-
4
-
-
79959551864
-
The Facebook Freedom Fighter
-
Feb.
-
Mike Giglio, "The Facebook Freedom Fighter," Newsweek, Feb. 2011.
-
(2011)
Newsweek
-
-
Giglio, M.1
-
5
-
-
85175129921
-
Vogue model Liskula Cohen wins right to unmask offensive blogger
-
Aug.
-
J. Bone, "Vogue model Liskula Cohen wins right to unmask offensive blogger," The Times, Aug. 2009.
-
(2009)
The Times
-
-
Bone, J.1
-
6
-
-
85175133859
-
Unmasked blogger blames First Baptist, sheriff's office
-
Apr.
-
J. Brumley, "Unmasked blogger blames First Baptist, sheriff's office," The Florida Times-Union, Apr. 2009.
-
(2009)
The Florida Times-Union
-
-
Brumley, J.1
-
7
-
-
85175133641
-
ePublius: Anonymous Speech Rights Online
-
2010
-
M. E. Larios, "ePublius: Anonymous Speech Rights Online," Rutgers Law Record, Vol. 37, p. 36, 2010, 2010.
-
(2010)
Rutgers Law Record
, vol.37
, pp. 36
-
-
Larios, M.E.1
-
8
-
-
85175133355
-
The Right to Remain Anonymous
-
April 2008
-
G. H. Pike, "The Right to Remain Anonymous," Information Today, Vol. 25, No. 4, p. 17, April 2008, 2008.
-
(2008)
Information Today
, vol.25
, Issue.4
, pp. 17
-
-
Pike, G.H.1
-
11
-
-
79952242625
-
Authorship attribution in the wild
-
M. Koppel, J. Schler, and S. Argamon, "Authorship attribution in the wild," Language Resources and Evaluation, vol. 45, no. 1, pp. 83-94, 2011.
-
(2011)
Language Resources and Evaluation
, vol.45
, Issue.1
, pp. 83-94
-
-
Koppel, M.1
Schler, J.2
Argamon, S.3
-
12
-
-
79953091675
-
The effect of author set size and data size in authorship attribution
-
K. Luyckx and W. Daelemans, "The effect of author set size and data size in authorship attribution," Literary and Linguistic Computing, vol. 26, no. 1, pp. 35-55, 2011.
-
(2011)
Literary and Linguistic Computing
, vol.26
, Issue.1
, pp. 35-55
-
-
Luyckx, K.1
Daelemans, W.2
-
14
-
-
85175133979
-
Surprised Employer Fires Sex Blogger
-
May
-
C. Rubin, "Surprised Employer Fires Sex Blogger," Inc. Magazine, May 2010.
-
(2010)
Inc. Magazine
-
-
Rubin, C.1
-
15
-
-
84878356014
-
The Troubles of Korea's Influential Economic Pundit
-
Oct.
-
M. Schwartz, "The Troubles of Korea's Influential Economic Pundit," WIRED, Oct. 2009.
-
(2009)
WIRED
-
-
Schwartz, M.1
-
16
-
-
74949095118
-
Practical attacks against authorship recognition techniques
-
M. Brennan and R. Greenstadt, "Practical attacks against authorship recognition techniques," in IAAI, 2009.
-
(2009)
IAAI
-
-
Brennan, M.1
Greenstadt, R.2
-
18
-
-
0038468599
-
The characteristic curves of composition
-
T. C. Mendenhall, "The characteristic curves of composition," Science, vol. ns-9, no. 214S, pp. 237-246, 1887.
-
(1887)
Science
, vol.9
, Issue.214 S
, pp. 237-246
-
-
Mendenhall, T.C.1
-
19
-
-
12344329037
-
A mechanical solution of a literary problem
-
-, "A mechanical solution of a literary problem," Popular Science Monthly, vol. 60, no. 2, pp. 97-105, 1901.
-
(1901)
Popular Science Monthly
, vol.60
, Issue.2
, pp. 97-105
-
-
Mendenhall, T.C.1
-
21
-
-
62549150881
-
A survey of modern authorship attribution methods
-
March
-
E. Stamatatos, "A survey of modern authorship attribution methods," J. Am. Soc. Inf. Sci. Technol., vol. 60, pp. 538-556, March 2009.
-
(2009)
J. Am. Soc. Inf. Sci. Technol.
, vol.60
, pp. 538-556
-
-
Stamatatos, E.1
-
22
-
-
61849114303
-
Author identification on the large scale
-
D. Madigan, A. Genkin, D. D. Lewis, S. Argamon, D. Fradkin, and L. Ye, "Author identification on the large scale," in Joint Meeting of the Interface and Classification Society of North America, 2005.
