style","author":"Evangelist","year":"1984"},{"key":"10.1016\/S0167-4048(97)00005-9_BIB14","series-title":"Fundamentals of Software Engineering","author":"Ghezzi","year":"1991"},{"key":"10.1016\/S0167-4048(97)00005-9_BIB15","series-title":"The Elements of Programming Style","author":"Kernighan","year":"1978"},{"issue":"4","key":"10.1016\/S0167-4048(97)00005-9_BIB16","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1145\/382222.382462","article-title":"An algorithmic approach to the detection and prevention of plagiarism","volume":"8","author":"Ottenstein","year":"1977","journal-title":"ACM SIGCSE Bulletin"},{"issue":"1","key":"10.1016\/S0167-4048(97)00005-9_BIB17","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1145\/953049.800954","article-title":"A tool that detects plagiarism in Pascal programs","volume":"13","author":"Grier","year":"1981","journal-title":"ACM SIGCSE Bulletin"},{"issue":"1","key":"10.1016\/S0167-4048(97)00005-9_BIB18","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1093\/comjnl\/31.1.1","article-title":"Detecting plagiarism in student Pascal programs","volume":"31","author":"Jankowitz","year":"1988","journal-title":"Computer Journal"},{"key":"10.1016\/S0167-4048(97)00005-9_BIB19","series-title":"Proceedings of the Ninth Australian Computer Science Conference","first-page":"231","article-title":"Plague: detection of plagiarism using program structure","author":"Whale","year":"1986"},{"key":"10.1016\/S0167-4048(97)00005-9_BIB20","series-title":"Software Engineering Metrics and Models","author":"Dunsmore","year":"1986"},{"issue":"4","key":"10.1016\/S0167-4048(97)00005-9_BIB21","doi-asserted-by":"crossref","first-page":"287","DOI":"10.1016\/0164-1212(91)90044-7","article-title":"A programming style taxonomy","volume":"15","author":"Oman","year":"1991","journal-title":"Journal of Systems Software"},{"key":"10.1016\/S0167-4048(97)00005-9_BIB22","series-title":"Program Style, Design, Efficiency, Debugging, and Testing","author":"Van Tassel","year":"1978"},{"key":"10.1016\/S0167-4048(97)00005-9_BIB23","series-title":"The Elements of C Programming Style","author":"Ranade","year":"1993"},{"key":"10.1016\/S0167-4048(97)00005-9_BIB24","series-title":"C With Excellence: Programming Proverbs","author":"Ledgard","year":"1987"},{"issue":"3","key":"10.1016\/S0167-4048(97)00005-9_BIB25","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1145\/101085.101095","article-title":"STYLE: an automated program style analyzer for Pascal","volume":"22","author":"Lake","year":"1990","journal-title":"ACM SIGCSE Bulletin"},{"issue":"2","key":"10.1016\/S0167-4048(97)00005-9_BIB26","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1016\/0164-1212(89)90074-5","article-title":"An empirical study of COBOL programs via a style analyzer: the benefits of good programming style","volume":"10","author":"Benander","year":"1989","journal-title":"Journal of Systems and Software"},{"issue":"5","key":"10.1016\/S0167-4048(97)00005-9_BIB27","doi-asserted-by":"crossref","first-page":"506","DOI":"10.1145\/78607.78611","article-title":"Typographic style is more than cosmetic","volume":"33","author":"Oman","year":"1990","journal-title":"Communications of the ACM"},{"key":"10.1016\/S0167-4048(97)00005-9_BIB28","series-title":"Condensed Pascal","author":"Cooper","year":"1987"},{"issue":"1","key":"10.1016\/S0167-4048(97)00005-9_BIB29","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1145\/2465.2469","article-title":"A style analysis of C programs","volume":"28","author":"Berry","year":"1985","journal-title":"Communications of the ACM"},{"key":"10.1016\/S0167-4048(97)00005-9_BIB30","series-title":"Introduction to Automata Theory, Languages, and Computation","author":"Hopcroft","year":"1979"},{"key":"10.1016\/S0167-4048(97)00005-9_BIB31","first-page":"963","article-title":"Code generation interface for ANSI C","volume":"38","author":"Hanson","year":"1991","journal-title":"Software\u2014Practice and Experience"},{"key":"10.1016\/S0167-4048(97)00005-9_BIB32","series-title":"Proceedings of the 18th National Information Systems Security Conference","first-page":"514","article-title":"Authorship analysis: identifying the author of a program","author":"Krsul","year":"1995"},{"key":"10.1016\/S0167-4048(97)00005-9_BIB33","unstructured":"The SAS Institute, SAS\/STAT User's Guide, 1: ANOVA-FREQ, 4th edn."},{"key":"10.1016\/S0167-4048(97)00005-9_BIB34","series-title":"Applied Multivariate Statistical Analysis","author":"Johnson","year":"1988"},{"key":"10.1016\/S0167-4048(97)00005-9_BIB35","author":"Kukolich","year":"1995"}],"container-title":["Computers &amp; Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404897000059?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404897000059?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,13]],"date-time":"2019-04-13T20:53:54Z","timestamp":1555188834000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167404897000059"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1997,1]]},"references-count":35,"journal-issue":{"issue":"3","published-print":{"date-parts":[[1997,1]]}},"alternative-id":["S0167404897000059"],"URL":"https:\/\/doi.org\/10.1016\/s0167-4048(97)00005-9","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[1997,1]]}}}