{"id":"https://openalex.org/W2078111377","doi":"https://doi.org/10.1145/1276958.1277364","title":"Using code metric histograms and genetic algorithms to perform author identification for software forensics","display_name":"Using code metric histograms and genetic algorithms to perform author identification for software forensics","publication_year":2007,"publication_date":"2007-07-07","ids":{"openalex":"https://openalex.org/W2078111377","doi":"https://doi.org/10.1145/1276958.1277364","mag":"2078111377"},"language":"en","primary_location":{"id":"doi:10.1145/1276958.1277364","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1276958.1277364","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 9th annual conference on Genetic and evolutionary computation","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5065747338","display_name":"Robert Lange","orcid":"https://orcid.org/0000-0002-9500-1238"},"institutions":[{"id":"https://openalex.org/I72816309","display_name":"Drexel University","ror":"https://ror.org/04bdffz58","country_code":"US","type":"education","lineage":["https://openalex.org/I72816309"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Robert Charles Lange","raw_affiliation_strings":["Drexel University, Philadelphia, PA"],"affiliations":[{"raw_affiliation_string":"Drexel University, Philadelphia, PA","institution_ids":["https://openalex.org/I72816309"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5004087073","display_name":"Spiros Mancoridis","orcid":"https://orcid.org/0000-0001-6354-4281"},"institutions":[{"id":"https://openalex.org/I72816309","display_name":"Drexel University","ror":"https://ror.org/04bdffz58","country_code":"US","type":"education","lineage":["https://openalex.org/I72816309"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Spiros Mancoridis","raw_affiliation_strings":["Drexel University, Philadelphia, PA"],"affiliations":[{"raw_affiliation_string":"Drexel University, Philadelphia, PA","institution_ids":["https://openalex.org/I72816309"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5065747338"],"corresponding_institution_ids":["https://openalex.org/I72816309"],"apc_list":null,"apc_paid":null,"fwci":5.7982,"has_fulltext":false,"cited_by_count":70,"citation_normalized_percentile":{"value":0.95782386,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"2082","last_page":"2089"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.798579752445221},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.6526710987091064},{"id":"https://openalex.org/keywords/metric","display_name":"Metric (unit)","score":0.603632926940918},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5870456695556641},{"id":"https://openalex.org/keywords/software-metric","display_name":"Software metric","score":0.5501469373703003},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5440541505813599},{"id":"https://openalex.org/keywords/histogram","display_name":"Histogram","score":0.5434903502464294},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.5154129266738892},{"id":"https://openalex.org/keywords/code-smell","display_name":"Code smell","score":0.5055811405181885},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.4722948372364044},{"id":"https://openalex.org/keywords/code-review","display_name":"Code review","score":0.46057558059692383},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4575168192386627},{"id":"https://openalex.org/keywords/genetic-algorithm","display_name":"Genetic algorithm","score":0.4357052445411682},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.42965254187583923},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4101320505142212},{"id":"https://openalex.org/keywords/static-program-analysis","display_name":"Static program analysis","score":0.37942981719970703},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.35413745045661926},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.3470384180545807},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.3316258192062378},{"id":"https://openalex.org/keywords/software-quality","display_name":"Software quality","score":0.2909321188926697},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.25486868619918823},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.15413129329681396},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.14129403233528137},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.09581014513969421}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.798579752445221},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.6526710987091064},{"id":"https://openalex.org/C176217482","wikidata":"https://www.wikidata.org/wiki/Q860554","display_name":"Metric (unit)","level":2,"score":0.603632926940918},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5870456695556641},{"id":"https://openalex.org/C82214349","wikidata":"https://www.wikidata.org/wiki/Q657339","display_name":"Software metric","level":5,"score":0.5501469373703003},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5440541505813599},{"id":"https://openalex.org/C53533937","wikidata":"https://www.wikidata.org/wiki/Q185020","display_name":"Histogram","level":3,"score":0.5434903502464294},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.5154129266738892},{"id":"https://openalex.org/C133237599","wikidata":"https://www.wikidata.org/wiki/Q2295111","display_name":"Code smell","level":5,"score":0.5055811405181885},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.4722948372364044},{"id":"https://openalex.org/C150292731","wikidata":"https://www.wikidata.org/wiki/Q1342704","display_name":"Code