{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T15:32:07Z","timestamp":1776094327823,"version":"3.50.1"},"reference-count":182,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T00:00:00Z","timestamp":1558396800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Comput. Educ."],"published-print":{"date-parts":[[2019,9,30]]},"abstract":"<jats:p>Teachers deal with plagiarism on a regular basis, so they try to prevent and detect plagiarism, a task that is complicated by the large size of some classes. Students who cheat often try to hide their plagiarism (obfuscate), and many different similarity detection engines (often called plagiarism detection tools) have been built to help teachers. This article focuses only on plagiarism detection and presents a detailed systematic review of the field of source-code plagiarism detection in academia. This review gives an overview of definitions of plagiarism, plagiarism detection tools, comparison metrics, obfuscation methods, datasets used for comparison, and algorithm types. Perspectives on the meaning of source-code plagiarism detection in academia are presented, together with categorisations of the available detection tools and analyses of their effectiveness. While writing the review, some interesting insights have been found about metrics and datasets for quantitative tool comparison and categorisation of detection algorithms. Also, existing obfuscation methods classifications have been expanded together with a new definition of \u201csource-code plagiarism detection in academia.\u201d<\/jats:p>","DOI":"10.1145\/3313290","type":"journal-article","created":{"date-parts":[[2019,5,23]],"date-time":"2019-05-23T18:01:38Z","timestamp":1558634498000},"page":"1-37","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":93,"title":["Source-code Similarity Detection and Detection Tools Used in Academia"],"prefix":"10.1145","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9501-7299","authenticated-orcid":false,"given":"Matija","family":"Novak","sequence":"first","affiliation":[{"name":"Faculty of Organization and Informatics, University of Zagreb, Croatia"}]},{"given":"Mike","family":"Joy","sequence":"additional","affiliation":[{"name":"University of Warwick, Department of Computer Science, United Kingdom"}]},{"given":"Dragutin","family":"Kermek","sequence":"additional","affiliation":[{"name":"Faculty of Organization and Informatics, University of Zagreb, Croatia"}]}],"member":"320","published-online":{"date-parts":[[2019,5,21]]},"reference":[{"key":"e_1_2_1_1_1","first-page":"297","article-title":"Plagiarism and programming: A survey of student attitudes","volume":"23","author":"Aasheim C. L.","year":"2012","unstructured":"C. L. Aasheim , P. S. Rutner , L. Li , and S. R. Williams . 2012 . Plagiarism and programming: A survey of student attitudes . J. Inf. Syst. Educ. 23 , 3 (2012), 297 -- 314 . C. L. Aasheim, P. S. Rutner, L. Li, and S. R. Williams. 2012. Plagiarism and programming: A survey of student attitudes. J. Inf. Syst. Educ. 23, 3 (2012), 297--314.","journal-title":"J. Inf. Syst. Educ."},{"key":"e_1_2_1_2_1","volume-title":"Proceedings of the IEEE International Conference on Fuzzy Systems. IEEE, 1--8.","author":"Acampora G.","unstructured":"G. Acampora and G. Cosma . 2015. A Fuzzy-based approach to programming language independent source-code plagiarism detection . In Proceedings of the IEEE International Conference on Fuzzy Systems. IEEE, 1--8. G. Acampora and G. Cosma. 2015. A Fuzzy-based approach to programming language independent source-code plagiarism detection. In Proceedings of the IEEE International Conference on Fuzzy Systems. IEEE, 1--8."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315803.1315831"},{"key":"e_1_2_1_4_1","volume-title":"Proceedings of the 8th International Conference on Digital Information Management. IEEE, 256--261","author":"Ajmal O.","unstructured":"O. Ajmal , M. M. Saad Missen , T. Hashmat , M. Moosa , and T. Ali . 2013. EPlag: A two layer source code plagiarism detection system . In Proceedings of the 8th International Conference on Digital Information Management. IEEE, 256--261 . O. Ajmal, M. M. Saad Missen, T. Hashmat, M. Moosa, and T. Ali. 2013. EPlag: A two layer source code plagiarism detection system. In Proceedings of the 8th International Conference on Digital Information Management. IEEE, 256--261."},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1869746.1869766"},{"key":"e_1_2_1_6_1","first-page":"23","article-title":"Issues related to the detection of source code plagiarism in students assignments","volume":"8","author":"Alsmadi I.","year":"2014","unstructured":"I. Alsmadi , I. AlHami , and S. Kazakzeh . 2014 . Issues related to the detection of source code plagiarism in students assignments . Int. J. Softw. Eng. Appl. 8 , 4 (2014), 23 -- 34 . I. Alsmadi, I. AlHami, and S. Kazakzeh. 2014. Issues related to the detection of source code plagiarism in students assignments. Int. J. Softw. Eng. Appl. 8, 4 (2014), 23--34.","journal-title":"Int. J. Softw. Eng. Appl."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.02.143"},{"key":"e_1_2_1_8_1","volume-title":"Proceedings of 2012 International Conference on Interactive Mobile and Computer Aided Learning. IEEE, 180--186","author":"Arabyarmohamady S.","unstructured":"S. Arabyarmohamady , H. Moradi , and M. Asadpour . 2012. A coding style-based plagiarism detection . In Proceedings of 2012 International Conference on Interactive Mobile and Computer Aided Learning. IEEE, 180--186 . S. Arabyarmohamady, H. Moradi, and M. Asadpour. 2012. A coding style-based plagiarism detection. In Proceedings of 2012 International Conference on Interactive Mobile and Computer Aided Learning. IEEE, 180--186."},{"key":"e_1_2_1_9_1","volume-title":"Proceedings of the 29th Australasian Computer Science Conference","volume":"48","author":"Arwin C.","year":"2006","unstructured":"C. Arwin and S. M. M. Tahaghoghi . 2006 . Plagiarism detection across programming languages . In Proceedings of the 29th Australasian Computer Science Conference , Vol. 48 . 277--286. C. Arwin and S. M. M. Tahaghoghi. 2006. Plagiarism detection across programming languages. In Proceedings of the 29th Australasian Computer Science Conference, Vol. 48. 277--286."},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2012.141"},{"key":"e_1_2_1_11_1","volume-title":"Proceedings of the International Conference on Computation of Power, Energy, Information and Communication. IEEE, 462--467","author":"Baby J.","unstructured":"J. Baby , Kannan T, Vinod P, and V. Gopal . 2014. Distance indices for the detection of similarity in C programs . In Proceedings of the International Conference on Computation of Power, Energy, Information and Communication. IEEE, 462--467 . J. Baby, Kannan T, Vinod P, and V. Gopal. 2014. Distance indices for the detection of similarity in C programs. In Proceedings of the International Conference on Computation of Power, Energy, Information and Communication. IEEE, 462--467."},{"key":"e_1_2_1_12_1","volume-title":"Proceedings of the 15th International Conference on Information Processing and Management of Uncertainty in Knowledge-based Systems.","volume":"444","author":"Bartoszuk M.","unstructured":"M. Bartoszuk and M. Gagolewski . 2014. A Fuzzy R code similarity detection algorithm . In Proceedings of the 15th International Conference on Information Processing and Management of Uncertainty in Knowledge-based Systems. Vol. 444 . CCIS, 21--30. M. Bartoszuk and M. Gagolewski. 2014. A Fuzzy R code similarity detection algorithm. In Proceedings of the 15th International Conference on Information Processing and Management of Uncertainty in Knowledge-based Systems. Vol. 444. CCIS, 21--30."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1002\/cae.21571"},{"key":"e_1_2_1_14_1","volume-title":"Computer assistance in detecting plagiarsim in student programs","author":"Blackwell F. W.","unstructured":"F. W. Blackwell . 