Grune, D., 1991, Concise Report on Algorithms in Sim,
(Report distributed with Sim software).
Gray, A., Sallis, P., and MacDonell, S., 1997, Software
forensics: Extending authorship analysis techniques to
computer programs, in Proc. 3rd Biannual Conf. Int.
Assoc. of Forensic Linguists (IAFL'97), pages 1-8.
Gray, A., Sallis, P., and MacDonell, S., 1998, Identified
(integrated dictionary-based extraction of non-
language-dependent token information for forensic
identification, examination, and discrimination): A
dictionary-based system for extracting source code
metrics for software forensics. In Proceedings of
SE:E&P’98 (Software Engineering: Education and
Practice Conference), pages 252–259. IEEE Computer
Society Press.
Halstead, M., H., 1977, Elements of software science,
North Holland, New York.
Jankowitz, H. T., 1988, Detecting Plagiarism in Student
Pascal Programs, Computer Journal, 31(1).
Jones, E., L., 2001, Metrics Based Plagiarism Monitoring,
in Proc. Consortium for Computing in Small Colleges
Kilgour, R. I., Gray, A.R., Sallis, P. J., and MacDonell, S.
G., 1997. A Fuzzy Logic Approach to Computer
Software Source Code Authorship Analysis, Accepted
for The Fourth International Conference on Neural
Information Processing -- The Annual Conference of
the Asian Pacific Neural Network Assembly
(ICONIP'97). Dunedin. New Zealand
Krsul, I., and Spafford, E. H., 1995, Authorship analysis:
Identifying the author of a program, In Proc. 8th
National Information Systems Security Conference,
pages 514-524, National Institute of Standards and
Technology.
Krsul, I., and Spafford, E. H., 1996,
Authorship
analysis: Identifying the author of a program,
Technical Report TR-96-052, 1996
Longstaff, T. A., and Schultz, 1993, E. E., Beyond
Preliminary Analysis of the WANK and OILZ Worms:
A Case Study of Malicious Code, Computers and
Security, 12:61-77.
McCabe, T. J., 1976, A complexity measure, IEEE
Transactions on Software Engineering, SE-2 (4),
pp(308-320).
MacDonell, S.G., Gray, A.R., MacLennan, G., Sallis, P.J.,
1999.Software forensics for discriminating between
program authors using case- based reasoning, feed
forward neural networks, and multiple discriminant
analysis. In: Proceedings of the 6th International
Conference on Neural Information, vol. 1, Dunedin,
New Zealand, pp. 66–71.
Mair, C., Kadoda, G. Lefey, M., Phalp, K., Schofield , C.,
Shepperd, M., Webster, S., 2000, An investigation of
machine learning based prediction systems The
Journal of Systems and Software 53 23-29.
Mosteller, F., and Wallace, D., 1964, Inference and
Disputed Authorship: The Federalist, Addison-
Wesley, Reading, Mass.
Oman, P., and Cook, C., Programming style authorship
analysis. In Seventeenth Annual ACM Science
Conference Proceedings, pages 320–326. ACM, 1989.
Ottenstein, L., M., Quantitative estimates of debugging
requirements, 1979, IEEE Transactions of Software
Engineering, Vol. SE-5, pp(504-514).
Prechelt, L., Malpohl, G., Philippsen, M., Finding
Plagiarisms among a Set of Programs with JPlag,
Journal of Universal Computer Science, vol. 8, no. 11
(2002), 1016-1038
Sallis P., Aakjaer, A., and MacDonell, S., 1996, Software
Forensics: Old Methods for a New Science.
Proceedings of SE:E&P’96 (Software Engineering:
Education and Practice). Dunedin, New Zealand,
IEEE Computer Society Press, 367-371.
SAS on line docs
http://www.sasdocs.utoledo.edu/ last
accessed 12/1/2004
Schank, R., 1982,. Dynamic Memory: A theory of
reminding and learning in computers and people.
Cambridge University Press.
Spafford, E. H., 1989, The Internet Worm Program: An
Analysis,” Computer Communications Review, 19(1):
17-49.
Shepperd, M. J., and Schofield, C., 1997, Estimating
software project effort using analogies, IEEE
Transactions on Software Engineering, 23(11), 736-
743.
Spafford, E. H., and Weeber, S. A., 1993, Software
forensics: tracking code to its authors, Computers and
Security, 12:585-595.
Verco, K. K., and Wise, M. J., 1996, Software for
detecting suspected plagiarism: Comparing structure
and attribute-counting systems, In John Rosenberg,
editor, Proc. of 1st Australian Conference on
Computer Science Education, Sydney, ACM.
Vel, O., Anderson, A., Corney, M., and Mohay, G., 2001,
Mining E-mail Content for Author Identification
Forensics, SIGMOD Record, 30(4): 55-64.
Whale, G., 1990, Identification of Program Similarity in
Large Populations, The Computer Journal 33(2), pp.
140–146.
Wise, M., J., 1992, Detection of Similarities in Student
Programs: YAP'ing may be Preferable to Plagueing,
Proceedings, Twenty Third SCGCSE Technical
Symposium, Kansas City, USA, 268-271.
Wise, M. J., 1996, Improved Detection of Similarities in
Computer Program and other Texts, Twenty-Seventh
SIGCSE Technical Symposium, Philadelphia, U.S.A.,
pp. 130-134.
Zheng, R., Qin, Y., Huang, Z., and Chen H., 2003,
Authorship Analysis in Cybercrime Investigation
Springer-Verlag Heidelberg, ISSN: 0302-9743,
Volume 2665.
ICETE 2004 - SECURITY AND RELIABILITY IN INFORMATION SYSTEMS AND NETWORKS
92