review","level":5,"score":0.46057558059692383},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4575168192386627},{"id":"https://openalex.org/C8880873","wikidata":"https://www.wikidata.org/wiki/Q187787","display_name":"Genetic algorithm","level":2,"score":0.4357052445411682},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.42965254187583923},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4101320505142212},{"id":"https://openalex.org/C137287247","wikidata":"https://www.wikidata.org/wiki/Q1329550","display_name":"Static program analysis","level":4,"score":0.37942981719970703},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.35413745045661926},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.3470384180545807},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.3316258192062378},{"id":"https://openalex.org/C117447612","wikidata":"https://www.wikidata.org/wiki/Q1412670","display_name":"Software quality","level":4,"score":0.2909321188926697},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.25486868619918823},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.15413129329681396},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.14129403233528137},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.09581014513969421},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C21547014","wikidata":"https://www.wikidata.org/wiki/Q1423657","display_name":"Operations management","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1145/1276958.1277364","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1276958.1277364","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 9th annual conference on Genetic and evolutionary computation","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.129.1426","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.129.1426","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cs.drexel.edu/~spiros/papers/GECCO07.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.421.5150","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.421.5150","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cs.york.ac.uk/rts/docs/GECCO_2007/docs/p2082.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7599999904632568,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W183282140","https://openalex.org/W1489928065","https://openalex.org/W1576271900","https://openalex.org/W1639032689","https://openalex.org/W1932571505","https://openalex.org/W2007337962","https://openalex.org/W2044555705","https://openalex.org/W2072164438","https://openalex.org/W2104128006","https://openalex.org/W2125055259","https://openalex.org/W2151505086","https://openalex.org/W3023540311"],"related_works":["https://openalex.org/W3165221216","https://openalex.org/W4382562158","https://openalex.org/W2969257295","https://openalex.org/W2896744621","https://openalex.org/W3006945192","https://openalex.org/W4384026574","https://openalex.org/W1976804602","https://openalex.org/W2150625980","https://openalex.org/W1982871693","https://openalex.org/W2390554102"],"abstract_inverted_index":{"We":[0],"have":[1],"developed":[2],"a":[3,11,29,34,81,124],"technique":[4,62],"to":[5,23,94,127,134,143,151,156,182],"characterize":[6],"software":[7,65,174],"developers-":[8],"styles":[9,91],"using":[10],"set":[12],"of":[13,28,31,36,83,97,113,159,167,180,186],"source":[14],"code":[15,32,79],"metrics.":[16,122,161],"This":[17,162],"style":[18],"fingerprint":[19],"can":[20,52],"be":[21],"used":[22],"identify":[24,53],"the":[25,73,95,98,107,114,129,165,184],"likely":[26],"author":[27,171],"piece":[30],"from":[33,119],"pool":[35],"candidates.":[37],"Author":[38],"identification":[39,172],"has":[40,148],"applications":[41],"in":[42,75,88,110,139,170],"criminal":[43],"justice,":[44],"corporate":[45],"litigation,":[46],"and":[47,106,176],"plagiarism":[48],"detection.":[49],"Furthermore,":[50],"we":[51,131],"candidate":[54],"developers":[55],"who":[56],"share":[57],"similar":[58],"styles,":[59],"making":[60],"our":[61,157,168,187],"useful":[63],"for":[64,78,173],"maintenance":[66],"as":[67,141],"well.":[68],"Our":[69,100],"method":[70],"involves":[71,103],"measuring":[72],"differences":[74],"histogram":[76],"distributions":[77],"metrics.Identifying":[80],"combination":[82],"metrics":[84,155],"that":[85],"is":[86,92],"effective":[87],"distinguishing":[89],"developer":[90],"key":[93],"utility":[96,185],"technique.":[99],"case":[101],"study":[102],"18":[104],"metrics,":[105],"time":[108],"involved":[109],"exhaustive":[111],"searching":[112],"problem":[115],"space":[116],"prevented":[117],"us":[118,150],"adding":[120,153],"additional":[121],"Using":[123],"genetic":[125,146],"algorithm":[126,147],"perform":[128],"search,":[130],"were":[132],"able":[133],"find":[135],"good":[136],"metric":[137],"combinations":[138],"hours":[140],"opposed":[142],"weeks.":[144],"The":[145],"enabled":[149],"begin":[152],"new":[154],"catalog":[158],"available":[160],"paper":[163],"documents":[164],"results":[166],"experiments":[169],"forensics":[175],"outlines":[177],"future":[178],"directions":[179],"research":[181],"improve":[183],"method.":[188]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":8},{"year":2019,"cited_by_count":8},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":4},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":4},{"year":2013,"cited_by_count":4},{"year":2012,"cited_by_count":10}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