1980. Computer assistance in detecting plagiarsim in student programs . California Education Computer Consortium , 28--30. F. W. Blackwell. 1980. Computer assistance in detecting plagiarsim in student programs. California Education Computer Consortium, 28--30."},{"key":"e_1_2_1_15_1","volume-title":"Proceedings of the 4th International Conference on Computer Supported Education","volume":"2","author":"Bosni\u0107 I.","year":"2012","unstructured":"I. Bosni\u0107 , B. Mihaljevi\u0107 , M. Orli\u0107 , and M. \u017dagar . 2012 . Source code validation and plagiarism detection: Technology-rich course experiences . In Proceedings of the 4th International Conference on Computer Supported Education , Vol. 2 . 149--154. I. Bosni\u0107, B. Mihaljevi\u0107, M. Orli\u0107, and M. \u017dagar. 2012. Source code validation and plagiarism detection: Technology-rich course experiences. In Proceedings of the 4th International Conference on Computer Supported Education, Vol. 2. 149--154."},{"key":"e_1_2_1_16_1","volume-title":"Proceedings of the 29th Annual Frontiers in Education Conference: Designing the Future of Science and Engineering Education","volume":"3","author":"Bowyer K. W.","unstructured":"K. W. Bowyer and L. O. Hall . 1999. Experience using \u201cMOSS\u201d to detect cheating on programming assignments . In Proceedings of the 29th Annual Frontiers in Education Conference: Designing the Future of Science and Engineering Education , Vol. 3 . Stripes Publishing L.L.C, San Juan, Puerto Rico, USA, 13B3\/18--13B3\/22. K. W. Bowyer and L. O. Hall. 1999. Experience using \u201cMOSS\u201d to detect cheating on programming assignments. In Proceedings of the 29th Annual Frontiers in Education Conference: Designing the Future of Science and Engineering Education, Vol. 3. Stripes Publishing L.L.C, San Juan, Puerto Rico, USA, 13B3\/18--13B3\/22."},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2011.06.002"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2006.07.009"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2010.19"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/1228662.1228664"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICEEE.2012.6421180"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2008.2008797"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICM.2011.240"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSACW.2010.56"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2004.830793"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2012.11.008"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1839379.1839453"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sbspro.2010.03.478"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TE.2011.2112768"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1389095.1389380"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TE.2007.906776"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2011.223"},{"key":"e_1_2_1_34_1","first-page":"409","article-title":"Evaluating the performance of LSA for source-code plagiarism detection","volume":"36","author":"Cosma G.","year":"2012","unstructured":"G. Cosma and M. Joy . 2012 . Evaluating the performance of LSA for source-code plagiarism detection . Informatica (Slovenia) 36 , 4 (2012), 409 -- 424 . G. Cosma and M. Joy. 2012. Evaluating the performance of LSA for source-code plagiarism detection. Informatica (Slovenia) 36, 4 (2012), 409--424.","journal-title":"Informatica (Slovenia)"},{"key":"e_1_2_1_35_1","volume-title":"Proceedings of the 2nd Annual LTSN-ICS Conference. LTSN Centre for Information and Computer Sciences","author":"Culwin Fintan","year":"2001","unstructured":"Fintan Culwin , Anna Macleod , and Thomas Lancaster . 2001 . Source code plagiarism in UK HE computing schools . In Proceedings of the 2nd Annual LTSN-ICS Conference. LTSN Centre for Information and Computer Sciences , London, United Kingdom. Fintan Culwin, Anna Macleod, and Thomas Lancaster. 2001. Source code plagiarism in UK HE computing schools. In Proceedings of the 2nd Annual LTSN-ICS Conference. LTSN Centre for Information and Computer Sciences, London, United Kingdom."},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxh139"},{"key":"e_1_2_1_37_1","unstructured":"Merriam-Webster Online Dictionary. 2017. Plagiarsim. Retrieved from https:\/\/www.merriam-webster.com\/dictionary\/plagiarize. Merriam-Webster Online Dictionary. 2017. Plagiarsim. Retrieved from https:\/\/www.merriam-webster.com\/dictionary\/plagiarize."},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2851581.2892512"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/953049.800955"},{"key":"e_1_2_1_40_1","first-page":"70","article-title":"Entropy based verification of academic integrity","volume":"19","author":"Doyle T. E.","year":"2009","unstructured":"T. E. Doyle , Q. Sheng , and A. Ieta . 2009 . Entropy based verification of academic integrity . Comput. Educ. J. 19 , 1 (2009), 70 -- 76 . T. E. Doyle, Q. Sheng, and A. Ieta. 2009. Entropy based verification of academic integrity. Comput. Educ. J. 19, 1 (2009), 70--76.","journal-title":"Comput. Educ. J."},{"key":"e_1_2_1_41_1","volume-title":"Proceedings of the 5th International Conference on Computer Science 8 Education. IEEE, 356--361","author":"Menai M. El Bachir","unstructured":"M. El Bachir Menai and N. S. Al-Hassoun . 2010. Similarity detection in Java programming assignments . In Proceedings of the 5th International Conference on Computer Science 8 Education. IEEE, 356--361 . M. El Bachir Menai and N. S. Al-Hassoun. 2010. Similarity detection in Java programming assignments. In Proceedings of the 5th International Conference on Computer Science 8 Education. IEEE, 356--361."},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/0360-1315(87)90042-X"},{"key":"e_1_2_1_43_1","volume-title":"Proceedings of the International Conference on Internet Computing","volume":"1","author":"Fiaidhi J.","unstructured":"J. Fiaidhi , S. Mohammed , and Z. AlKhanjari . 2003. Designing a vortal for detecting Java programs cyberplagiarism . In Proceedings of the International Conference on Internet Computing , Vol. 1 , 252--256. J. Fiaidhi, S. Mohammed, and Z. AlKhanjari. 2003. Designing a vortal for detecting Java programs cyberplagiarism. In Proceedings of the International Conference on Internet Computing, Vol. 1, 252--256."},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1002\/cae.21608"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934732.2934738"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2824864.2824878"},{"key":"e_1_2_1_47_1","volume-title":"Proceedings of the 7th Forum for Inform. Retrieval Eval. 4--6.","author":"Flores E.","unstructured":"E. Flores , P. Rosso , L. Moreno , and E. Villatoro-Tello . 2015. Pan@fire2015: Overview of cl-soco track on the detection of cross-language source code re-use . In Proceedings of the 7th Forum for Inform. Retrieval Eval. 4--6. E. Flores, P. Rosso, L. Moreno, and E. Villatoro-Tello. 2015. Pan@fire2015: Overview of cl-soco track on the detection of cross-language source code re-use. In Proceedings of the 7th Forum for Inform. Retrieval Eval. 4--6."},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.15388\/infedu.2014.01"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1385569.1385644"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2824864.2824887"},{"key":"e_1_2_1_51_1","first-page":"281","article-title":"Automatic assessment marking and plagiarism detection using SOM, fuzzy logic, and decision trees. In Proceedings of the 9th World Multi-conference on Systemics","volume":"3","author":"Ghosh M.","year":"2005","unstructured":"M. Ghosh and R. Ghosh . 2005 . Automatic assessment marking and plagiarism detection using SOM, fuzzy logic, and decision trees. In Proceedings of the 9th World Multi-conference on Systemics , Cybernetics and Informatics , Vol. 3. 281 -- 285 . M. Ghosh and R. Ghosh. 2005. Automatic assessment marking and plagiarism detection using SOM, fuzzy logic, and decision trees. In Proceedings of the 9th World Multi-conference on Systemics, Cybernetics and Informatics, Vol. 3. 