{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:48:44Z","timestamp":1775069324914,"version":"3.50.1"},"reference-count":108,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1109\/tale48000.2019.9225953","type":"proceedings-article","created":{"date-parts":[[2020,10,15]],"date-time":"2020-10-15T19:58:51Z","timestamp":1602791931000},"page":"1-8","source":"Crossref","is-referenced-by-count":29,"title":["Similarity Detection Techniques for Academic Source Code Plagiarism and Collusion: A Review"],"prefix":"10.1109","author":[{"given":"Oscar","family":"Karnalim","sequence":"first","affiliation":[]},{"family":"Simon","sequence":"additional","affiliation":[]},{"given":"William","family":"Chivers","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2011.223"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/s10791-017-9313-y"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/988241.988245"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/800037.800955"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/800037.800954"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1041606.1041608"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/FSKD.2012.6234186"},{"key":"ref36","article-title":"Sherlock N-Overlap: invasive normalization and overlap coefficient for the similarity analysis between source code","author":"allyson","year":"2018","journal-title":"IEEE Transactions on Computers"},{"key":"ref35","first-page":"253","article-title":"Metrics based plagarism monitoring","volume":"16","author":"jones","year":"2001","journal-title":"Journal of Computing Sciences in Colleges"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/948086.948088"},{"key":"ref28","first-page":"501","article-title":"A low-level structure-based approach for detecting source code plagiarism","volume":"44","author":"karnalim","year":"2017","journal-title":"IAENG International Journal of Computer Science"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1869746.1869766"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/382222.382462"},{"key":"ref20","first-page":"33","article-title":"Plagiarism detection for Java: a tool comparison","author":"hage","year":"2011","journal-title":"2011 Computer Science Education Research Conference"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3286960.3286974"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2998551.2998558"},{"key":"ref24","author":"croft","year":"2010","journal-title":"Search Engines Information Retrieval in Practice"},{"key":"ref23","first-page":"409","article-title":"Evaluating the performance of LSA for source code plagiarism detection","volume":"36","author":"cosma","year":"2012","journal-title":"Informatica"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1145\/1227310.1227324"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9564-7"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1145\/2325296.2325328"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICoICT.2018.8528768"},{"key":"ref50","author":"tan","year":"2006","journal-title":"Introduction to Data Mining"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZ-IEEE.2015.7337935"},{"key":"ref59","author":"mitchell","year":"1997","journal-title":"Machine Learning"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1134\/S0361768817010066"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/BF00994018"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ACPR.2017.146"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/3021460.3021473"},{"key":"ref54","doi-asserted-by":"crossref","DOI":"10.1002\/9780470316801","author":"kaufman","year":"1990","journal-title":"Finding Groups in Data An Introduction to Cluster Analysis"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-014-0742-2"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-0450-1"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/13.762946"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.15388\/infedu.2014.01"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TE.2007.906776"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2013.08.005"},{"key":"ref5","first-page":"1016","article-title":"Finding plagiarisms among a set of programs with JPlag","volume":"8","author":"prechelt","year":"2002","journal-title":"Journal of Universal Computer Science"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/0360-1315(87)90042-X"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1504\/IJBIDM.2008.020514"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/13.28038"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/0164-1212(90)90118-6"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/11575832_30"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1080\/1206212X.2019.1589944"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxh119"},{"key":"ref47","author":"sedgewick","year":"2011","journal-title":"Algorithms"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-5827-6"},{"key":"ref41","first-page":"1708","article-title":"Cross-language source code re-use detection using latent semantic analysis","volume":"21","author":"flores","year":"2015","journal-title":"Journal of Universal Computer Science"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1002\/cae.21608"},{"key":"ref43","first-page":"277","article-title":"Plagiarism detection across programming languages","author":"arwin","year":"2006","journal-title":"29th Australasian Computer Science Conference - Volume 48"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxs018"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1002\/cae.21571"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/SNPD.2009.62"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1145\/1315803.1315831"},{"key":"ref76","article-title":"Neweyes: a system for comparing biological sequences using the running Karp-Rabin greedy string-tiling