[PDF][PDF] Identifying authorship by byte-level n-grams: The source code author profile (scap) method

G Frantzeskou, E Stamatatos, S Gritzalis… - International Journal of …, 2007 - academia.edu
Source code author identification deals with identifying the most likely author of a computer
program, given a set of predefined author candidates. There are several scenarios where …

Extraction of Java program fingerprints for software authorship identification

H Ding, MH Samadzadeh - Journal of Systems and Software, 2004 - Elsevier
Computer programs belong to the authors who design, write, and test them. Authorship
identification is concerned with determining the likelihood of a particular author having …

Comparing techniques for authorship attribution of source code

S Burrows, AL Uitdenbogerd… - Software: Practice and …, 2014 - Wiley Online Library
Attributing authorship of documents with unknown creators has been studied extensively for
natural language text such as essays and literature, but less so for non‐natural languages …

A probabilistic approach to source code authorship identification

J Kothari, M Shevertalov, E Stehle… - … Technology (ITNG'07), 2007 - ieeexplore.ieee.org
There exists a need for tools to help identify the authorship of source code. This includes
situations in which the ownership of code is questionable, such as in plagiarism or …

Source code authorship analysis for supporting the cybercrime investigation process

G Frantzeskou, SG MacDonell… - Handbook of Research …, 2010 - igi-global.com
Nowadays, in a wide variety of situations, source code authorship identification has become
an issue of major concern. Such situations include authorship disputes, proof of authorship …

Software forensics for discriminating between program authors using case-based reasoning, feedforward neural networks and multiple discriminant analysis

SG MacDonell, AR Gray… - ICONIP'99. ANZIIS'99 …, 1999 - ieeexplore.ieee.org
Software forensics is the field that, by treating pieces of program source code as
linguistically and stylistically analyzable entities, attempts to investigate computer program …

Automatically determining phishing campaigns using the uscap methodology

R Layton, P Watters, R Dazeley - 2010 eCrime Researchers …, 2010 - ieeexplore.ieee.org
Phishing fraudsters attempt to create an environment which looks and feels like a legitimate
institution, while at the same time attempting to bypass filters and suspicions of their targets …

Recognizing authors: an examination of the consistent programmer hypothesis

JH Hayes, J Offutt - Software Testing, Verification and Reliability, 2010 - Wiley Online Library
Software developers have individual styles of programming. This paper empirically
examines the validity of the consistent programmer hypothesis: that a facet or set of facets …

Similarity detection in Java programming assignments

MEB Menai, NS Al-Hassoun - 2010 5th International …, 2010 - ieeexplore.ieee.org
Similarity detection tools are nowadays commonly used by instructors to prevent student
cheating and to enforce academic integrity. Systems identifying similarity in programming …

Unsupervised authorship analysis of phishing webpages

R Layton, P Watters, R Dazeley - … International Symposium on …, 2012 - ieeexplore.ieee.org
Authorship analysis on phishing websites enables the investigation of phishing attacks,
beyond basic analysis. In authorship analysis, salient features from documents are used to …