281--285.","journal-title":"Cybernetics and Informatics"},{"key":"e_1_2_1_52_1","volume-title":"Proceedings of the 1st International Conference on Information Technology and Applications. 489--494","author":"Ghosh M.","unstructured":"M. Ghosh , B. Verma , and A. Nguyen . 2002. An automatic assessment marking and plagiarism detection . In Proceedings of the 1st International Conference on Information Technology and Applications. 489--494 . M. Ghosh, B. Verma, and A. Nguyen. 2002. An automatic assessment marking and plagiarism detection. In Proceedings of the 1st International Conference on Information Technology and Applications. 489--494."},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/299649.299783"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/800037.800954"},{"key":"e_1_2_1_55_1","volume-title":"Proceedings of the Computer Science Education Research Conference (CSERC\u201911)","author":"Hage J.","year":"2011","unstructured":"J. Hage , P. Rademaker , and N. van Vugt . 2011 . Plagiarism detection for Java: A tool comparison . In Proceedings of the Computer Science Education Research Conference (CSERC\u201911) . 33--46. J. Hage, P. Rademaker, and N. van Vugt. 2011. Plagiarism detection for Java: A tool comparison. In Proceedings of the Computer Science Education Research Conference (CSERC\u201911). 33--46."},{"key":"e_1_2_1_56_1","volume-title":"Proceedings of the 3rd Computer Science Education Research Conference on Computer Science Education Research (CSERC\u201913)","author":"Hage J.","unstructured":"J. Hage , B. Vermeer , and G. Verburg . 2013. Research paper: Plagiarism detection for Haskell with Holmes . In Proceedings of the 3rd Computer Science Education Research Conference on Computer Science Education Research (CSERC\u201913) . 19--30. J. Hage, B. Vermeer, and G. Verburg. 2013. Research paper: Plagiarism detection for Haskell with Holmes. In Proceedings of the 3rd Computer Science Education Research Conference on Computer Science Education Research (CSERC\u201913). 19--30."},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/953363.953366"},{"key":"e_1_2_1_58_1","volume-title":"Elements of Software Science (Operating and Programming Systems Series)","author":"Halstead M. H.","unstructured":"M. H. Halstead . 1977. Elements of Software Science (Operating and Programming Systems Series) . Elsevier Science Inc ., New York, NY. M. H. Halstead. 1977. Elements of Software Science (Operating and Programming Systems Series). Elsevier Science Inc., New York, NY."},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/13.2309"},{"key":"e_1_2_1_60_1","volume-title":"Proceedings of the CEUR Workshop","volume":"1587","author":"Heblikar S.","unstructured":"S. Heblikar , P. Sharma , M. Munnangi , and C. Bankapur . 2015. Normalization based stop-word approach to source code plagiarism detection . In Proceedings of the CEUR Workshop , Vol. 1587 . CEUR-WS, 6--9. S. Heblikar, P. Sharma, M. Munnangi, and C. Bankapur. 2015. Normalization based stop-word approach to source code plagiarism detection. In Proceedings of the CEUR Workshop, Vol. 1587. CEUR-WS, 6--9."},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/2874239.2874304"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1080\/10511253.2015.1064982"},{"key":"e_1_2_1_63_1","volume-title":"Proceedings of the IEEE International Conference on Progress in Informatics and Computing","volume":"2","author":"Huang L.","unstructured":"L. Huang , S. Shi , and H. Huang . 2010. A new method for code similarity detection . In Proceedings of the IEEE International Conference on Progress in Informatics and Computing , Vol. 2 . IEEE, 1015--1018. L. Huang, S. Shi, and H. Huang. 2010. A new method for code similarity detection. In Proceedings of the IEEE International Conference on Progress in Informatics and Computing, Vol. 2. IEEE, 1015--1018."},{"key":"e_1_2_1_64_1","volume-title":"Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery. IEEE, 2308--2312","author":"Inoue U.","unstructured":"U. Inoue and S. Wada . 2012. Detecting plagiarisms in elementary programming courses . In Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery. IEEE, 2308--2312 . U. Inoue and S. Wada. 2012. Detecting plagiarisms in elementary programming courses. In Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery. IEEE, 2308--2312."},{"key":"e_1_2_1_65_1","volume-title":"Proceedings of the 19th International Conference on Software Engineering and Data Engineering. 269--274","author":"Iverson J.","unstructured":"J. Iverson , J. Schnepf , and I. Rahal . 2010. Using metrics to quantify similarity in source code: An empirical study using VOCS . In Proceedings of the 19th International Conference on Software Engineering and Data Engineering. 269--274 . J. Iverson, J. Schnepf, and I. Rahal. 2010. Using metrics to quantify similarity in source code: An empirical study using VOCS. In Proceedings of the 19th International Conference on Software Engineering and Data Engineering. 269--274."},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJBIDM.2008.020514"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/31.1.1"},{"key":"e_1_2_1_68_1","first-page":"809","article-title":"Generating pylogenetic tree of homogeneous source code in a plagiarism detection system","volume":"6","author":"Ji J. H.","year":"2008","unstructured":"J. H. Ji , S. H. Park , G. Woo , and H. G. Cho . 2008 . Generating pylogenetic tree of homogeneous source code in a plagiarism detection system . Int. J. Contr. Autom. Syst. 6 , 6 (2008), 809 -- 817 . J. H. Ji, S. H. Park, G. Woo, and H. G. Cho. 2008. Generating pylogenetic tree of homogeneous source code in a plagiarism detection system. Int. J. Contr. Autom. Syst. 6, 6 (2008), 809--817.","journal-title":"Int. J. Contr. Autom. Syst."},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIT.2008.267"},{"key":"e_1_2_1_70_1","volume-title":"Proceedings of the International Workshop on Internet of Things.","volume":"312","author":"Jia S.","unstructured":"S. Jia , L. Dongsheng , L. Zhang , and C. Liu . 2012. A research on plagiarism detecting method based on XML similarity and clustering . In Proceedings of the International Workshop on Internet of Things. Vol. 312 CCIS, 619--626. S. Jia, L. Dongsheng, L. Zhang, and C. Liu. 2012. A research on plagiarism detecting method based on XML similarity and clustering. In Proceedings of the International Workshop on Internet of Things. Vol. 312 CCIS, 619--626."},{"key":"e_1_2_1_71_1","volume-title":"Proceedings of the Annual Conference and Exposition: Engineering Researchs New Heights. 6087--6105","author":"Johnson M. C.","unstructured":"M. C. Johnson , C. Watson , S. Davidson , and D. Eschbach . 2004. Gene sequence inspired design plagiarism screening . In Proceedings of the Annual Conference and Exposition: Engineering Researchs New Heights. 6087--6105 . M. C. Johnson, C. Watson, S. Davidson, and D. Eschbach. 2004. Gene sequence inspired design plagiarism screening. In Proceedings of the Annual Conference and Exposition: Engineering Researchs New Heights. 6087--6105."},{"key":"e_1_2_1_72_1","first-page":"253","article-title":"Metrics based plagarism monitoring","volume":"16","author":"Jones E. L.","year":"2001","unstructured":"E. L. Jones . 2001 . Metrics based plagarism monitoring . J. Comput. Sci. Coll. 16 , 4 (2001), 253 -- 261 . E. L. Jones. 2001. Metrics based plagarism monitoring. J. Comput. Sci. Coll. 16, 4 (2001), 253--261.","journal-title":"J. Comput. Sci. Coll."},{"key":"e_1_2_1_73_1","volume-title":"Proceedings of the 18th International Recent Advances in Artifical IntelligenceResearch Society Conference. 468--473","author":"Jonyer I.","unstructured":"I. Jonyer , P. Apiratikul , and J. Thomas . 2005. Source code fingerprinting using graph grammar induction . In Proceedings of the 18th International Recent Advances in Artifical IntelligenceResearch Society Conference. 468--473 . I. Jonyer, P. Apiratikul, and J. Thomas. 