We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Author Identification: An Approach based on Code Feature Metrics using Decision Trees

by Rohit R. Joshi, Rajesh V. Argiddi, Sulabha S. Apte
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 66 - Number 4
Year of Publication: 2013
Authors: Rohit R. Joshi, Rajesh V. Argiddi, Sulabha S. Apte
10.5120/11074-5995

Rohit R. Joshi, Rajesh V. Argiddi, Sulabha S. Apte . Author Identification: An Approach based on Code Feature Metrics using Decision Trees. International Journal of Computer Applications. 66, 4 ( March 2013), 34-39. DOI=10.5120/11074-5995

@article{ 10.5120/11074-5995,
author = { Rohit R. Joshi, Rajesh V. Argiddi, Sulabha S. Apte },
title = { Author Identification: An Approach based on Code Feature Metrics using Decision Trees },
journal = { International Journal of Computer Applications },
issue_date = { March 2013 },
volume = { 66 },
number = { 4 },
month = { March },
year = { 2013 },
issn = { 0975-8887 },
pages = { 34-39 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume66/number4/11074-5995/ },
doi = { 10.5120/11074-5995 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:21:28.789467+05:30
%A Rohit R. Joshi
%A Rajesh V. Argiddi
%A Sulabha S. Apte
%T Author Identification: An Approach based on Code Feature Metrics using Decision Trees
%J International Journal of Computer Applications
%@ 0975-8887
%V 66
%N 4
%P 34-39
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Now a day's, cases of piracies, copyrights, legal disputes, and allegations are increasing as far as field of software is concerned. In such cases it is difficult to say who is right and who is wrong between the two quarreling parties due to insufficient evidences. So, what could be done in such cases is the question? The field called as software forensic can help in such cases by giving the right direction towards the case. Software forensic is the field which can analyze the code from different viewpoints and helps in extracting the code metrics which can be syntactic, semantic, structural, behavioral, stylometric etc. These metrics can help in doing author identification, discrimination, characterization etc. Author identification plays very important role in most of the cases such as plagiarism detection, masquerade detection, software maintainability and resolving authorship disputes. This paper focuses on author identification, source code metrics, related work, proposed work and applications of author identification.

References
  1. MacDonell S. G. , Buckingham D. , Gray A. R. , and Sallis P. J. (2002) , Software Forensics : Extending Authorship Analysis Techniques to computer programs , Journal of Law and Information Scienece, 13(1) , pp. 34-69
  2. Jay Kothari, Maxim Shevertalov, Edward Stehle, and Spiros Mancoridis . A probabilistic approach to source code authorship identification", 4th International Conference on Information technology, IEEE Conference Publication, 2007.
  3. R. A. Vivanco, N. J. Pizzi, Identifying Effective Software Metrics Using Genetic Algorithm , Canadian Conference on Electrical and Computer Engineering, 2003, IEEE CCECE 2003.
  4. Georgia Frantzeskou, Efstathios Stamatatos, Stefanos Gritzalis, Sokratis Katsikas ,Source Code Author Identification Based on N-gram Author Profiles , Artificial Intelligence …, 2006 – Springer
  5. Frantzeskou G, Gritzalis S. , & MacDonell S. , (2004) ,Source Code Authorship Analysis For Supporting the Cybercrime Investigation Process , 1st International Conference on E-Business and Telecommunication networks. Setubal, Portugal, INSTICC Press, pp. 85-92.
  6. Margaret H. Dunham, Data Mining, Introductory and Advanced Topics, 4th Edition.
  7. Paul Clough – July 2000, Plagiarism in natural and programming languages: an overview of current tools and technologies.
  8. Boleslaw K. Szymanski,, Yongqiang Zhang , Recursive Data Mining for Masquerade Detection And Author Identification, Proc. 5th IEEE System, Man and Cybernetics Information Assurance Workshop, West Point, ,NY,June. 2004,pp. 424-431
Index Terms

Computer Science
Information Sciences

Keywords

Software Source Code Metrics Author Identification Plagiarism Detection