메뉴 건너뛰기




Volumn 3975 LNCS, Issue , 2006, Pages 60-71

Visualizing authorship for identification

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; COMPUTER CRIME; COMPUTER VISION; IDENTIFICATION (CONTROL SYSTEMS); LEARNING SYSTEMS; PRINCIPAL COMPONENT ANALYSIS;

EID: 33745912234     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11760146_6     Document Type: Conference Paper
Times cited : (41)

References (20)
  • 1
    • 27344450109 scopus 로고    scopus 로고
    • Applying authorship analysis to extremist-group web forum messages
    • Abbasi, A. & Chen, H. Applying Authorship Analysis to Extremist-Group Web Forum Messages. IEEE Intelligent Systems, 20(5): (2005), 67-75.
    • (2005) IEEE Intelligent Systems , vol.20 , Issue.5 , pp. 67-75
    • Abbasi, A.1    Chen, H.2
  • 2
    • 0037791890 scopus 로고    scopus 로고
    • Outside the cave of shadows: Using syntactic annotation to enhance authorship attribution
    • Baayen, R. H., Halteren, H. v., & Tweedie, F. J. Outside the cave of shadows: using syntactic annotation to enhance authorship attribution. Literary and Linguistic Computing, 2: (1996), 110-120.
    • (1996) Literary and Linguistic Computing , vol.2 , pp. 110-120
    • Baayen, R.H.1    Halteren, H.V.2    Tweedie, F.J.3
  • 3
    • 84960603650 scopus 로고
    • Word patterns and story shapes: The statistical analysis of narrative style
    • Burrows, J. F. Word patterns and story shapes: the statistical analysis of narrative style. Literary and Linguistic Computing, 2: (1987), 61-67.
    • (1987) Literary and Linguistic Computing , vol.2 , pp. 61-67
    • Burrows, J.F.1
  • 4
    • 0042367634 scopus 로고    scopus 로고
    • Mining E-mail content for author identification forensics
    • De Vel, O., Anderson, A., Corney, M., & Mohay, G. Mining E-mail content for author identification forensics. SIGMOD Record, 30(4): (2001), 55-64.
    • (2001) SIGMOD Record , vol.30 , Issue.4 , pp. 55-64
    • De Vel, O.1    Anderson, A.2    Corney, M.3    Mohay, G.4
  • 5
    • 0002603702 scopus 로고    scopus 로고
    • Identity and deception in the virtual community
    • London, Routledge Press
    • Donath, J. Identity and Deception in the Virtual Community. In Communities in Cyberspace, London, Routledge Press, 1999.
    • (1999) Communities in Cyberspace
    • Donath, J.1
  • 7
    • 84991061352 scopus 로고    scopus 로고
    • Social translucence: An approach to designing systems that support social processes
    • Erickson, T. & Kellogg, W. A. Social Translucence: An Approach to Designing Systems that Support Social Processes. ACM Transactions on Computer-Human Interaction, 7(1): (2001), 59-83.
    • (2001) ACM Transactions on Computer-Human Interaction , vol.7 , Issue.1 , pp. 59-83
    • Erickson, T.1    Kellogg, W.A.2
  • 11
    • 0042223455 scopus 로고    scopus 로고
    • Software piracy: A view from Hong Kong
    • Moores, T., & Dhillon, G. Software Piracy: A View from Hong Kong. Communications of the ACM, 43(12): (2000), 88-93.
    • (2000) Communications of the ACM , vol.43 , Issue.12 , pp. 88-93
    • Moores, T.1    Dhillon, G.2
  • 14
    • 0034435015 scopus 로고    scopus 로고
    • Conversation map: An interface for very large-scale conversations
    • Sack, W. Conversation Map: An Interface for Very Large-Scale Conversations. Journal of Management Information Systems, 17(3): (2000), 73-92.
    • (2000) Journal of Management Information Systems , vol.17 , Issue.3 , pp. 73-92
    • Sack, W.1
  • 16
    • 53349096656 scopus 로고    scopus 로고
    • Neural network applications in stylometry: The federalist papers
    • Tweedie, F. J., Singh, S., & Holmes, D. I. Neural Network applications in stylometry: the Federalist papers. Computers and the Humanities, 30(1): (1996), 1-10.
    • (1996) Computers and the Humanities , vol.30 , Issue.1 , pp. 1-10
    • Tweedie, F.J.1    Singh, S.2    Holmes, D.I.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.