{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T19:21:55Z","timestamp":1749842515853,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1109\/icdim.2007.4444207","type":"proceedings-article","created":{"date-parts":[[2008,7,23]],"date-time":"2008-07-23T13:49:26Z","timestamp":1216820966000},"page":"98-103","source":"Crossref","is-referenced-by-count":4,"title":["Understanding the evolution process of program source for investigating software authorship and plagiarism"],"prefix":"10.1109","author":[{"family":"Jeonghoon Ji","sequence":"first","affiliation":[]},{"family":"Suhyun Park","sequence":"additional","affiliation":[]},{"family":"Gyun Woo","sequence":"additional","affiliation":[]},{"family":"Hwangue Cho","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(97)00005-9"},{"key":"ref11","first-page":"37","article-title":"Similarity and originality in code: Plagisrism and normal variation in student assignment","author":"mann","year":"2006","journal-title":"Proceedings of the 8th Austalian conference on Computing education"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/75427.75469"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SEEP.1996.534037"},{"key":"ref14","first-page":"1016","article-title":"Finding plagiarisms among a set of programs with JPlag","volume":"8","author":"prechelt","year":"2002","journal-title":"J of Universal Computer Science"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/369585.369598"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(03)00049-9"},{"key":"ref3","article-title":"Addressing student cheating: definitions and solutions","volume":"35","author":"dict","year":"2003","journal-title":"ACM SIGCSE Bulletin archive"},{"key":"ref6","first-page":"4","article-title":"Software forensics: Extending authorship analysis techniques to computer programs","author":"gray","year":"0","journal-title":"International Association of Forensic Linguists"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1006\/jagm.1997.0897"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/32.799945"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1268784.1268807"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1047344.1047473"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/S0360-1315(03)00030-7"},{"key":"ref9","article-title":"A fuzzy logic approach to computer software source code authorship analysis","author":"kilgour","year":"0","journal-title":"Proc of Asian Pacific Neural Network Assembly"}],"event":{"name":"2007 2nd International Conference on Digital Information Management","start":{"date-parts":[[2007,10,28]]},"location":"Lyon, France","end":{"date-parts":[[2007,10,31]]}},"container-title":["2007 2nd International Conference on Digital Information Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4444189\/4444190\/04444207.pdf?arnumber=4444207","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T20:35:55Z","timestamp":1489696555000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4444207\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/icdim.2007.4444207","relation":{},"subject":[],"published":{"date-parts":[[2007]]}}}