-
1
-
-
27344450109
-
Applying authorship analysis to extremist-group Web forum messages
-
Abbasi, A., Chen, H.: Applying Authorship Analysis to Extremist-Group Web Forum Messages. IEEE Intelligent Systems 20(5), 67-75 (2005) (Pubitemid 41527272)
-
(2005)
IEEE Intelligent Systems
, vol.20
, Issue.5
, pp. 67-75
-
-
Abbasi, A.1
Chen, H.2
-
3
-
-
42049084142
-
Writeprints: A stylometric approach to identify-level identification and similarity detection in cyberspace
-
Abbasi, A., Chen, H.: Writeprints: A Stylometric Approach to Identify-Level Identification and Similarity Detection in Cyberspace. ACM Transactions on Information Systems 26(2) (2008)
-
(2008)
ACM Transactions on Information Systems
, vol.26
, Issue.2
-
-
Abbasi, A.1
Chen, H.2
-
6
-
-
85040385892
-
Outside the cave of shadows: Using syntactic annotation to enhance authorship attribution
-
Baayen, R.H., van Halteren, H., Tweedie, F.: Outside the Cave of Shadows: Using Syntactic Annotation to Enhance Authorship Attribution. Literary and Linguistic Computing 11(3) (1996)
-
(1996)
Literary and Linguistic Computing
, vol.11
, Issue.3
-
-
Baayen, R.H.1
Van Halteren, H.2
Tweedie, F.3
-
7
-
-
34047230751
-
Who's at the keyboard? Authorship attribution in digital evidence investigations
-
Chaski, C.E.: Who's At The Keyboard? Authorship Attribution in Digital Evidence Investigations. International Journal of Digital Evidence 4(1) (2005)
-
(2005)
International Journal of Digital Evidence
, vol.4
, Issue.1
-
-
Chaski, C.E.1
-
8
-
-
6344263314
-
Multi-topic E-mail authorship attribution forensics
-
Philadelphia, PA, USA
-
de Vel, O., Anderson, A., Corney, M., Mohay, G.: Multi-Topic E-mail Authorship Attribution Forensics. In: ACM Conference on Computer Security - Workshop on Data Mining for Security Applications, Philadelphia, PA, USA (2001)
-
(2001)
ACM Conference on Computer Security - Workshop on Data Mining for Security Applications
-
-
De Vel, O.1
Anderson, A.2
Corney, M.3
Mohay, G.4
-
9
-
-
0042367634
-
Mining E-mail content for author identification forensics
-
de Vel, O., Anderson, A., Corney, M., Mohay, G.: Mining E-mail Content for Author Identification Forensics. SIGMOD Record Web Edition 30(4) (2001)
-
(2001)
SIGMOD Record Web Edition
, vol.30
, Issue.4
-
-
De Vel, O.1
Anderson, A.2
Corney, M.3
Mohay, G.4
-
10
-
-
15944427580
-
Mining E-mail authorship
-
Boston, Massachusetts, USA
-
de Vel, O.: Mining E-mail Authorship. In: KDD 2000 Workshop on Text Mining, Boston, Massachusetts, USA, pp. 21-27 (2000)
-
(2000)
KDD 2000 Workshop on Text Mining
, pp. 21-27
-
-
De Vel, O.1
-
11
-
-
28344449091
-
Segmenting documents by stylistic character
-
DOI 10.1017/S1351324905003694, PII S1351324905003694
-
Graham, N., Hirst, G., Marthi, B.: Segmenting documents by stylistic character. Natural Language Engineering 11(4), 397-415 (2005) (Pubitemid 41716064)
-
(2005)
Natural Language Engineering
, vol.11
, Issue.4
, pp. 397-415
-
-
Graham, N.1
Hirst, G.2
Marthi, B.3
-
14
-
-
44649163258
-
Chat mining: Predicting user and message attributes in computer-mediated communication
-
Kucukyilmaz, T., Cambazoglu, B.B., Aykanat, C., Can, F.: Chat mining: predicting user and message attributes in computer-mediated communication. Information Processing & Management 44(4), 1448-1466 (2008)
-
(2008)
Information Processing & Management
, vol.44
, Issue.4
, pp. 1448-1466
-
-
Kucukyilmaz, T.1
Cambazoglu, B.B.2
Aykanat, C.3
Can, F.4
-
16
-
-
33745213523
-
From fingerprint to writeprint
-
Li, J., Zheng, R., Chen, H.: From fingerprint to writeprint. Commun. ACM 49(4), 76-82 (2006)
-
(2006)
Commun. ACM
, vol.49
, Issue.4
, pp. 76-82
-
-
Li, J.1
Zheng, R.2
Chen, H.3
-
18
-
-
0042223455
-
Software piracy: A view from Hong Kong
-
Moores, T., Dhillon, G.: Software Piracy: A View from Hong Kong. Communications of the ACM 43(12), 88-93 (2000)
-
(2000)
Communications of the ACM
, vol.43
, Issue.12
, pp. 88-93
-
-
Moores, T.1
Dhillon, G.2
-
19
-
-
0038468599
-
The characteristic curves of composition
-
Mendenhall, T.C.: The Characteristic Curves of Composition. Science 11(11), 237-249 (1887)
-
(1887)
Science
, vol.11
, Issue.11
, pp. 237-249
-
-
Mendenhall, T.C.1
-
22
-
-
0001318320
-
The state of authorship attribution studies: Some problems and solutions
-
Rudman, J.: The state of authorship attribution studies: some problems and solutions. Computers and the Humanities 31(4) (1998)
-
(1998)
Computers and the Humanities
, vol.31
, Issue.4
-
-
Rudman, J.1
-
23
-
-
6344280602
-
E-mail authorship mining based on SVM for computer forensic
-
Shanghai
-
Teng, G., Lai, M., Ma, J., Li, Y.: E-mail Authorship Mining Based on SVM for Computer Forensic. In: Proceedings of the Third International Conference on Machine Learning and Cybernetics, Shanghai (2004)
-
(2004)
Proceedings of the Third International Conference on Machine Learning and Cybernetics
-
-
Teng, G.1
Lai, M.2
Ma, J.3
Li, Y.4
-
24
-
-
33644552803
-
A framework for authorship identification of online messages: Writing-style features and classification techniques
-
Zheng, R., Li, J., Chen, H., Huang, Z.: A Framework for Authorship Identification of Online Messages: Writing-Style Features and Classification Techniques. Journal of the American Society for Information Science and Technology 57(3), 378-393 (2006)
-
(2006)
Journal of the American Society for Information Science and Technology
, vol.57
, Issue.3
, pp. 378-393
-
-
Zheng, R.1
Li, J.2
Chen, H.3
Huang, Z.4
-
25
-
-
35048871882
-
Authorship analysis in cybercrime investigation
-
Chen, H., Miranda, R., Zeng, D.D., Demchak, C.C., Schroeder, J., Madhusudan, T. (eds.) Springer, Heidelberg
-
Zheng, R., Qin, Y., Huang, Z., Chen, H.: Authorship Analysis in Cybercrime Investigation. In: Chen, H., Miranda, R., Zeng, D.D., Demchak, C.C., Schroeder, J., Madhusudan, T. (eds.) ISI 2003. LNCS, vol. 2665, pp. 59-73. Springer, Heidelberg (2003)
-
(2003)
ISI 2003. LNCS
, vol.2665
, pp. 59-73
-
-
Zheng, R.1
Qin, Y.2
Huang, Z.3
Chen, H.4
|