Author:
Ďuračík Michal,Kršák Emil,Hrkút Patrik
Reference21 articles.
1. D. Binkley. Source code analysis: A road map. In ICSE - Future of SE Track, 2007.
2. From source code identifiers to natural language terms [J];Carvalho;The Journal of Systems and Software,2015
3. Source code author identification based on N-gram author profiles;Frantzeskou;IFIP International Federation for Information Processing,2006
4. J. Upchurch and X. Zhou. First byte: Force-based clustering of filtered block N-grams to detect code reuse in malicious software. In 2013 8th International Conference on Malicious and Unwanted Software: “The Americas” (MALWARE), 2013, 68-76.
5. Adapting SVM for data sparseness and imbalance: a case study in information extraction;Li;Natural Language Engineering,2009
Cited by
54 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Trends in Plagiarism: A Bibliometric Approach;DESIDOC J LIB INF TE;2024
2. Organization of graduate projects Plagiarism check;XLV ACADEMIC SPACE CONFERENCE, DEDICATED TO THE MEMORY OF ACADEMICIAN S.P. KOROLEV AND OTHER OUTSTANDING NATIONAL SCIENTISTS — PIONEERS OF SPACE EXPLORATION;2023
3. SSA-HIAST: A Novel Framework for Code Clone Detection;Computers, Materials & Continua;2022
4. Computer-based plagiarism detection techniques: A comparative study;INT J NONLINEAR ANAL;2022
5. About methods of checking graduation qualifying papers for plagiarism;INTERNATIONAL CONFERENCE ON INFORMATICS, TECHNOLOGY, AND ENGINEERING 2021 (InCITE 2021): Leveraging Smart Engineering;2022