2005. Source code fingerprinting using graph grammar induction. In Proceedings of the 18th International Recent Advances in Artifical IntelligenceResearch Society Conference. 468--473."},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/TE.2010.2046664"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/13.762946"},{"key":"e_1_2_1_76_1","first-page":"266","article-title":"Detection of plagiarism in computer programming assignments","volume":"15","author":"Kar D. C.","year":"2000","unstructured":"D. C. Kar . 2000 . Detection of plagiarism in computer programming assignments . J. Comput. Sci. Coll. 15 , 3 (2000), 266 -- 276 . D. C. Kar. 2000. Detection of plagiarism in computer programming assignments. J. Comput. Sci. Coll. 15, 3 (2000), 266--276.","journal-title":"J. Comput. Sci. Coll."},{"key":"e_1_2_1_77_1","first-page":"500","article-title":"Similarity detection in source code using data mining techniques","volume":"62","author":"Karthikeyan B.","year":"2011","unstructured":"B. Karthikeyan , V. Vaithiyanathan , and C. V. Lavanya . 2011 . Similarity detection in source code using data mining techniques . Eur. J. Sci. Res. 62 , 4 (2011), 500 -- 505 . B. Karthikeyan, V. Vaithiyanathan, and C. V. Lavanya. 2011. Similarity detection in source code using data mining techniques. Eur. J. Sci. Res. 62, 4 (2011), 500--505.","journal-title":"Eur. J. Sci. Res."},{"key":"e_1_2_1_78_1","article-title":"Global plagiarism management through intelligence of Hawk eye","volume":"9","author":"Karuna P.","year":"2016","unstructured":"P. Karuna and M. Preeti . 2016 . Global plagiarism management through intelligence of Hawk eye . Ind. J. Sci. Technol. 9 , 15 (2016). P. Karuna and M. Preeti. 2016. Global plagiarism management through intelligence of Hawk eye. Ind. J. Sci. Technol. 9, 15 (2016).","journal-title":"Ind. J. Sci. Technol."},{"key":"e_1_2_1_79_1","volume-title":"Proceedings of the 2nd International Conference on Computer Supported Education","volume":"2","author":"Kau\u010di\u010d B.","unstructured":"B. Kau\u010di\u010d , D. Sraka , M. Ram\u0161ak , and M. Kra\u0161na . 2010. Observations on plagiarism in programming courses . In Proceedings of the 2nd International Conference on Computer Supported Education , Vol. 2 . 181--184. B. Kau\u010di\u010d, D. Sraka, M. Ram\u0161ak, and M. Kra\u0161na. 2010. Observations on plagiarism in programming courses. In Proceedings of the 2nd International Conference on Computer Supported Education, Vol. 2. 181--184."},{"key":"e_1_2_1_80_1","volume-title":"Proceedings of the IEEE International Conference on Engineering Education: Innovative Practices and Future Trends. IEEE, 1--5.","author":"Kaushal R.","unstructured":"R. Kaushal and A. Singh . 2012. Automated evaluation of programming assignments . In Proceedings of the IEEE International Conference on Engineering Education: Innovative Practices and Future Trends. IEEE, 1--5. R. Kaushal and A. Singh. 2012. Automated evaluation of programming assignments. In Proceedings of the IEEE International Conference on Engineering Education: Innovative Practices and Future Trends. IEEE, 1--5."},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1002\/cae.21606"},{"key":"e_1_2_1_82_1","volume-title":"Proceedings of the 2012 2nd International Conference on Computer Science and Network Technology. IEEE, 1318--1321","author":"Kechao W.","unstructured":"W. Kechao , W. Tiantian , Z. Mingkui , W. Zhifei , and R. Xiangmin . 2012. Detection of plagiarism in students\u2019 programs using a data mining algorithm . In Proceedings of the 2012 2nd International Conference on Computer Science and Network Technology. IEEE, 1318--1321 . W. Kechao, W. Tiantian, Z. Mingkui, W. Zhifei, and R. Xiangmin. 2012. Detection of plagiarism in students\u2019 programs using a data mining algorithm. In Proceedings of the 2012 2nd International Conference on Computer Science and Network Technology. IEEE, 1318--1321."},{"key":"e_1_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.15388\/infedu.2016.06"},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1109\/IFOST.2012.6357644"},{"key":"e_1_2_1_85_1","volume-title":"Proceedings of the 15th IEEE\/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel Computing. IEEE, 1--6.","author":"Kikuchi H.","unstructured":"H. Kikuchi , T. Goto , M. Wakatsuki , and T. Nishino . 2014. A source code plagiarism detecting method using alignment with abstract syntax tree elements . In Proceedings of the 15th IEEE\/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel Computing. IEEE, 1--6. H. Kikuchi, T. Goto, M. Wakatsuki, and T. Nishino. 2014. A source code plagiarism detecting method using alignment with abstract syntax tree elements. In Proceedings of the 15th IEEE\/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel Computing. IEEE, 1--6."},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1007\/11424925_2"},{"key":"e_1_2_1_87_1","volume-title":"Proceedings of the 31st International Conference on Information Technology Interfaces. IEEE, 409--414","author":"Konecki M.","unstructured":"M. Konecki , T. Orehovacki , and A. Lovrencic . 2009. Detecting computer code plagiarism in higher education . In Proceedings of the 31st International Conference on Information Technology Interfaces. IEEE, 409--414 . M. Konecki, T. Orehovacki, and A. Lovrencic. 2009. Detecting computer code plagiarism in higher education. In Proceedings of the 31st International Conference on Information Technology Interfaces. IEEE, 409--414."},{"key":"e_1_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2013.26"},{"key":"e_1_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2010.07.037"},{"key":"e_1_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICGEC.2012.145"},{"key":"e_1_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1109\/SNPD.2009.62"},{"key":"e_1_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1080\/08993400412331363843"},{"key":"e_1_2_1_94_1","volume-title":"Proceedings of the 22nd Annual Conference of the Australian Society for Computers in Tertiary Education. 361--370","author":"Lancaster T.","unstructured":"T. Lancaster and M. Tetlow . 2005. Does automated anti-plagiarism have to be complex? Evaluating more appropriate software metrics for finding collusion . In Proceedings of the 22nd Annual Conference of the Australian Society for Computers in Tertiary Education. 361--370 . T. Lancaster and M. Tetlow. 2005. Does automated anti-plagiarism have to be complex? Evaluating more appropriate software metrics for finding collusion. In Proceedings of the 22nd Annual Conference of the Australian Society for Computers in Tertiary Education. 361--370."},{"key":"e_1_2_1_95_1","volume-title":"Proceedings of the 9th IEEE International Symposium on Applied Computational Intelligence and Informatics. IEEE, 73--78","author":"Lazar F. M.","unstructured":"F. M. Lazar and O. Banias . 2014. Clone detection algorithm based on the abstract syntax tree approach . In Proceedings of the 9th IEEE International Symposium on Applied Computational Intelligence and Informatics. IEEE, 73--78 . F. M. Lazar and O. Banias. 2014. Clone detection algorithm based on the abstract syntax tree approach. In Proceedings of the 9th IEEE International Symposium on Applied Computational Intelligence and Informatics. IEEE, 73--78."},{"key":"e_1_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1109\/LaTiCE.2013.37"},{"key":"e_1_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1145\/201998.202010"},{"key":"e_1_2_1_98_1","first-page":"1627","article-title":"Plagiarism detection among source codes using adaptive methods","volume":"6","author":"Lee Y. J.","year":"2012","unstructured":"Y. J. Lee , J. S. Lim , J. H. Ji , H. G. Cho , and G. Woo . 2012 . Plagiarism detection among source codes using adaptive methods . KSII Trans. Internet Inf. Syst. 6 , 6 (2012), 1627 -- 1648 . Y. J. Lee, J. S. Lim, J. H. Ji, H. G. Cho, and G. Woo. 2012. Plagiarism detection among source codes using adaptive methods. KSII Trans. Internet Inf. Syst. 6, 6 (2012), 1627--1648.","journal-title":"KSII Trans. Internet Inf. Syst."