{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T00:59:12Z","timestamp":1771635552799,"version":"3.50.1"},"reference-count":52,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,5]]},"DOI":"10.1109\/mipro.2016.7522248","type":"proceedings-article","created":{"date-parts":[[2016,8,5]],"date-time":"2016-08-05T13:41:29Z","timestamp":1470404489000},"page":"796-801","source":"Crossref","is-referenced-by-count":21,"title":["Review of source-code plagiarism detection in academia"],"prefix":"10.1109","author":[{"given":"Matija","family":"Novak","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150522"},{"key":"ref38","article-title":"GATE - Ein System zur Verbesserung der Programmierausbildung und zur Unterstutzung von Tutoren","author":"m\u00fcller","year":"2013","journal-title":"Proceedings of the First Workshop &#x201C;Automatische Bewertung von Programmieraufgaben&#x201D; (ABP)"},{"key":"ref33","first-page":"33","article-title":"Plagiarism Detection for Java: A Tool Comparison","author":"hage","year":"0"},{"key":"ref32","first-page":"5020","article-title":"Software Plagiarism Detection Techniques: A Comparative Study","volume":"5","author":"luke","year":"2014"},{"key":"ref31","first-page":"18","article-title":"Source Code Plagiarism Detection&#x2019; SCPD et &#x2018;: A Review","volume":"105","author":"gondaliya","year":"2014"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/11575832_30"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/1315803.1315831"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/384266.299783"},{"key":"ref35","first-page":"97","article-title":"Desktop tools for offline plagiarism detection in computerprograms","volume":"5","author":"mozgovoy","year":"2006","journal-title":"Educ Inform"},{"key":"ref34","first-page":"143","article-title":"Plagiarism detection: A tool survey and comparison","volume":"38","author":"martins","year":"0"},{"key":"ref28","article-title":"Plagiarism Detection Software Test 2013","author":"weber-wulff","year":"2013","journal-title":"Berlin"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/236452.236525"},{"key":"ref29","article-title":"Collusion Detection System Test Report 2012","author":"weber-wulff","year":"2012"},{"key":"ref2","first-page":"116","article-title":"Source-Code Plagiarism: a Uk Academic Perspective","author":"cosma","year":"0"},{"key":"ref1","article-title":"plagiarism","year":"2015","journal-title":"Encyclopcedia Britannica"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/953049.800955"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/201998.202010"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1983.236460"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2013.08.005"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TE.2007.906776"},{"key":"ref26","first-page":"1016","article-title":"Finding plagiarisms among a set of programs with JPlag","volume":"8","author":"prechelt","year":"2002","journal-title":"J Univers Comput Sci"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/872757.872770"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/33.2.140"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1002\/asi.10170"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/2660193.2660226"},{"key":"ref10","first-page":"1","article-title":"Plagiarism in natural and programming languages: an overview of current tools and technologies","author":"clough","year":"2000","journal-title":"University of Sheffield Department of Computer Science Research Memorandum CS"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2632320.2632342"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1002\/spe.750"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1093\/comjnl\/bxs018","article-title":"A Source Code Similarity System for Plagiarism Detection","volume":"56","author":"durie","year":"2013","journal-title":"Comput J"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/13.762946"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/0360-1315(87)90042-X"},{"key":"ref15","first-page":"133","article-title":"Plagiarism in computer sciencecourses","author":"harris","year":"0"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.158"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/382222.382462"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/953363.953366"},{"key":"ref19","author":"halstead","year":"1977","journal-title":"Elements of Software Science (Operating and Programming Systems Series)"},{"key":"ref4","article-title":"Source code plagiarism in UK HE computing schools","author":"culwin","year":"0"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1080\/02602938.2013.870122"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1080\/0260293042000264226"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TE.2010.2046664"},{"key":"ref8","first-page":"161","article-title":"Overview and comparison of plagiarism detection tools","volume":"706","author":"el","year":"0","journal-title":"11th Annual Workshop on Databases Texts Specifications and Objects DATESO 2011 2011"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.15388\/infedu.2014.01"},{"key":"ref49","article-title":"Process model improvement for source code plagiarism detection in student programming assignments","author":"kermek","year":"2015","journal-title":"Educ Inform"},{"key":"ref9","article-title":"Effective and Efficient Plagiarism Detection","author":"lancaster","year":"2003","journal-title":"South Bank University"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2010.19"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-014-0742-2"},{"key":"ref48","author":"gamma","year":"2005","journal-title":"Design Patterns Elements of Reusable Object-Oriented Software"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/IWSC.2013.6613041"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1504\/IJBIDM.2008.020514"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2012.141"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/429807"},{"key":"ref43","first-page":"1","article-title":"Plagiarism detection tool &#x2018;Parikshak","author":"sharma","year":"0"}],"event":{"name":"2016 39th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","location":"Opatija, Croatia","start":{"date-parts":[[2016,5,30]]},"end":{"date-parts":[[2016,6,3]]}},"container-title":["2016 39th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7513176\/7522093\/07522248.pdf?arnumber=7522248","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T16:04:32Z","timestamp":1498320272000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7522248\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5]]},"references-count":52,"URL":"https:\/\/doi.org\/10.1109\/mipro.2016.7522248","relation":{},"subject":[],"published":{"date-parts":[[2016,5]]}}}