algorithm","author":"wise","year":"1995","journal-title":"International Conference on Intelligent Systems for Molecular Biology"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1145\/299649.299783"},{"key":"ref74","first-page":"1","article-title":"Plagiarism detection tool &#x201C;Parikshak","author":"sharma","year":"2015","journal-title":"2015 International Conference on Communication Information & Computing Technology"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/6.4.373"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1145\/1268784.1268807"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1145\/1968613.1968643"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2009.5090050"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/2851581.2892512"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2004.830793"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1977.1055714"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-77735-6"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2009.09.040"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/IC3.2017.8284313"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/134510.134564"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2526968.2526971"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/236452.236525"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2632320.2632342"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSE.2010.5593613"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.3390\/computers8010011"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1002\/cae.22066"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1145\/3230977.3231006"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/429807"},{"key":"ref106","first-page":"83","article-title":"An anti-plagiarism editor for software development courses","author":"vamplew","year":"2010","journal-title":"Seventh Australasian Computing Education Conference"},{"key":"ref92","article-title":"Convolution kernels for natural language","author":"collins","year":"2001","journal-title":"Proc of the 15th Annual Conference on Neural Information Processing Systems (NIPS)"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/TLT.2017.2720171"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/7809047"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/FIE.2007.4417860"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/SAMI.2017.7880355"},{"key":"ref103","first-page":"415","article-title":"Online tool for student&#x2019;s source code plagiarism detection","author":"\u017e\u00e1kov\u00e1","year":"2013","journal-title":"11th International Conference on Emerging eLearning Technologies and Applications"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1002\/spe.750"},{"key":"ref98","first-page":"141","article-title":"A cross-platform solution for software plagiarism detection","author":"strile?chi","year":"2016","journal-title":"12th IEEE International Symposium on Electronics and Telecommunications"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/ISNE.2018.8394758"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/31.1.1"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/TE.2007.906778"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1080\/08993400412331363843"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/872757.872770"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"97","DOI":"10.15388\/infedu.2006.08","article-title":"Desktop tools for offline plagiarism detection in computer programs","volume":"5","author":"mozgovoy","year":"2006","journal-title":"Informatics in Education"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MIPRO.2016.7522248"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3313290"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/NGCT.2016.7877421"},{"key":"ref16","first-page":"136","article-title":"Current trends in source code analysis, plagiarism detection and issues of analysis big datasets","author":"?ura?\u00edk","year":"2017","journal-title":"12th International Scientific Conference of Young Scientists on Sustainable Modern and Safe Transport"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSE.2018.8468817"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/33.2.140"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/SNPD.2014.6888733"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/39.9.741"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIT.2008.267"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3162087.3162101"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/ICTS.2016.7910274"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.15388\/infedu.2016.06"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2010.19"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/ICSESS.2017.8342863"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2018.01.012"},{"key":"ref87","article-title":"Detecting source code similarity using low-level languages","author":"juri?i?","year":"2011","journal-title":"33rd Int Conf on Information Technology Interfaces"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.31341\/jios.41.1.7"}],"event":{"name":"2019 IEEE International Conference on Engineering, Technology and Education (TALE)","location":"Yogyakarta, Indonesia","start":{"date-parts":[[2019,12,10]]},"end":{"date-parts":[[2019,12,13]]}},"container-title":["2019 IEEE International Conference on Engineering, Technology and Education (TALE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9220968\/9225848\/09225953.pdf?arnumber=9225953","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,9]],"date-time":"2023-10-09T21:21:08Z","timestamp":1696886468000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9225953\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":108,"URL":"https:\/\/doi.org\/10.1109\/tale48000.2019.9225953","relation":{},"subject":[],"published":{"date-parts":[[2019,12]]}}}