{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T08:49:49Z","timestamp":1725612589873},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,9]]},"DOI":"10.1109\/icdim.2013.6693984","type":"proceedings-article","created":{"date-parts":[[2014,1,6]],"date-time":"2014-01-06T17:10:38Z","timestamp":1389028238000},"page":"256-261","source":"Crossref","is-referenced-by-count":2,"title":["EPlag: A two layer source code plagiarism detection system"],"prefix":"10.1109","author":[{"given":"Omer","family":"Ajmal","sequence":"first","affiliation":[]},{"given":"M. M.","family":"Saad Missen","sequence":"additional","affiliation":[]},{"given":"Tazeen","family":"Hashmat","sequence":"additional","affiliation":[]},{"given":"M.","family":"Moosa","sequence":"additional","affiliation":[]},{"given":"Tenvir","family":"Ali","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"String Similarity via Greedy String Tiling and Running Karp-Rabin Matching","year":"1993","author":"wise","key":"15"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00234-2"},{"key":"14","article-title":"Detecting plagiarism in java code","author":"granville","year":"2002","journal-title":"Bachelor of Engineering with Honours in Software Engineering"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1976.233837"},{"year":"0","key":"12"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/800037.800955"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/800037.800954"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxh119"},{"journal-title":"An approach to source-code plagiarism detection and investigation using latent semantic analysis","year":"2008","author":"cosma","key":"10"},{"key":"7","article-title":"An XML plagiarism detection model for procedural programming languages","author":"noh","year":"2004","journal-title":"Proceedings of the 2nd International Conference on Computer Science and Its Applications"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1002\/spe.750"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/360018.360025"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/0360-1315(87)90042-X"},{"key":"9","article-title":"A review of electronic services for plagiarism detection in student submissions","author":"culwin","year":"2000","journal-title":"Proceedings of 8th Annual Conference on Teaching of Computing"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1330598.1330642"}],"event":{"name":"2013 Eighth International Conference on Digital Information Management (ICDIM)","start":{"date-parts":[[2013,9,10]]},"location":"Islamabad, Pakistan","end":{"date-parts":[[2013,9,12]]}},"container-title":["Eighth International Conference on Digital Information Management (ICDIM 2013)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6684408\/6693962\/06693984.pdf?arnumber=6693984","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T00:05:32Z","timestamp":1490227532000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6693984\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/icdim.2013.6693984","relation":{},"subject":[],"published":{"date-parts":[[2013,9]]}}}