},{"key":"e_1_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1145\/1774088.1774101"},{"key":"e_1_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPTC.2010.90"},{"key":"e_1_2_1_101_1","first-page":"2563","article-title":"Plagiarism detection in programming exercises using a Markov model approach","volume":"7","author":"Lin T. T.","year":"2013","unstructured":"T. T. Lin and S. H. Tung . 2013 . Plagiarism detection in programming exercises using a Markov model approach . ICIC Expr. Lett. 7 , 9 (2013), 2563 -- 2568 . T. T. Lin and S. H. Tung. 2013. Plagiarism detection in programming exercises using a Markov model approach. ICIC Expr. Lett. 7, 9 (2013), 2563--2568.","journal-title":"ICIC Expr. Lett."},{"key":"e_1_2_1_102_1","doi-asserted-by":"publisher","DOI":"10.4018\/IJDET.2015100102"},{"key":"e_1_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.14232\/actacyb.19.1.2009.13"},{"key":"e_1_2_1_104_1","volume-title":"Proceedings of the IEEE Global Engineering Education Conference. IEEE, 895--902","author":"Luquini E.","unstructured":"E. Luquini and N. Omar . 2011. Programming plagiarism as a social phenomenon . In Proceedings of the IEEE Global Engineering Education Conference. IEEE, 895--902 . E. Luquini and N. Omar. 2011. Programming plagiarism as a social phenomenon. In Proceedings of the IEEE Global Engineering Education Conference. IEEE, 895--902."},{"key":"e_1_2_1_105_1","volume-title":"Proceedings of the Conferences in Research and Practice in Information Technology Series","volume":"52","author":"Mann S.","unstructured":"S. Mann and Z. Frew . 2006. Similarity and originality in code: Plagiarism and normal variation in student assignments . In Proceedings of the Conferences in Research and Practice in Information Technology Series , Vol. 52 . 143--150. S. Mann and Z. Frew. 2006. Similarity and originality in code: Plagiarism and normal variation in student assignments. In Proceedings of the Conferences in Research and Practice in Information Technology Series, Vol. 52. 143--150."},{"key":"e_1_2_1_106_1","volume-title":"Proceedings of the 6th IEEE International Conference on Advanced Learning Technologies. IEEE, 822--824","author":"Marais E.","unstructured":"E. Marais , U. Minnaar , and D. Argles . 2006. Plagiarism in e-learning systems: Identifying and solving the problem for practical assignments . In Proceedings of the 6th IEEE International Conference on Advanced Learning Technologies. IEEE, 822--824 . E. Marais, U. Minnaar, and D. Argles. 2006. Plagiarism in e-learning systems: Identifying and solving the problem for practical assignments. In Proceedings of the 6th IEEE International Conference on Advanced Learning Technologies. IEEE, 822--824."},{"key":"e_1_2_1_107_1","doi-asserted-by":"publisher","DOI":"10.1145\/2133797.2133799"},{"key":"e_1_2_1_108_1","volume-title":"Proceedings of the 3rd Symposium on Languages, Applications and Technologies","volume":"38","author":"Martins V. T.","unstructured":"V. T. Martins , D. Fonte , P. R. Henriques , and D. Da Cruz . 2014. Plagiarism detection: A tool survey and comparison . In Proceedings of the 3rd Symposium on Languages, Applications and Technologies , Vol. 38 . Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, Gualtar, Portugal, 143--158. V. T. Martins, D. Fonte, P. R. Henriques, and D. Da Cruz. 2014. Plagiarism detection: A tool survey and comparison. In Proceedings of the 3rd Symposium on Languages, Applications and Technologies, Vol. 38. Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, Gualtar, Portugal, 143--158."},{"key":"e_1_2_1_109_1","first-page":"153","article-title":"An AST-based tool, spector, for plagiarism detection: The approach, functionality, and implementation","volume":"563","author":"Martins V. T.","year":"2015","unstructured":"V. T. Martins , P. R. Henriques , and D. da Cruz . 2015 . An AST-based tool, spector, for plagiarism detection: The approach, functionality, and implementation . Commun. Comput. Inf. Sci. 563 (2015), 153 -- 159 . V. T. Martins, P. R. Henriques, and D. da Cruz. 2015. An AST-based tool, spector, for plagiarism detection: The approach, functionality, and implementation. Commun. Comput. Inf. Sci. 563 (2015), 153--159.","journal-title":"Commun. Comput. Inf. Sci."},{"key":"e_1_2_1_110_1","volume-title":"Proceedings of the 34th International Convention on Information and Communication Technology, Electronics and Microelectronics. 1235--1240","author":"Mateljan V.","unstructured":"V. Mateljan , V. Juri\u010di\u0107 , and K. Peter . 2011. Analysis of programming code similarity by using intermediate language . In Proceedings of the 34th International Convention on Information and Communication Technology, Electronics and Microelectronics. 1235--1240 . V. Mateljan, V. Juri\u010di\u0107, and K. Peter. 2011. Analysis of programming code similarity by using intermediate language. In Proceedings of the 34th International Convention on Information and Communication Technology, Electronics and Microelectronics. 1235--1240."},{"key":"e_1_2_1_111_1","volume-title":"Proceedings of the International Conference on Educational and Information Technology","volume":"3","author":"Mei Z.","unstructured":"Z. Mei and L. Dongsheng . 2010. An XML plagiarism detection algorithm for procedural programming languages . In Proceedings of the International Conference on Educational and Information Technology , Vol. 3 . IEEE, 427--431. Z. Mei and L. Dongsheng. 2010. An XML plagiarism detection algorithm for procedural programming languages. In Proceedings of the International Conference on Educational and Information Technology, Vol. 3. IEEE, 427--431."},{"key":"e_1_2_1_112_1","volume-title":"Proceedings of the 3rd International Conference on Advanced Computer Theory and Engineering","volume":"1","author":"Mei Z.","unstructured":"Z. Mei and L. Dongsheng . 2010. An XML plagiarism detection model for C program . In Proceedings of the 3rd International Conference on Advanced Computer Theory and Engineering , Vol. 1 . IEEE, 460--464. Z. Mei and L. Dongsheng. 2010. An XML plagiarism detection model for C program. In Proceedings of the 3rd International Conference on Advanced Computer Theory and Engineering, Vol. 1. IEEE, 460--464."},{"key":"e_1_2_1_113_1","doi-asserted-by":"publisher","DOI":"10.1145\/1999747.1999789"},{"key":"e_1_2_1_114_1","first-page":"738","article-title":"A comparison of software tools for plagiarism detection in programming assignments","volume":"32","author":"Mi\u0161i\u0107 M.","year":"2016","unstructured":"M. Mi\u0161i\u0107 , Z. \u0160iu\u0161tran , and J. Proti\u0107 . 2016 . A comparison of software tools for plagiarism detection in programming assignments . Int. J. Eng. Educ. 32 , 2 (2016), 738 -- 748 . M. Mi\u0161i\u0107, Z. \u0160iu\u0161tran, and J. Proti\u0107. 2016. A comparison of software tools for plagiarism detection in programming assignments. Int. J. Eng. Educ. 32, 2 (2016), 738--748.","journal-title":"Int. J. Eng. Educ."},{"key":"e_1_2_1_115_1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxh119"},{"key":"e_1_2_1_116_1","doi-asserted-by":"publisher","DOI":"10.5555\/1149707.1149716"},{"key":"e_1_2_1_117_1","doi-asserted-by":"publisher","DOI":"10.1007\/11575832_30"},{"key":"e_1_2_1_118_1","volume-title":"Proceedings of the 7th International Conference on Computer Science 8 Education. IEEE, 1065--1068","author":"Narayanan S.","unstructured":"S. Narayanan and S. Simi . 2012. Source code plagiarism detection and performance analysis using fingerprint based distance measure method . In Proceedings of the 7th International Conference on Computer Science 8 Education. IEEE, 1065--1068 . S. Narayanan and S. Simi. 2012. Source code plagiarism detection and performance analysis using fingerprint based distance measure method. In Proceedings of the 7th International Conference on Computer Science 8 Education. IEEE, 1065--1068."