{"id":"https://openalex.org/W1956188504","doi":"https://doi.org/10.1007/0-387-34224-9_59","title":"Source Code Author Identification Based on N-gram Author Profiles","display_name":"Source Code Author Identification Based on N-gram Author Profiles","publication_year":2006,"publication_date":"2006-08-25","ids":{"openalex":"https://openalex.org/W1956188504","doi":"https://doi.org/10.1007/0-387-34224-9_59","mag":"1956188504"},"language":"en","primary_location":{"id":"doi:10.1007/0-387-34224-9_59","is_oa":true,"landing_page_url":"https://doi.org/10.1007/0-387-34224-9_59","pdf_url":"https://link.springer.com/content/pdf/10.1007/0-387-34224-9_59.pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IFIP International Federation for Information Processing","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://link.springer.com/content/pdf/10.1007/0-387-34224-9_59.pdf","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5057577851","display_name":"Georgia Frantzeskou","orcid":null},"institutions":[{"id":"https://openalex.org/I98805295","display_name":"University of the Aegean","ror":"https://ror.org/03zsp3p94","country_code":"GR","type":"education","lineage":["https://openalex.org/I98805295"]}],"countries":["GR"],"is_corresponding":true,"raw_author_name":"Georgia Frantzeskou","raw_affiliation_strings":["Laboratory of Information and Communication Systems Security, Department of Information and Communication Systems Engineering, University of the Aegean, Karlovasi, Samos, 83200, Greece","University of The Aegean"],"affiliations":[{"raw_affiliation_string":"Laboratory of Information and Communication Systems Security, Department of Information and Communication Systems Engineering, University of the Aegean, Karlovasi, Samos, 83200, Greece","institution_ids":["https://openalex.org/I98805295"]},{"raw_affiliation_string":"University of The Aegean","institution_ids":["https://openalex.org/I98805295"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061737423","display_name":"Efstathios Stamatatos","orcid":"https://orcid.org/0000-0002-1336-9128"},"institutions":[{"id":"https://openalex.org/I98805295","display_name":"University of the Aegean","ror":"https://ror.org/03zsp3p94","country_code":"GR","type":"education","lineage":["https://openalex.org/I98805295"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Efstathios Stamatatos","raw_affiliation_strings":["Laboratory of Information and Communication Systems Security, Department of Information and Communication Systems Engineering, University of the Aegean, Karlovasi, Samos, 83200, Greece","University of The Aegean"],"affiliations":[{"raw_affiliation_string":"Laboratory of Information and Communication Systems Security, Department of Information and Communication Systems Engineering, University of the Aegean, Karlovasi, Samos, 83200, Greece","institution_ids":["https://openalex.org/I98805295"]},{"raw_affiliation_string":"University of The Aegean","institution_ids":["https://openalex.org/I98805295"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091815745","display_name":"Stefanos Gritzalis","orcid":"https://orcid.org/0000-0002-8037-2191"},"institutions":[{"id":"https://openalex.org/I98805295","display_name":"University of the Aegean","ror":"https://ror.org/03zsp3p94","country_code":"GR","type":"education","lineage":["https://openalex.org/I98805295"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Stefanos Gritzalis","raw_affiliation_strings":["Laboratory of Information and Communication Systems Security, Department of Information and Communication Systems Engineering, University of the Aegean, Karlovasi, Samos, 83200, Greece","University of The Aegean"],"affiliations":[{"raw_affiliation_string":"Laboratory of Information and Communication Systems Security, Department of Information and Communication Systems Engineering, University of the Aegean, Karlovasi, Samos, 83200, Greece","institution_ids":["https://openalex.org/I98805295"]},{"raw_affiliation_string":"University of The Aegean","institution_ids":["https://openalex.org/I98805295"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5022741687","display_name":"Sokratis Katsikas","orcid":"https://orcid.org/0000-0003-2966-9683"},"institutions":[{"id":"https://openalex.org/I98805295","display_name":"University of the Aegean","ror":"https://ror.org/03zsp3p94","country_code":"GR","type":"education","lineage":["https://openalex.org/I98805295"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Sokratis Katsikas","raw_affiliation_strings":["Laboratory of Information and Communication Systems Security, Department of Information and Communication Systems Engineering, University of the Aegean, Karlovasi, Samos, 83200, Greece","University of The Aegean"],"affiliations":[{"raw_affiliation_string":"Laboratory of Information and Communication Systems Security, Department of Information and Communication Systems Engineering, University of the Aegean, Karlovasi, Samos, 83200, Greece","institution_ids":["https://openalex.org/I98805295"]},{"raw_affiliation_string":"University of The Aegean","institution_ids":["https://openalex.org/I98805295"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5057577851"],"corresponding_institution_ids":["https://openalex.org/I98805295"],"apc_list":null,"apc_paid":null,"fwci":0.7318,"has_fulltext":true,"cited_by_count":54,"citation_normalized_percentile":{"value":0.76037986,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"508","last_page":"515"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9789000153541565,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8112901449203491},{"id":"https://openalex.org/keywords/programmer","display_name":"Programmer","score":0.8004859685897827},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.7271485924720764},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.6898051500320435},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.6257392168045044},{"id":"https://openalex.org/keywords/byte","display_name":"Byte","score":0.5586846470832825},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.5234688520431519},{"id":"https://openalex.org/keywords/tracing","display_name":"Tracing","score":0.4843767583370209},{"id":"https://openalex.org/keywords/java","display_name":"Java","score":0.46640458703041077},{"id":"https://openalex.org/keywords/n-gram","display_name":"n-gram","score":0.4337252080440521},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.39087972044944763},{"id":"https://openalex.org/keywords/natural-language-processing","display_name":"Natural