{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T21:02:00Z","timestamp":1774472520201,"version":"3.50.1"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2014,6,1]],"date-time":"2014-06-01T00:00:00Z","timestamp":1401580800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2014,6,1]],"date-time":"2014-06-01T00:00:00Z","timestamp":1401580800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1109\/icis.2014.6912125","type":"proceedings-article","created":{"date-parts":[[2014,9,30]],"date-time":"2014-09-30T16:27:14Z","timestamp":1412094434000},"page":"157-162","source":"Crossref","is-referenced-by-count":18,"title":["Machine learning tool and meta-heuristic based on genetic algorithms for plagiarism detection over mail service"],"prefix":"10.1109","author":[{"given":"Hadj Ahmed","family":"Bouarara","sequence":"first","affiliation":[{"name":"GeCode Laboratory, Department of Computer Science, Tahar Moulay University of Saida Algeria"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Amine","family":"Rahmani","sequence":"additional","affiliation":[{"name":"GeCode Laboratory, Department of Computer Science, Tahar Moulay University of Saida Algeria"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Reda Mohamed","family":"Hamou","sequence":"additional","affiliation":[{"name":"GeCode Laboratory, Department of Computer Science, Tahar Moulay University of Saida Algeria"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Abdelmalek","family":"Amine","sequence":"additional","affiliation":[{"name":"GeCode Laboratory, Department of Computer Science, Tahar Moulay University of Saida Algeria"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref10","first-page":"19","article-title":"Using WordNet-based semantic similarity measurement in External Plagiarism Detection","author":"palkovskii","year":"2011","journal-title":"Proceedings of the Conference on Multilingual and Multimodal Information Access Evaluation 2011"},{"key":"ref11","first-page":"359","article-title":"Plagiarism Detection without Reference Collections","author":"meyer","year":"2007","journal-title":"34th Annual Conference of the German Classification Society (GFKL)"},{"key":"ref12","article-title":"AttributeBased Encryption for Fine-Grained Access Control of Encrypted Data","author":"goyal","year":"2006","journal-title":"Conference on Computer and Communications Security Proceedings of the 13th ACM conference on Computer and communications security"},{"key":"ref13","first-page":"41","article-title":"Private &#x201C;Information Retrival","author":"chor","year":"1995","journal-title":"36th IEEE Conference on the Foundations of Computer Science (FOCS)"},{"key":"ref14","first-page":"34","article-title":"Putting Ourselves in SME's Shoes: Automatic Detection of Plagiarism by the WCopyFind Tool","volume":"502","author":"balaguer","year":"2009","journal-title":"proceeding of the SEPLN '09 work shop on incovering plagiarisme authorship and social misuese san sebastian (donostia)"},{"key":"ref15","article-title":"Query Optimization Issues for Data Retrieval in Cloud Computing","author":"samatha","year":"2009","journal-title":"International Journal of Computational Engineering Research"},{"key":"ref16","article-title":"an Optimistic Approach for Query Construction and Execution in Cloud Computing Environment","author":"rao","year":"2013","journal-title":"International Journal of Advanced Research in Computer Science and Software Engineering"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2008.2008797"},{"key":"ref18","volume":"13","year":"2012"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.4018\/jaec.2013040104"},{"key":"ref4","first-page":"19","article-title":"Using Clustering to Identify Outlier Chunks of Text.2011","author":"akiva","year":"2011","journal-title":"CLEF 2011 Conference on Multilingual and Multimodal Information Access Evaluation Amsterdam"},{"key":"ref3","first-page":"19","article-title":"A plagiarism detection procedure in three steps: selection, matches and squares","volume":"502","author":"basile","year":"2009","journal-title":"proceeding of the SEPLN '09 pan 09 3rd workshop and 1st international comp&#x00E9;tition on plagiarism san sebastian (donostia)"},{"key":"ref6","first-page":"19","article-title":"Rule Based Plagiarism Detection using Information Retrieval","author":"ghosh","year":"2011","journal-title":"CLEF 2011 Conference on Multilingual and Multimodal Information Access Evaluation Amsterdam"},{"key":"ref5","first-page":"24","article-title":"Finding Plagiarism by Evaluating Document Similarities","volume":"502","author":"kasprzak","year":"2009","journal-title":"proceeding of the SEPLN '09 pan 09 3rd workshop and 1st international comp&#x00E9;tition on plagiarism san sebastian (donostia)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3115\/1609829.1609836"},{"key":"ref7","first-page":"38","article-title":"Intrinsic Plagiarism Detection Using Character n-gram Profiles","volume":"502","author":"stamatatos","year":"2009","journal-title":"proceeding of the SEPLN '09 pan 09 3rd workshop and 1st international comp&#x00E9;tition on plagiarism san sebastian (donostia)"},{"key":"ref2","first-page":"47","article-title":"external and interstinc plagiarism detection using vector space model","author":"zechner","year":"2009","journal-title":"proceeding of the SEPLN '09 pan 09 3rd workshop and 1st international comp&#x00E9;tition on plagiarism san sebastian (donostia)"},{"key":"ref1","first-page":"39","article-title":"Security Issues for Cloud Computing","author":"hamlem","year":"2010","journal-title":"International Journal of Information Security and Privacy"},{"key":"ref9","volume":"23","year":"2013"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.4018\/jalr.2012070101"}],"event":{"name":"2014 IEEE\/ACIS 13th International Conference on Computer and Information Science (ICIS)","location":"Taiyuan, China","start":{"date-parts":[[2014,6,4]]},"end":{"date-parts":[[2014,6,6]]}},"container-title":["2014 IEEE\/ACIS 13th International Conference on Computer and Information Science (ICIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6905924\/6912089\/06912125.pdf?arnumber=6912125","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T19:54:22Z","timestamp":1774468462000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6912125\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/icis.2014.6912125","relation":{},"subject":[],"published":{"date-parts":[[2014,6]]}}}