-
Joint Meeting of the Interface and Classification Society of North America, 2005
-
-
Madigan, D.1
Genkin, A.2
Lewis, D.D.3
Argamon, S.4
Fradkin, D.5
Ye, L.6
-
23
-
-
42049084142
-
Writeprints: A stylometric approach to identity-level identification and similarity detection in cyberspace
-
Mar.
-
A. Abbasi and H. Chen, "Writeprints: A stylometric approach to identity-level identification and similarity detection in cyberspace," ACM Transactions on Information Systems, vol. 26, no. 2, Mar. 2008.
-
(2008)
ACM Transactions on Information Systems
, vol.26
, Issue.2
-
-
Abbasi, A.1
Chen, H.2
-
24
-
-
0042367634
-
Mining E-mail content for author identification forensics
-
O. Y. de Vel, A. Anderson, M. Corney, and G. M. Mohay, "Mining email content for author identification forensics," SIGMOD Record, vol. 30, no. 4, pp. 55-64, 2001. (Pubitemid 33720999)
-
(2001)
SIGMOD Record
, vol.30
, Issue.4
, pp. 55-64
-
-
De Vel, O.1
Anderson, A.2
Corney, M.3
Mohay, G.4
-
25
-
-
34047230751
-
Who's at the keyboard? Authorship attribution in digital evidence investigations
-
C. E. Chaski, "Who's at the keyboard? authorship attribution in digital evidence investigations," IJDE, vol. 4, no. 1, 2005.
-
(2005)
IJDE
, vol.4
, Issue.1
-
-
Chaski, C.E.1
-
27
-
-
0005542307
-
A stylometric analysis of mormon scripture and related texts
-
D. I. Holmes, "A stylometric analysis of mormon scripture and related texts," Journal of the Royal Statistical Society Series A Statistics in Society, vol. 155, no. 1, pp. 91-120, 1992.
-
(1992)
Journal of the Royal Statistical Society Series a Statistics in Society
, vol.155
, Issue.1
, pp. 91-120
-
-
Holmes, D.I.1
-
28
-
-
84872013214
-
Detecting Hoaxes, Frauds, and Deception in Writing Style Online
-
S. Afroz, M. Brennan, and R. Greenstadt, "Detecting Hoaxes, Frauds, and Deception in Writing Style Online," in IEEE Symposium on Security and Privacy, 2012.
-
IEEE Symposium on Security and Privacy, 2012
-
-
Afroz, S.1
Brennan, M.2
Greenstadt, R.3
-
29
-
-
3142712356
-
Text genre detection using common word frequencies
-
Proceedings of the 18th conference on Computational linguistics - Volume 2, ser. Stroudsburg, PA, USA: Association for Computational Linguistics
-
E. Stamatatos, N. Fakotakis, and G. Kokkinakis, "Text genre detection using common word frequencies," in Proceedings of the 18th conference on Computational linguistics - Volume 2, ser. COLING '00. Stroudsburg, PA, USA: Association for Computational Linguistics, 2000, pp. 808-814.
-
(2000)
COLING '00
, pp. 808-814
-
-
Stamatatos, E.1
Fakotakis, N.2
Kokkinakis, G.3
-
30
-
-
58449112832
-
Computational methods in authorship attribution
-
M. Koppel, J. Schler, and S. Argamon, "Computational methods in authorship attribution," JASIST, vol. 60, no. 1, pp. 9-26, 2009.
-
(2009)
JASIST
, vol.60
, Issue.1
, pp. 9-26
-
-
Koppel, M.1
Schler, J.2
Argamon, S.3
-
32
-
-
70349292573
-
On the use of discretized source code metrics for author identification
-
M. Shevertalov, J. Kothari, E. Stehle, and S. Mancoridis, "On the use of discretized source code metrics for author identification," in SSBSE, 2009.
-
(2009)
SSBSE
-
-
Shevertalov, M.1
Kothari, J.2
Stehle, E.3
Mancoridis, S.4
-
33
-
-
33745456200
-
Fileprints: Identifying file types by n-gram analysis
-
W.-J. Li, K. Wang, S. J. Stolfo, and B. Herzog, "Fileprints: identifying file types by n-gram analysis," in IEEE Systems, Man, and Cybernetics Information Assurance Workshop, 2005.