language processing","score":0.184480220079422},{"id":"https://openalex.org/keywords/language-model","display_name":"Language model","score":0.14868584275245667}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8112901449203491},{"id":"https://openalex.org/C2778514511","wikidata":"https://www.wikidata.org/wiki/Q1374194","display_name":"Programmer","level":2,"score":0.8004859685897827},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.7271485924720764},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.6898051500320435},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.6257392168045044},{"id":"https://openalex.org/C43364308","wikidata":"https://www.wikidata.org/wiki/Q8799","display_name":"Byte","level":2,"score":0.5586846470832825},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.5234688520431519},{"id":"https://openalex.org/C138673069","wikidata":"https://www.wikidata.org/wiki/Q322229","display_name":"Tracing","level":2,"score":0.4843767583370209},{"id":"https://openalex.org/C548217200","wikidata":"https://www.wikidata.org/wiki/Q251","display_name":"Java","level":2,"score":0.46640458703041077},{"id":"https://openalex.org/C117884012","wikidata":"https://www.wikidata.org/wiki/Q94489","display_name":"n-gram","level":3,"score":0.4337252080440521},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.39087972044944763},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.184480220079422},{"id":"https://openalex.org/C137293760","wikidata":"https://www.wikidata.org/wiki/Q3621696","display_name":"Language model","level":2,"score":0.14868584275245667},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/0-387-34224-9_59","is_oa":true,"landing_page_url":"https://doi.org/10.1007/0-387-34224-9_59","pdf_url":"https://link.springer.com/content/pdf/10.1007/0-387-34224-9_59.pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IFIP International Federation for Information Processing","raw_type":"book-chapter"}],"best_oa_location":{"id":"doi:10.1007/0-387-34224-9_59","is_oa":true,"landing_page_url":"https://doi.org/10.1007/0-387-34224-9_59","pdf_url":"https://link.springer.com/content/pdf/10.1007/0-387-34224-9_59.pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IFIP International Federation for Information Processing","raw_type":"book-chapter"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.6800000071525574,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W1956188504.pdf","grobid_xml":"https://content.openalex.org/works/W1956188504.grobid-xml"},"referenced_works_count":5,"referenced_works":["https://openalex.org/W2010452235","https://openalex.org/W2044555705","https://openalex.org/W2127324866","https://openalex.org/W2163823069","https://openalex.org/W2180101149"],"related_works":["https://openalex.org/W3137189469","https://openalex.org/W2185017216","https://openalex.org/W3160136729","https://openalex.org/W2528467228","https://openalex.org/W4246531319","https://openalex.org/W2021596359","https://openalex.org/W1964999277","https://openalex.org/W1482645738","https://openalex.org/W2137137834","https://openalex.org/W1956188504"],"abstract_inverted_index":{"Source":[0],"code":[1,73,107,142,174],"author":[2,13,23,162],"identification":[3,144],"deals":[4],"with":[5,138,186],"the":[6,10,30,40,48,70,76,89,130,133,153,169,172,177,208,211,218,223],"task":[7],"of":[8,14,21,32,36,50,56,65,72,114,132,171,193,210,220],"identifying":[9],"most":[11],"likely":[12],"a":[15,19,52,57,79,85,105,139,190,226],"computer":[16],"program,":[17],"given":[18],"set":[20],"predefined":[22],"candidates.":[24],"This":[25],"is":[26,156,180,199,204,214],"usually.":[27],"based":[28,96,146],"on":[29,97,111,147],"analysis":[31],"other":[33],"program":[34],"samples":[35],"undisputed":[37],"authorship":[38,62,66,143],"by":[39,217],"same":[41],"programmer.":[42],"There":[43],"are":[44,164],"several":[45],"cases":[46,187],"where":[47,188],"application":[49],"such":[51,60],"method":[53],"could":[54],"be":[55],"major":[58],"benefit,":[59],"as":[61],"disputes,":[63],"proof":[64],"in":[67,75,101,222,230],"court,":[68],"tracing":[69],"source":[71,106,141,173,224],"left":[74],"system":[77],"after":[78],"cyber":[80],"attack,":[81],"etc.":[82],"We":[83],"present":[84],"new":[86],"approach,":[87,95],"called":[88],"SCAP":[90,154,178],"(Source":[91],"Code":[92],"Author":[93],"Profiles)":[94],"byte-level":[98],"n-gram":[99,161],"profiles":[100,163],"order":[102],"to":[103,125,167,182],"represent":[104],"author\u2019s":[108],"style.":[109],"Experiments":[110],"data":[112],"sets":[113],"different":[115],"programming":[116],"language":[117,157],"(Java":[118],"or":[119],"C++)":[120],"and":[121,159],"varying":[122],"difficulty":[123],"(6":[124],"30":[126],"candidate":[127],"authors)":[128],"demonstrate":[129],"effectiveness":[131,209],"proposed":[134,212],"approach.":[135],"A":[136],"comparison":[137],"previous":[140],"study":[145],"more":[148],"complicated":[149],"information":[150],"shows":[151],"that":[152,160,207],"approach":[155,179],"independent":[158],"better":[165],"able":[166,181],"capture":[168],"idiosyncrasies":[170],"authors.":[175],"Moreover":[176],"deal":[183],"surprisingly":[184],"well":[185],"only":[189],"limited":[191],"amount":[192],"very":[194],"short":[195],"programs":[196],"per":[197],"programmer":[198],"available":[200],"for":[201],"training.":[202],"It":[203],"also":[205],"demonstrated":[206],"model":[213],"not":[215],"affected":[216],"absence":[219],"comments":[221],"code,":[225],"condition":[227],"usually":[228],"met":[229],"cyber-crime":[231],"cases.":[232]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":6},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":5},{"year":2013,"cited_by_count":4},{"year":2012,"cited_by_count":4}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
