{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T15:44:09Z","timestamp":1767109449995,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2006,5,28]],"date-time":"2006-05-28T00:00:00Z","timestamp":1148774400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,5,28]]},"DOI":"10.1145\/1134285.1134445","type":"proceedings-article","created":{"date-parts":[[2006,7,24]],"date-time":"2006-07-24T16:53:01Z","timestamp":1153759981000},"page":"893-896","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":69,"title":["Effective identification of source code authors using byte-level information"],"prefix":"10.1145","author":[{"given":"Georgia","family":"Frantzeskou","sequence":"first","affiliation":[{"name":"University of the Aegean, Karlovasi, Greece"}]},{"given":"Efstathios","family":"Stamatatos","sequence":"additional","affiliation":[{"name":"University of the Aegean, Karlovasi, Greece"}]},{"given":"Stefanos","family":"Gritzalis","sequence":"additional","affiliation":[{"name":"University of the Aegean, Karlovasi, Greece"}]},{"given":"Sokratis","family":"Katsikas","sequence":"additional","affiliation":[{"name":"University of the Aegean, Karlovasi, Greece"}]}],"member":"320","published-online":{"date-parts":[[2006,5,28]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(03)00049-9"},{"key":"e_1_3_2_1_2_1","volume-title":"Vol 2","author":"Frantzeskou G.","year":"2004","unstructured":"Frantzeskou , G. , Gritzalis , S. , Mac Donell , S. , Source Code Authorship Analysis for supporting the cybercrime investigation process, (ICETE04) , Vol 2 , pages (85-92), 2004 . Frantzeskou, G., Gritzalis, S., Mac Donell, S., Source Code Authorship Analysis for supporting the cybercrime investigation process, (ICETE04), Vol 2, pages (85-92), 2004."},{"key":"e_1_3_2_1_3_1","first-page":"252","volume-title":"Proceedings of SE:E&P'98","author":"Gray A.","year":"1998","unstructured":"Gray , A. , Sallis , P. , and MacDonell , S. ,, Identified : A dictionary-based system for extracting source code metrics for software forensics . In Proceedings of SE:E&P'98 , IEEE Computer Society Press , pages 252 -- 259 ., 1998 . Gray, A., Sallis, P., and MacDonell, S.,, Identified: A dictionary-based system for extracting source code metrics for software forensics. In Proceedings of SE:E&P'98, IEEE Computer Society Press, pages 252--259., 1998."},{"key":"e_1_3_2_1_4_1","first-page":"1","volume-title":"Proc. 3rd Biannual Conf. Int. Assoc. of Forensic Linguists (IAFL'97)","author":"Gray A.","year":"1997","unstructured":"Gray , A. , Sallis , P. , and MacDonell , S. , Software forensics : Extending authorship analysis techniques to computer programs , in Proc. 3rd Biannual Conf. Int. Assoc. of Forensic Linguists (IAFL'97) , pages 1 -- 8 , 1997 . Gray, A., Sallis, P., and MacDonell, S., Software forensics: Extending authorship analysis techniques to computer programs, in Proc. 3rd Biannual Conf. Int. Assoc. of Forensic Linguists (IAFL'97), pages 1--8, 1997."},{"key":"e_1_3_2_1_5_1","volume-title":"Proc","author":"Keselj V.","year":"2003","unstructured":"Keselj , V. , Peng , F. , Cercone , N. , Thomas , C. , N-gram based author profiles for authorship attribution , In Proc . Pacific Association for Computational Linguistics 2003 . Keselj, V., Peng, F., Cercone, N., Thomas, C., N-gram based author profiles for authorship attribution, In Proc. Pacific Association for Computational Linguistics 2003."},{"key":"e_1_3_2_1_6_1","volume-title":"Perl package Text::N-grams http:\/\/www.cs.dal.ca\/~vlado\/srcperl\/N-grams","author":"Keselj V.","year":"2003","unstructured":"Keselj , V. ,. Perl package Text::N-grams http:\/\/www.cs.dal.ca\/~vlado\/srcperl\/N-grams , 2003 . Keselj, V.,. Perl package Text::N-grams http:\/\/www.cs.dal.ca\/~vlado\/srcperl\/N-grams , 2003."},{"key":"e_1_3_2_1_7_1","volume-title":"In Proc. Of (ICONIP'97)","author":"Kilgour R. I.","year":"1997","unstructured":"Kilgour , R. I. , Gray , A.R. , Sallis , P. J. , and MacDonell , S. G., A Fuzzy Logic Approach to Computer Software Source Code Authorship Analysis , Accepted In Proc. Of (ICONIP'97) . Dunedin. New Zealand , 1997 . Kilgour, R. I., Gray, A.R., Sallis, P. J., and MacDonell, S. G., A Fuzzy Logic Approach to Computer Software Source Code Authorship Analysis, Accepted In Proc. Of (ICONIP'97). Dunedin. New Zealand, 1997."},{"key":"e_1_3_2_1_8_1","first-page":"514","volume-title":"Proc. 8th National Information Systems Security Conference","author":"Krsul I.","year":"1995","unstructured":"Krsul , I. , and Spafford , E . H, Authorship analysis: Identifying the author of a program , In Proc. 8th National Information Systems Security Conference , pages 514 -- 524 , National Institute of Standards and Technology. , 1995 . Krsul, I., and Spafford, E. H, Authorship analysis: Identifying the author of a program, In Proc. 8th National Information Systems Security Conference, pages 514--524, National Institute of Standards and Technology., 1995."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(93)90013-U"},{"key":"e_1_3_2_1_10_1","first-page":"113","article-title":"Software forensics applied to the task of discriminating between program authors","volume":"10","author":"MacDonell S.G","year":"2001","unstructured":"MacDonell , S.G , and Gray , A.R . Software forensics applied to the task of discriminating between program authors . Journal of Systems Research and Information Systems 10 : 113 -- 127 ( 2001 ). MacDonell, S.G, and Gray, A.R. Software forensics applied to the task of discriminating between program authors. Journal of Systems Research and Information Systems 10: 113--127 (2001).","journal-title":"Journal of Systems Research and Information Systems"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:INRT.0000011209.19643.e2"},{"key":"e_1_3_2_1_12_1","volume-title":"New Zealand","author":"Sallis P.","year":"1996","unstructured":"Sallis P. , Aakjaer , A. , and MacDonell , S. , Software Forensics: Old Methods for a New Science. Proceedings of SE:E&P'96. Dunedin , New Zealand , IEEE Computer Society Press , 367--371, 1996 . Sallis P., Aakjaer, A., and MacDonell, S., Software Forensics: Old Methods for a New Science. Proceedings of SE:E&P'96. Dunedin, New Zealand, IEEE Computer Society Press, 367--371, 1996."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/66093.66095"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(93)90055-A"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1162\/089120100750105920"}],"event":{"name":"ICSE06: International Conference on Software Engineering","sponsor":["ACM Association for Computing Machinery","SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"Shanghai China","acronym":"ICSE06"},"container-title":["Proceedings of the 28th international conference on Software engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1134285.1134445","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1134285.1134445","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T15:06:25Z","timestamp":1750259185000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1134285.1134445"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,5,28]]},"references-count":15,"alternative-id":["10.1145\/1134285.1134445","10.1145\/1134285"],"URL":"https:\/\/doi.org\/10.1145\/1134285.1134445","relation":{},"subject":[],"published":{"date-parts":[[2006,5,28]]},"assertion":[{"value":"2006-05-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}