},{"key":"e_1_2_1_119_1","doi-asserted-by":"crossref","unstructured":"S. C. Ng S. O. Choy and R. Kwan. 2008. An Intelligent Online Assessment System for Programming Courses. World Scientific. 217--231 pages. S. C. Ng S. O. Choy and R. Kwan. 2008. An Intelligent Online Assessment System for Programming Courses. World Scientific. 217--231 pages.","DOI":"10.1142\/9789812799456_0014"},{"key":"e_1_2_1_120_1","volume-title":"Proceedings of the International Conference on ICT in Teaching and Learning.","volume":"302","author":"Ng S. C.","unstructured":"S. C. Ng , A. K. F. Lui , and L. S. Wong . 2012. Tree-based comparison for plagiarism detection and automatic marking of programming assignments . In Proceedings of the International Conference on ICT in Teaching and Learning. Vol. 302 CCIS,, 165--179. S. C. Ng, A. K. F. Lui, and L. S. Wong. 2012. Tree-based comparison for plagiarism detection and automatic marking of programming assignments. In Proceedings of the International Conference on ICT in Teaching and Learning. Vol. 302 CCIS,, 165--179."},{"key":"e_1_2_1_121_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218348X9800016X"},{"key":"e_1_2_1_122_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIPRO.2016.7522248"},{"key":"e_1_2_1_123_1","doi-asserted-by":"publisher","DOI":"10.1145\/1878335.1878381"},{"key":"e_1_2_1_124_1","doi-asserted-by":"publisher","DOI":"10.1017\/S1471068410000402"},{"key":"e_1_2_1_125_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-014-0742-2"},{"key":"e_1_2_1_126_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICICIC.2008.614"},{"key":"e_1_2_1_127_1","first-page":"4729","article-title":"A two-step in-class source code plagiarism detection method utilizing improved CM algorithm and SIM","volume":"7","author":"Ohno A.","year":"2011","unstructured":"A. Ohno and H. Murao . 2011 . A two-step in-class source code plagiarism detection method utilizing improved CM algorithm and SIM . Int. J. Innov. Comput. Inf. Contr. 7 , 8 (2011), 4729 -- 4739 . A. Ohno and H. Murao. 2011. A two-step in-class source code plagiarism detection method utilizing improved CM algorithm and SIM. Int. J. Innov. Comput. Inf. Contr. 7, 8 (2011), 4729--4739.","journal-title":"Int. J. Innov. Comput. Inf. Contr."},{"key":"e_1_2_1_128_1","volume-title":"Proceedings of the 22nd International Conference on Computers in Education. Asia-Pacific Society for Computers in Education","author":"Ohno A.","unstructured":"A. Ohno , T. Yamasaki , and K. I. Tokiwa . 2014. An online system for scoring and plagiarism detection in university programing class . In Proceedings of the 22nd International Conference on Computers in Education. Asia-Pacific Society for Computers in Education , Nara, Japan, 37--39. A. Ohno, T. Yamasaki, and K. I. Tokiwa. 2014. An online system for scoring and plagiarism detection in university programing class. In Proceedings of the 22nd International Conference on Computers in Education. Asia-Pacific Society for Computers in Education, Nara, Japan, 37--39."},{"key":"e_1_2_1_129_1","doi-asserted-by":"publisher","DOI":"10.1109\/SYNASC.2013.37"},{"key":"e_1_2_1_130_1","doi-asserted-by":"publisher","DOI":"10.1145\/382222.382462"},{"key":"e_1_2_1_131_1","doi-asserted-by":"publisher","DOI":"10.1109\/13.28038"},{"key":"e_1_2_1_132_1","volume-title":"Proceedings of the 10th European Workshop on Microelectronics Education. IEEE, 49--52","author":"Pohuba D.","unstructured":"D. Pohuba , T. Dulik , and P. Janku . 2014. Automatic evaluation of correctness and originality of source codes . In Proceedings of the 10th European Workshop on Microelectronics Education. IEEE, 49--52 . D. Pohuba, T. Dulik, and P. Janku. 2014. Automatic evaluation of correctness and originality of source codes. In Proceedings of the 10th European Workshop on Microelectronics Education. IEEE, 49--52."},{"key":"e_1_2_1_133_1","doi-asserted-by":"publisher","DOI":"10.1145\/2325296.2325328"},{"key":"e_1_2_1_134_1","first-page":"1016","article-title":"Finding plagiarisms among a set of programs with JPlag","volume":"8","author":"Prechelt L.","year":"2002","unstructured":"L. Prechelt , G. Malpohl , and M. Philippsen . 2002 . Finding plagiarisms among a set of programs with JPlag . J. Univ. Comput. Sci. 8 , 11 (2002), 1016 -- 1038 . L. Prechelt, G. Malpohl, and M. Philippsen. 2002. Finding plagiarisms among a set of programs with JPlag. J. Univ. Comput. Sci. 8, 11 (2002), 1016--1038.","journal-title":"J. Univ. Comput. Sci."},{"key":"e_1_2_1_135_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218194015500229"},{"key":"e_1_2_1_136_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2016.13"},{"key":"e_1_2_1_137_1","volume-title":"Proceedings of the 21st International Conference on Computer Applications in Industry and Engineering. 174--179","author":"Rahal I.","unstructured":"I. Rahal and J. Degiovanni . 2008. Towards efficient source code plagiarism detection: An n-gram-based approach . In Proceedings of the 21st International Conference on Computer Applications in Industry and Engineering. 174--179 . I. Rahal and J. Degiovanni. 2008. Towards efficient source code plagiarism detection: An n-gram-based approach. In Proceedings of the 21st International Conference on Computer Applications in Industry and Engineering. 174--179."},{"key":"e_1_2_1_138_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0219649214500282"},{"key":"e_1_2_1_139_1","volume-title":"Proceedings of the National Educational Computing Conference (INTSOC\u201990)","author":"Rambally G. K.","unstructured":"G. K. Rambally and M. Lesage . 1990. An inductive inference approach to plagiarsim detection in computer-programs . In Proceedings of the National Educational Computing Conference (INTSOC\u201990) , 23--29. G. K. Rambally and M. Lesage. 1990. An inductive inference approach to plagiarsim detection in computer-programs. In Proceedings of the National Educational Computing Conference (INTSOC\u201990), 23--29."},{"key":"e_1_2_1_140_1","doi-asserted-by":"publisher","DOI":"10.1145\/2824864.2824879"},{"key":"e_1_2_1_141_1","volume-title":"Proceedings of the CEUR Workshop","volume":"1587","author":"De-La-Cruz A.","unstructured":"A. Ram\u00edrez- De-La-Cruz , G. Ram\u00edrez- De-La-Rosa , C. S\u00e1nchez-S\u00e1nchez , H. Jim\u00e9nez-Salazar , C. Rodr\u00edguez-Lucatero , and W. A. Luna-Ram\u00edrez . 2015. High level features for detecting source code plagiarism across programming languages . In Proceedings of the CEUR Workshop , Vol. 1587 . CEUR-WS, 10--14. A. Ram\u00edrez-De-La-Cruz, G. Ram\u00edrez-De-La-Rosa, C. S\u00e1nchez-S\u00e1nchez, H. Jim\u00e9nez-Salazar, C. Rodr\u00edguez-Lucatero, and W. A. Luna-Ram\u00edrez. 2015. High level features for detecting source code plagiarism across programming languages. In Proceedings of the CEUR Workshop, Vol. 1587. CEUR-WS, 10--14."},{"key":"e_1_2_1_142_1","first-page":"13341","article-title":"Multiresolution analysis of source code using discrete wavelet transform","volume":"9","author":"Resmi N. G.","year":"2014","unstructured":"N. G. Resmi and K. P. Soman . 2014 . Multiresolution analysis of source code using discrete wavelet transform . Int. J. Appl. Eng. Res. 9 , 22 (2014), 13341 -- 13360 . N. G. Resmi and K. P. Soman. 2014. Multiresolution analysis of source code using discrete wavelet transform. Int. J. Appl. Eng. Res. 9, 22 (2014), 13341--13360.","journal-title":"Int. J. Appl. Eng. Res."},{"key":"e_1_2_1_143_1","doi-asserted-by":"publisher","DOI":"10.1145\/953032.804623"},{"key":"e_1_2_1_144_1","volume-title":"Proceedings of the 5th International Technology, Education and Development Conference. IATED-INT, 743--748","author":"Rodriguez J. C.","unstructured":"J. C. Rodriguez , E. Rubio Royo , and Z. Hernandez . 2011. USES OF VPL . In Proceedings of the 5th International Technology, Education and Development Conference. IATED-INT, 743--748 . J. C. Rodriguez, E. Rubio Royo, and Z. Hernandez. 2011. USES OF VPL. In Proceedings of the 5th International Technology, Education and Development Conference. IATED-INT, 743--748."