-
1
-
-
42049084142
-
Writeprints: A stylometric approach to identity-level identification and similarity detection in cyberspace
-
Abbasi, A., Chen, H.: Writeprints: A stylometric approach to identity-level identification and similarity detection in cyberspace. ACM Trans. Inf. Syst. 26(2), 1-29 (2008)
-
(2008)
ACM Trans. Inf. Syst.
, vol.26
, Issue.2
, pp. 1-29
-
-
Abbasi, A.1
Chen, H.2
-
2
-
-
84876100930
-
On the feasibility of internet-scale author identification
-
IEEE
-
Narayanan, A., Paskov, H., Gong, N., Bethencourt, J., Stefanov, E., Shin, R., Song, D.: On the feasibility of internet-scale author identification. In: Proceedings of the 33rd Conference on IEEE Symposium on Security and Privacy. IEEE (2012)
-
(2012)
Proceedings of the 33rd Conference on IEEE Symposium on Security and Privacy
-
-
Narayanan, A.1
Paskov, H.2
Gong, N.3
Bethencourt, J.4
Stefanov, E.5
Shin, R.6
Song, D.7
-
3
-
-
84864198929
-
-
March
-
Wayman, J., Orlans, N., Hu, Q., Goodman, F., Ulrich, A., Valencia, V.: Technology assessment for the state of the art biometrics excellence roadmap (March 2009), http://www.biometriccoe.gov/SABER/index.htm
-
(2009)
Technology Assessment for the State of the Art Biometrics Excellence Roadmap
-
-
Wayman, J.1
Orlans, N.2
Hu, Q.3
Goodman, F.4
Ulrich, A.5
Valencia, V.6
-
5
-
-
84872013214
-
Detecting hoaxes, frauds, and deception in writing style online
-
IEEE
-
Afroz, S., Brennan, M., Greenstadt, R.: Detecting hoaxes, frauds, and deception in writing style online. In: Proceedings of the 33rd Conference on IEEE Symposium on Security and Privacy. IEEE (2012)
-
(2012)
Proceedings of the 33rd Conference on IEEE Symposium on Security and Privacy
-
-
Afroz, S.1
Brennan, M.2
Greenstadt, R.3
-
6
-
-
77955457549
-
How unique is your Web browser?
-
Atallah, M.J., Hopper, N.J. (eds.), LNCS, Springer, Heidelberg
-
Eckersley, P.: How Unique Is Your Web Browser? In: Atallah, M.J., Hopper, N.J. (eds.) PETS 2010. LNCS, vol. 6205, pp. 1-18. Springer, Heidelberg (2010)
-
(2010)
PETS 2010
, vol.6205
, pp. 1-18
-
-
Eckersley, P.1
-
8
-
-
80051990341
-
You might also like: Privacy risks of collaborative filtering
-
IEEE
-
Calandrino, J.A., Kilzer, A., Narayanan, A., Felten, E.W., Shmatikov, V.: You might also like: Privacy risks of collaborative filtering. In: Proceedings of the 32nd IEEE Symposium on Security and Privacy, pp. 231-246. IEEE (2011)
-
(2011)
Proceedings of the 32nd IEEE Symposium on Security and Privacy
, pp. 231-246
-
-
Calandrino, J.A.1
Kilzer, A.2
Narayanan, A.3
Felten, E.W.4
Shmatikov, V.5
-
9
-
-
85084161366
-
Tor: The second-generation onion router
-
USENIX Association
-
Dingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation onion router. In: Proceedings of the 13th Conference on USENIX Security Symposium, vol. 13, pp. 21-21. USENIX Association (2004)
-
(2004)
Proceedings of the 13th Conference on USENIX Security Symposium
, vol.13
, pp. 21-21
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
11
-
-
49049084540
-
Obfuscating document stylometry to preserve author anonymity
-
Association for Computational Linguistics
-
Kacmarcik, G., Gamon, M.: Obfuscating document stylometry to preserve author anonymity. In: Proceedings of the COLING/ACL on Main Conference Poster Sessions, pp. 444-451. Association for Computational Linguistics (2006)
-
(2006)
Proceedings of the COLING/ACL on Main Conference Poster Sessions
, pp. 444-451
-
-
Kacmarcik, G.1
Gamon, M.2
-
13
-
-
33646007289
-
A comparative study of language models for book and author recognition
-
Dale, R., Wong, K.-F., Su, J., Kwong, O.Y. (eds.), LNCS (LNAI), Springer, Heidelberg
-
Uzuner, Ö., Katz, B.: A Comparative Study of Language Models for Book and Author Recognition. In: Dale, R., Wong, K.-F., Su, J., Kwong, O.Y. (eds.) IJCNLP 2005. LNCS (LNAI), vol. 3651, pp. 969-980. Springer, Heidelberg (2005)
-
(2005)
IJCNLP 2005
, vol.3651
, pp. 969-980
-
-
Uzuner, Ö.1
Katz, B.2
-
14
-
-
84866125649
-
-
Juola, P.: Jgaap, a java-based, modular, program for textual analysis, text categorization, and authorship attribution
-
Jgaap, A Java-based, Modular, Program for Textual Analysis, Text Categorization, and Authorship Attribution
-
-
Juola, P.1
-
15
-
-
76749092270
-
The weka data mining software: An update
-
Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., Witten, I.H.: The weka data mining software: an update. ACM SIGKDD Explorations Newsletter 11(1), 10-18 (2009)
-
(2009)
ACM SIGKDD Explorations Newsletter
, vol.11
, Issue.1
, pp. 10-18
-
-
Hall, M.1
Frank, E.2
Holmes, G.3
Pfahringer, B.4
Reutemann, P.5
Witten, I.H.6
-
16
-
-
84969135721
-
K-means++: The advantages of careful seeding
-
Arthur, D., Vassilvitskii, S.: k-means++: the advantages of careful seeding. In: Proceedings of the Eighteenth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2007, Philadelphia, PA, USA, pp. 1027-1035 (2007)
-
(2007)
Proceedings of the Eighteenth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2007, Philadelphia, PA, USA
, pp. 1027-1035
-
-
Arthur, D.1
Vassilvitskii, S.2
-
17
-
-
38149053611
-
A classifier system for author recognition using synonym-based features
-
Gelbukh, A., Kuri Morales, Á.F. (eds.), LNCS (LNAI), Springer, Heidelberg
-
Clark, J.H., Hannon, C.J.: A Classifier System for Author Recognition Using Synonym-Based Features. In: Gelbukh, A., Kuri Morales, Á.F. (eds.) MICAI 2007. LNCS (LNAI), vol. 4827, pp. 839-849. Springer, Heidelberg (2007)
-
(2007)
MICAI 2007
, vol.4827
, pp. 839-849
-
-
Clark, J.H.1
Hannon, C.J.2
|