-
IEEE Systems, Man, and Cybernetics Information Assurance Workshop, 2005
-
-
Li, W.-J.1
Wang, K.2
Stolfo, S.J.3
Herzog, B.4
-
36
-
-
56249097939
-
Empirical evaluations of language-based author identification techniques
-
C. E. Chaski, "Empirical evaluations of language-based author identification techniques," Forensic Linguistics, vol. 8, no. 1, pp. 1-65, 2001.
-
(2001)
Forensic Linguistics
, vol.8
, Issue.1
, pp. 1-65
-
-
Chaski, C.E.1
-
37
-
-
33748759334
-
Plagiarism - A survey
-
H. Maurer, F. Kappe, and B. Zaka, "Plagiarism - a survey," Journal of Universal Computer Science, vol. 12, no. 8, pp. 1050-1084, 2006.
-
(2006)
Journal of Universal Computer Science
, vol.12
, Issue.8
, pp. 1050-1084
-
-
Maurer, H.1
Kappe, F.2
Zaka, B.3
-
38
-
-
85084161175
-
Can pseudonymity really guarantee privacy?
-
Berkeley, CA, USA: USENIX Association
-
J. R. Rao and P. Rohatgi, "Can pseudonymity really guarantee privacy?" in Proceedings of the 9th conference on USENIX Security Symposium - Volume 9. Berkeley, CA, USA: USENIX Association, 2000, pp. 7-7.
-
(2000)
Proceedings of the 9th Conference on USENIX Security Symposium
, vol.9
, pp. 7-7
-
-
Rao, J.R.1
Rohatgi, P.2
-
39
-
-
33750364891
-
Authorship attribution with thousands of candidate authors
-
M. Koppel, J. Schler, S. Argamon, and E. Messeri, "Authorship attribution with thousands of candidate authors," in SIGIR, 2006, pp. 659-660.
-
(2006)
SIGIR
, pp. 659-660
-
-
Koppel, M.1
Schler, J.2
Argamon, S.3
Messeri, E.4
-
40
-
-
84903435014
-
Herbert west: Deanonymizer
-
Proceedings of the 6th USENIX conference on Hot topics in security, ser. Berkeley, CA, USA: USENIX Association
-
M. Nanavati, N. Taylor, W. Aiello, and A. Warfield, "Herbert west: deanonymizer," in Proceedings of the 6th USENIX conference on Hot topics in security, ser. HotSec'11. Berkeley, CA, USA: USENIX Association, 2011, pp. 6-6.
-
(2011)
HotSec'11
, pp. 6-6
-
-
Nanavati, M.1
Taylor, N.2
Aiello, W.3
Warfield, A.4
-
41
-
-
33749590685
-
The myth of the double-blind review? Author identification using only citations
-
S. Hill and F. J. Provost, "The myth of the double-blind review? Author identification using only citations," SIGKDD Explorations, vol. 5, no. 2, pp. 179-184, 2003.
-
(2003)
SIGKDD Explorations
, vol.5
, Issue.2
, pp. 179-184
-
-
Hill, S.1
Provost, F.J.2
-
43
-
-
79955586500
-
-
Tech. Rep., [Online]. Available
-
P. Eckersley, "How unique is your web browser?" Electronic Frontier Foundation, Tech. Rep., 2009. [Online]. Available: https:// panopticlick.eff.org/browser-uniqueness.pdf
-
(2009)
How Unique Is Your Web Browser?
-
-
Eckersley, P.1
-
44
-
-
77955214796
-
A practical attack to deanonymize social network users
-
G. Wondracek, T. Holz, E. Kirda, and C. Kruegel, "A practical attack to deanonymize social network users," in IEEE Symposium on Security and Privacy, 2010.
-
IEEE Symposium on Security and Privacy, 2010
-
-
Wondracek, G.1
Holz, T.2
Kirda, E.3
Kruegel, C.4
-
45
-
-
70849091591
-
Large online social footprints-an emerging threat
-
D. Irani, S. Webb, K. Li, and C. Pu, "Large online social footprints-an emerging threat," in International Conference on Computational Science and Engineering, 2009.
-
International Conference on Computational Science and Engineering, 2009
-
-
Irani, D.1
Webb, S.2
Li, K.3
Pu, C.4
-
46
-
-
79961201365
-
How unique and traceable are usernames?
-
D. Perito, C. Castelluccia, M. A. Kâafar, and P. Manils, "How unique and traceable are usernames?" in PETS, 2011, pp. 1-17.