},{"key":"e_1_2_1_145_1","volume-title":"Proceedings of the 3rd International Conference of Education and New Learning Technologies (EDULEARN\u201911)","author":"del Pino J. C.","unstructured":"J. C. Rodriguez- del Pino , E. Rubio-Royo , and Z. Hernandez-Figueroa . 2011. Fighting plagiarism: Metrics and methods to measure and find similarities among source code of computer programs in VPL . In Proceedings of the 3rd International Conference of Education and New Learning Technologies (EDULEARN\u201911) . IATED-INT, 4339--4346. J. C. Rodriguez-del Pino, E. Rubio-Royo, and Z. Hernandez-Figueroa. 2011. Fighting plagiarism: Metrics and methods to measure and find similarities among source code of computer programs in VPL. In Proceedings of the 3rd International Conference of Education and New Learning Technologies (EDULEARN\u201911). IATED-INT, 4339--4346."},{"key":"e_1_2_1_146_1","doi-asserted-by":"publisher","DOI":"10.1109\/TE.2007.906778"},{"key":"e_1_2_1_147_1","volume-title":"Proceedings of the 7th International Conference on Information Technology Based Higher Education and Training. IEEE, 226--235","author":"Roxas R. E.","unstructured":"R. E. Roxas , N. R. Lim , and N. Bautista . 2006. Automatic generation of plagiarism detection among student programs . In Proceedings of the 7th International Conference on Information Technology Based Higher Education and Training. IEEE, 226--235 . R. E. Roxas, N. R. Lim, and N. Bautista. 2006. Automatic generation of plagiarism detection among student programs. In Proceedings of the 7th International Conference on Information Technology Based Higher Education and Training. IEEE, 226--235."},{"key":"e_1_2_1_148_1","doi-asserted-by":"publisher","DOI":"10.1145\/872757.872770"},{"key":"e_1_2_1_149_1","volume-title":"Proceedings of the 6th International Conference of Education, Research and Inovation. IATED-INT, 3953--3961","author":"Semerdzhiev A.","unstructured":"A. Semerdzhiev and T. Trifonov . 2013. Practical aspects of plagiarsim detection in coputer science e-learning . In Proceedings of the 6th International Conference of Education, Research and Inovation. IATED-INT, 3953--3961 . A. Semerdzhiev and T. Trifonov. 2013. Practical aspects of plagiarsim detection in coputer science e-learning. In Proceedings of the 6th International Conference of Education, Research and Inovation. IATED-INT, 3953--3961."},{"key":"e_1_2_1_150_1","volume-title":"Proceedings of the CEUR Workshop","volume":"1587","author":"Shah D.","unstructured":"D. Shah , H. Jethani , and H. Joshi . 2015. (CLSCR) cross language source code reuse detection using intermediate language . In Proceedings of the CEUR Workshop , Vol. 1587 . CEUR-WS, 15--18. D. Shah, H. Jethani, and H. Joshi. 2015. (CLSCR) cross language source code reuse detection using intermediate language. In Proceedings of the CEUR Workshop, Vol. 1587. CEUR-WS, 15--18."},{"key":"e_1_2_1_151_1","doi-asserted-by":"crossref","first-page":"645","DOI":"10.1007\/978-981-10-0135-2_62","article-title":"Differential weight based hybrid approach to detect software plagiarism","volume":"409","author":"Shah N.","year":"2016","unstructured":"N. Shah , S. Modha , and D. Dhruv . 2016 . Differential weight based hybrid approach to detect software plagiarism . Adv. Intell. Syst. Comput. 409 (2016), 645 -- 653 . N. Shah, S. Modha, and D. Dhruv. 2016. Differential weight based hybrid approach to detect software plagiarism. Adv. Intell. Syst. Comput. 409 (2016), 645--653.","journal-title":"Adv. Intell. Syst. Comput."},{"key":"e_1_2_1_152_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28655-1_57"},{"key":"e_1_2_1_153_1","doi-asserted-by":"publisher","DOI":"10.4028\/www.scientific.net\/AMM.667.32"},{"key":"e_1_2_1_154_1","volume-title":"Proceedings of the International Conference on Communication, Information 8 Computing Techology. IEEE, 1--7.","author":"Sharma S.","unstructured":"S. Sharma , C. S. Sharma , and V. Tyagi . 2015. Plagiarism detection tool \u201cParikshak .\u201d In Proceedings of the International Conference on Communication, Information 8 Computing Techology. IEEE, 1--7. S. Sharma, C. S. Sharma, and V. Tyagi. 2015. Plagiarism detection tool \u201cParikshak.\u201d In Proceedings of the International Conference on Communication, Information 8 Computing Techology. IEEE, 1--7."},{"key":"e_1_2_1_155_1","doi-asserted-by":"publisher","DOI":"10.1145\/2876034.2893435"},{"key":"e_1_2_1_156_1","doi-asserted-by":"publisher","DOI":"10.1145\/2632320.2632342"},{"key":"e_1_2_1_157_1","volume-title":"Proceedings of the International Conference on Informatics in Economy. 594--597","author":"Smeureanu I.","unstructured":"I. Smeureanu and B. Iancu . 2013. Source code plagiarsim detection method using ontologies . In Proceedings of the International Conference on Informatics in Economy. 594--597 . I. Smeureanu and B. Iancu. 2013. Source code plagiarsim detection method using ontologies. In Proceedings of the International Conference on Informatics in Economy. 594--597."},{"key":"e_1_2_1_158_1","first-page":"1","article-title":"Computation of program source code similarity by composition of parse tree and call graph","volume":"2015","author":"Song H. J.","year":"2015","unstructured":"H. J. Song , S. B. Park , and S. Y. Park . 2015 . Computation of program source code similarity by composition of parse tree and call graph . Math. Probl. Eng. 2015 (2015), 1 -- 12 . H. J. Song, S. B. Park, and S. Y. Park. 2015. Computation of program source code similarity by composition of parse tree and call graph. Math. Probl. Eng. 2015 (2015), 1--12.","journal-title":"Math. Probl. Eng."},{"key":"e_1_2_1_159_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2017.05.001"},{"key":"e_1_2_1_160_1","volume-title":"Proceedings of the 31st International Conference on Information Technology Interfaces. IEEE, 461--466","author":"Sraka D.","unstructured":"D. Sraka and B. Kaucic . 2009. Source code plagiarism . In Proceedings of the 31st International Conference on Information Technology Interfaces. IEEE, 461--466 . D. Sraka and B. Kaucic. 2009. Source code plagiarism. In Proceedings of the 31st International Conference on Information Technology Interfaces. IEEE, 461--466."},{"key":"e_1_2_1_161_1","unstructured":"The Mendeley Support Team. 2011. Getting Started with Mendeley. Retrieved from http:\/\/www.mendeley.com. The Mendeley Support Team. 2011. Getting Started with Mendeley. Retrieved from http:\/\/www.mendeley.com."},{"key":"e_1_2_1_162_1","volume-title":"Proceedings of the IEEE SoutheastCon","author":"Tennyson M. F.","year":"2014","unstructured":"M. F. Tennyson and F. J. Mitropoulos . 2014. Choosing a profile length in the SCAP method of source code authorship attribution . In Proceedings of the IEEE SoutheastCon 2014 . Institute of Electrical and Electronics Engineers Inc., Bradley University, Peoria, IL. M. F. Tennyson and F. J. Mitropoulos. 2014. Choosing a profile length in the SCAP method of source code authorship attribution. In Proceedings of the IEEE SoutheastCon 2014. Institute of Electrical and Electronics Engineers Inc., Bradley University, Peoria, IL."},{"key":"e_1_2_1_163_1","volume-title":"Proceedings of the 2nd International Conference on Software Engineering in Higher Education II (SEHE\u201995)","author":"Traxler J.","year":"1995","unstructured":"J. Traxler . 1995 . Plagiarism in programming: A review and discussion of the factors . In Proceedings of the 2nd International Conference on Software Engineering in Higher Education II (SEHE\u201995) . Computational Mechanics, Inc., Billerica, MA, 131--138. J. Traxler. 1995. Plagiarism in programming: A review and discussion of the factors. In Proceedings of the 2nd International Conference on Software Engineering in Higher Education II (SEHE\u201995). Computational Mechanics, Inc., Billerica, MA, 131--138."},{"key":"e_1_2_1_164_1","volume-title":"Proceedings of the 7th IADIS International Conference Information Systems. IADIS, 232--238","author":"Tselikas N. D.","unstructured":"N. D. Tselikas , M. Samarakou , D. Karolidis , P. Prentakis , and S. Athineos . 