Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[PDF][PDF] Identifying authorship by byte-level n-grams: The source code author profile (scap) method
Source code author identification deals with identifying the most likely author of a computer
program, given a set of predefined author candidates. There are several scenarios where …
program, given a set of predefined author candidates. There are several scenarios where …
Extraction of Java program fingerprints for software authorship identification
H Ding, MH Samadzadeh - Journal of Systems and Software, 2004 - Elsevier
Computer programs belong to the authors who design, write, and test them. Authorship
identification is concerned with determining the likelihood of a particular author having …
identification is concerned with determining the likelihood of a particular author having …
Comparing techniques for authorship attribution of source code
Attributing authorship of documents with unknown creators has been studied extensively for
natural language text such as essays and literature, but less so for non‐natural languages …
natural language text such as essays and literature, but less so for non‐natural languages …
A probabilistic approach to source code authorship identification
J Kothari, M Shevertalov, E Stehle… - … Technology (ITNG'07), 2007 - ieeexplore.ieee.org
There exists a need for tools to help identify the authorship of source code. This includes
situations in which the ownership of code is questionable, such as in plagiarism or …
situations in which the ownership of code is questionable, such as in plagiarism or …
Source code authorship analysis for supporting the cybercrime investigation process
G Frantzeskou, SG MacDonell… - Handbook of Research …, 2010 - igi-global.com
Nowadays, in a wide variety of situations, source code authorship identification has become
an issue of major concern. Such situations include authorship disputes, proof of authorship …
an issue of major concern. Such situations include authorship disputes, proof of authorship …
Software forensics for discriminating between program authors using case-based reasoning, feedforward neural networks and multiple discriminant analysis
Software forensics is the field that, by treating pieces of program source code as
linguistically and stylistically analyzable entities, attempts to investigate computer program …
linguistically and stylistically analyzable entities, attempts to investigate computer program …
Automatically determining phishing campaigns using the uscap methodology
Phishing fraudsters attempt to create an environment which looks and feels like a legitimate
institution, while at the same time attempting to bypass filters and suspicions of their targets …
institution, while at the same time attempting to bypass filters and suspicions of their targets …
Recognizing authors: an examination of the consistent programmer hypothesis
Software developers have individual styles of programming. This paper empirically
examines the validity of the consistent programmer hypothesis: that a facet or set of facets …
examines the validity of the consistent programmer hypothesis: that a facet or set of facets …
Similarity detection in Java programming assignments
MEB Menai, NS Al-Hassoun - 2010 5th International …, 2010 - ieeexplore.ieee.org
Similarity detection tools are nowadays commonly used by instructors to prevent student
cheating and to enforce academic integrity. Systems identifying similarity in programming …
cheating and to enforce academic integrity. Systems identifying similarity in programming …
Unsupervised authorship analysis of phishing webpages
Authorship analysis on phishing websites enables the investigation of phishing attacks,
beyond basic analysis. In authorship analysis, salient features from documents are used to …
beyond basic analysis. In authorship analysis, salient features from documents are used to …