{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T09:26:41Z","timestamp":1730280401962,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,7]]},"DOI":"10.1109\/jcsse.2019.8864196","type":"proceedings-article","created":{"date-parts":[[2019,10,14]],"date-time":"2019-10-14T20:07:31Z","timestamp":1571083651000},"page":"271-276","source":"Crossref","is-referenced-by-count":3,"title":["Identifying an original copy of the source codes in programming assignments"],"prefix":"10.1109","author":[{"given":"Chawalit","family":"Saoban","sequence":"first","affiliation":[]},{"given":"Sunisa","family":"Rimcharoen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TLT.2017.2720171"},{"key":"ref11","first-page":"809","article-title":"Generating pylogenetic tree of homogeneous source code in a plagiarism detection system","volume":"6","author":"ji","year":"2008","journal-title":"International Journal of Control Automation and Systems"},{"key":"ref12","first-page":"1","article-title":"A comparison of plagiarism detection tools","volume":"28","author":"hage","year":"2010","journal-title":"Utrecht University Utrecht Netherlands"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3286960.3286974"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/872757.872770"},{"key":"ref15","first-page":"864","article-title":"Het detecteren van kopie&#x00EB;n bij informatica-practica","volume":"31","author":"grune","year":"1989","journal-title":"Informatie"},{"key":"ref4","article-title":"A Machine Learning Based Tool for Source Code Plagiarism Detection","volume":"1","author":"bandata","year":"2011","journal-title":"International Journal of Machine Learning and Computing"},{"key":"ref3","first-page":"277","article-title":"Plagiarism Detection across Programming Languages","volume":"48","author":"arwin","year":"2006","journal-title":"Australasin Conputer Science Conferenc"},{"key":"ref6","first-page":"499","article-title":"Scalable Source Code Plagiarism Detection Using Source Code Vectors Clustering","author":"?ura?ik","year":"2018","journal-title":"2018 IEEE 9th International Conference on Software Engineering and Service Science)ICSESS("},{"key":"ref5","first-page":"1016","article-title":"Finding plagiarisms among a set of programs with JPlag","volume":"8","author":"prechelt","year":"2002","journal-title":"J UCS"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.7763\/IJMLC.2011.V1.50"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SIIE.2018.8586700"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/0360-1315(87)90042-X"},{"year":"0","key":"ref1"},{"key":"ref9","first-page":"4729","article-title":"A two-step in-class source code plagiarism detection method utilizing improved CM algorithm and SIM","volume":"7","author":"ohno","year":"2011","journal-title":"International Journal of Innovative Computing Information and Control"}],"event":{"name":"2019 16th International Joint Conference on Computer Science and Software Engineering (JCSSE)","start":{"date-parts":[[2019,7,10]]},"location":"Chonburi, Thailand","end":{"date-parts":[[2019,7,12]]}},"container-title":["2019 16th International Joint Conference on Computer Science and Software Engineering (JCSSE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8854238\/8864149\/08864196.pdf?arnumber=8864196","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,17]],"date-time":"2022-07-17T17:51:44Z","timestamp":1658080304000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8864196\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/jcsse.2019.8864196","relation":{},"subject":[],"published":{"date-parts":[[2019,7]]}}}