2014. Automatic plagiarism detection in programming laboratory courses . In Proceedings of the 7th IADIS International Conference Information Systems. IADIS, 232--238 . N. D. Tselikas, M. Samarakou, D. Karolidis, P. Prentakis, and S. Athineos. 2014. Automatic plagiarism detection in programming laboratory courses. In Proceedings of the 7th IADIS International Conference Information Systems. IADIS, 232--238."},{"key":"e_1_2_1_165_1","volume-title":"Proceedings of the 9th International Conference on Information Technology Based Higher Education and Training. IEEE, 363--371","author":"Ueta K.","unstructured":"K. Ueta and H. Tominaga . 2010. A development and application of similarity detection methods for plagiarism of online reports . In Proceedings of the 9th International Conference on Information Technology Based Higher Education and Training. IEEE, 363--371 . K. Ueta and H. Tominaga. 2010. A development and application of similarity detection methods for plagiarism of online reports. In Proceedings of the 9th International Conference on Information Technology Based Higher Education and Training. IEEE, 363--371."},{"key":"e_1_2_1_166_1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxs018"},{"key":"e_1_2_1_167_1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/39.9.741"},{"key":"e_1_2_1_168_1","doi-asserted-by":"publisher","DOI":"10.1145\/1632149.1632168"},{"key":"e_1_2_1_169_1","first-page":"269","article-title":"Preventing and detecting plagiarism in programming course","volume":"7","author":"Wang C.","year":"2013","unstructured":"C. Wang , Z. Liu , and L. Dongsheng . 2013 . Preventing and detecting plagiarism in programming course . Int. J. Secur. Appl. 7 , 5 (2013), 269 -- 278 . C. Wang, Z. Liu, and L. Dongsheng. 2013. Preventing and detecting plagiarism in programming course. Int. J. Secur. Appl. 7, 5 (2013), 269--278.","journal-title":"Int. J. Secur. Appl."},{"key":"e_1_2_1_170_1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/33.2.140"},{"key":"e_1_2_1_171_1","doi-asserted-by":"publisher","DOI":"10.1016\/0164-1212(90)90118-6"},{"key":"e_1_2_1_172_1","doi-asserted-by":"publisher","DOI":"10.1145\/135250.134564"},{"key":"e_1_2_1_173_1","doi-asserted-by":"publisher","DOI":"10.1145\/236452.236525"},{"key":"e_1_2_1_174_1","first-page":"300","article-title":"Towards intellectual property theft prevention: Economic significance of automatic software plagiarism verification","volume":"142","author":"Wojdyga A.","year":"2013","unstructured":"A. Wojdyga . 2013 . Towards intellectual property theft prevention: Economic significance of automatic software plagiarism verification . Act. Probl. Econ. 142 , 4 (2013), 300 -- 306 . A. Wojdyga. 2013. Towards intellectual property theft prevention: Economic significance of automatic software plagiarism verification. Act. Probl. Econ. 142, 4 (2013), 300--306.","journal-title":"Act. Probl. Econ."},{"key":"e_1_2_1_175_1","doi-asserted-by":"publisher","DOI":"10.1109\/WI-IAT.2010.100"},{"key":"e_1_2_1_176_1","volume-title":"Proceedings of the International Conference on Computational Intelligence and Software Engineering.","author":"Xiong H.","unstructured":"H. Xiong , H. Yan , Z. Li , and H. Li . 2009 . In Proceedings of the International Conference on Computational Intelligence and Software Engineering. H. Xiong, H. Yan, Z. Li, and H. Li. 2009. In Proceedings of the International Conference on Computational Intelligence and Software Engineering."},{"key":"e_1_2_1_177_1","doi-asserted-by":"publisher","DOI":"10.1109\/IITSI.2010.114"},{"key":"e_1_2_1_178_1","volume-title":"Proceedings of the International Conference on Intelligent Control and Information Processing. IEEE, 539--543","author":"Yang S.","unstructured":"S. Yang , X. Wang , C. Shao , and P. Zhang . 2010. Recognition on source codes similarity with weighted attributes eigenvector . In Proceedings of the International Conference on Intelligent Control and Information Processing. IEEE, 539--543 . S. Yang, X. Wang, C. Shao, and P. Zhang. 2010. Recognition on source codes similarity with weighted attributes eigenvector. In Proceedings of the International Conference on Intelligent Control and Information Processing. IEEE, 539--543."},{"key":"e_1_2_1_179_1","volume-title":"Proceedings of the IEEE 11th International Conference on Emerging eLearning Technologies and Applications. IEEE, 415--419","author":"Zakova K.","unstructured":"K. Zakova , J. Pistej , and P. Bistak . 2013. Online tool for student\u2019s source code plagiarism detection . In Proceedings of the IEEE 11th International Conference on Emerging eLearning Technologies and Applications. IEEE, 415--419 . K. Zakova, J. Pistej, and P. Bistak. 2013. Online tool for student\u2019s source code plagiarism detection. In Proceedings of the IEEE 11th International Conference on Emerging eLearning Technologies and Applications. IEEE, 415--419."},{"key":"e_1_2_1_180_1","doi-asserted-by":"publisher","DOI":"10.1080\/02602938.2013.870122"},{"key":"e_1_2_1_181_1","volume-title":"Proceedings of the IEEE 4th International Conference on Software Engineering and Service Science. IEEE, 738--742","author":"Zhang L.","unstructured":"L. Zhang and L. Dongsheng . 2013. AST-based multi-language plagiarism detection method . In Proceedings of the IEEE 4th International Conference on Software Engineering and Service Science. IEEE, 738--742 . L. Zhang and L. Dongsheng. 2013. AST-based multi-language plagiarism detection method. In Proceedings of the IEEE 4th International Conference on Software Engineering and Service Science. IEEE, 738--742."},{"key":"e_1_2_1_182_1","volume-title":"Proceedings of the 2007 International Conference on Intelligent Pervasive Computing. IEEE, 431--436","author":"Zhang L.","unstructured":"L. Zhang , Y. T. Zhuang , and Z. M. Yuan . 2007. A program plagiarism detection model based on information distance and clustering . In Proceedings of the 2007 International Conference on Intelligent Pervasive Computing. IEEE, 431--436 . L. Zhang, Y. T. Zhuang, and Z. M. Yuan. 2007. A program plagiarism detection model based on information distance and clustering. In Proceedings of the 2007 International Conference on Intelligent Pervasive Computing. IEEE, 431--436."},{"key":"e_1_2_1_183_1","volume-title":"Proceedings of the 3rd International Conference on Computer Technology and Development. ASME","author":"Zhong M.","unstructured":"M. Zhong , Y. Li , and L. Dongsheng . 2012. A source code and non-source code plagiarism detection research for C program . In Proceedings of the 3rd International Conference on Computer Technology and Development. ASME , New York, NY, 2163--2167. M. Zhong, Y. Li, and L. Dongsheng. 2012. A source code and non-source code plagiarism detection research for C program. In Proceedings of the 3rd International Conference on Computer Technology and Development. ASME, New York, NY, 2163--2167."},{"key":"e_1_2_1_184_1","doi-asserted-by":"publisher","DOI":"10.4028\/www.scientific.net\/AMM.668-669.899"}],"container-title":["ACM Transactions on Computing Education"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3313290","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3313290","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:54:33Z","timestamp":1750204473000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3313290"}},"subtitle":["A Systematic Review"],"short-title":[],"issued":{"date-parts":[[2019,5,21]]},"references-count":182,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,9,30]]}},"alternative-id":["10.1145\/3313290"],"URL":"https:\/\/doi.org\/10.1145\/3313290","relation":{},"ISSN":["1946-6226"],"issn-type":[{"value":"1946-6226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,5,21]]},"assertion":[{"value":"2018-06-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-12-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-05-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}