-
(2011)
PETS
, pp. 1-17
-
-
Perito, D.1
Castelluccia, C.2
Kâafar, M.A.3
Manils, P.4
-
47
-
-
0742290133
-
An introduction to biometric recognition
-
A. K. Jain, A. Ross, and S. Prabhakar, "An introduction to biometric recognition," IEEE Trans. on Circuits and Systems for Video Technology, vol. 14, pp. 4-20, 2004.
-
(2004)
IEEE Trans. on Circuits and Systems for Video Technology
, vol.14
, pp. 4-20
-
-
Jain, A.K.1
Ross, A.2
Prabhakar, S.3
-
48
-
-
0346750541
-
Silhouette analysis-based gait recognition for human identification
-
L. Wang, T. Tan, S. Member, H. Ning, and W. Hu, "Silhouette analysis-based gait recognition for human identification," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 25, no. 12, pp. 1505-1518, 2003.
-
(2003)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.25
, Issue.12
, pp. 1505-1518
-
-
Wang, L.1
Tan, T.2
Member, S.3
Ning, H.4
Hu, W.5
-
49
-
-
0033640745
-
On-line and off-line handwriting recognition: A comprehensive survey
-
DOI 10.1109/34.824821
-
R. Plamondon and S. N. Srihari, "On-line and off-line handwriting recognition: A comprehensive survey," IEEE Trans. Pattern Anal. Mach. Intell., vol. 22, pp. 63-84, January 2000. (Pubitemid 32132955)
-
(2000)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.22
, Issue.1
, pp. 63-84
-
-
Plamondon, R.1
Srihari, S.N.2
-
50
-
-
0034140431
-
Keystroke dynamics as a biometric for authentication
-
F. Monrose and A. D. Rubin, "Keystroke dynamics as a biometric for authentication," Future Generation Computer Systems, vol. 16, no. 4, pp. 351-359, 2000.
-
(2000)
Future Generation Computer Systems
, vol.16
, Issue.4
, pp. 351-359
-
-
Monrose, F.1
Rubin, A.D.2
-
51
-
-
0036811662
-
k-anonymity: A model for protecting privacy
-
L. Sweeney, "k-anonymity: A model for protecting privacy," Ieee Security And Privacy, vol. 10, no. 5, pp. 557-570, 2002.
-
(2002)
Ieee Security and Privacy
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
53
-
-
85175133921
-
The Hill's sex diarist reveals all (well, some)
-
May 204
-
R. Leiby, "The Hill's sex diarist reveals all (well, some)," The Washington Post, May 204.
-
The Washington Post
-
-
Leiby, R.1
-
56
-
-
85040385892
-
Outside the cave of shadows: Using syntactic annotation to enhance authorship attribution
-
Sep.
-
H. Baayen, H. van Halteren, and F. Tweedie, "Outside the cave of shadows: using syntactic annotation to enhance authorship attribution," Lit Linguist Computing, vol. 11, no. 3, pp. 121-132, Sep. 1996.
-
(1996)
Lit Linguist Computing
, vol.11
, Issue.3
, pp. 121-132
-
-
Baayen, H.1
Van Halteren, H.2
Tweedie, F.3
-
57
-
-
85119093321
-
Linguistic correlates of style: Authorship classification with deep linguistic analysis features
-
Proceedings of the 20th international conference on Computational Linguistics, ser. Stroudsburg, PA, USA: Association for Computational Linguistics
-
M. Gamon, "Linguistic correlates of style: authorship classification with deep linguistic analysis features," in Proceedings of the 20th international conference on Computational Linguistics, ser. COLING '04. Stroudsburg, PA, USA: Association for Computational Linguistics, 2004.
-
(2004)
COLING '04
-
-
Gamon, M.1
-
59
-
-
0026966646
-
A training algorithm for optimal margin classifiers
-
I. G. Bernhard E. Boser and V. Vapnik, "A training algorithm for optimal margin classifiers," in COLT, 1992, pp. 144-152.
-
(1992)
COLT
, pp. 144-152
-
-
G, I.1
Boser, B.E.2
Vapnik, V.3
-
60
-
-
34249753618
-
Support-vector networks
-
C. Cortes and V. Vapnik, "Support-vector networks," in Machine Learning, vol. 20, no. 3, 1995, pp. 273-297.
-
(1995)
Machine Learning
, vol.20
, Issue.3
, pp. 273-297
-
-
Cortes, C.1
Vapnik, V.2
|