A. Abbasi and H. Chen, Applying Authorship Analysis to Extremist-Group Web Forum Messages, IEEE Intelligent Systems, vol.20, issue.5, pp.67-75, 2005.
DOI : 10.1109/MIS.2005.81

F. John and . Burrows, An ocean where each kind: Statistical analysis and some major determinants of literary style, Computers and the Humanities, vol.23, issue.4-5, pp.309-321, 1989.

R. Ronald, M. Coifman, and . Victor-wickerhauser, Entropy-based algorithms for best basis selection. Information Theory, IEEE Transactions on, vol.38, issue.2, pp.713-718, 1992.

A. Olivier-de-vel, M. Anderson, G. Corney, and . Mohay, Mining e-mail content for author identification forensics, ACM SIGMOD Record, vol.30, issue.4, pp.55-64, 2001.
DOI : 10.1145/604264.604272

S. Eggins, Introduction to systemic functional linguistics, 2004.

G. Frantzeskou, E. Stamatatos, S. Gritzalis, and S. Katsikas, Effective identification of source code authors using byte-level information, Proceeding of the 28th international conference on Software engineering , ICSE '06, pp.893-896, 2006.
DOI : 10.1145/1134285.1134445

R. Guzmán-cabrera, M. Montes-y-gómez, P. Rosso, and L. Villaseñor-pineda, A Web-Based Self-training Approach for Authorship Attribution, Advances in Natural Language Processing, pp.160-168, 2008.
DOI : 10.1007/11562382_14

H. Van-halteren, Author verification by linguistic profiling, ACM Transactions on Speech and Language Processing, vol.4, issue.1, 2007.
DOI : 10.1145/1187415.1187416

V. Ke?elj, F. Peng, N. Cercone, and C. Thomas, N-gram-based author profiles for authorship attribution, Proceedings of the conference pacific association for computational linguistics, pp.255-264, 2003.

M. Koppel, J. Schler, and S. Argamon, Authorship attribution in the wild, Language Resources and Evaluation, vol.57, issue.3, pp.83-94, 2011.
DOI : 10.1007/s10579-009-9111-2

M. Koppel, J. Schler, S. Argamon, and E. Messeri, Authorship attribution with thousands of candidate authors, Proceedings of the 29th annual international ACM SIGIR conference on Research and development in information retrieval , SIGIR '06, pp.659-660, 2006.
DOI : 10.1145/1148170.1148304

I. Kourtis and E. Stamatatos, Author identification using semisupervised learning, CLEF 2011: Proceedings of the 2011 Conference on Multilingual and Multimodal Information Access Evaluation (Lab and Workshop Notebook Papers), 2011.

S. Lee, H. Lee, P. Abbeel, Y. Andrew, and . Ng, Efficient l?1l?1 regularized logistic regression, Proceedings of the National Conference on Artificial Intelligence, p.401, 1999.

J. Li, R. Zheng, and H. Chen, From fingerprint to writeprint, Communications of the ACM, vol.49, issue.4, pp.76-82, 2006.
DOI : 10.1145/1121949.1121951

H. Love, Attributing authorship: An introduction, 2002.
DOI : 10.1017/CBO9780511483165

K. Luyckx and W. Daelemans, Authorship attribution and verification with many authors and limited data, Proceedings of the 22nd International Conference on Computational Linguistics, COLING '08, pp.513-520, 2008.
DOI : 10.3115/1599081.1599146

D. Madigan, A. Genkin, D. David, S. Lewis, D. Argamon et al., Author identification on the large scale, Proc. of the Meeting of the Classification Society of North America, 2005.

F. Peng, D. Schuurmans, and S. Wang, Augmenting Naive Bayes Classifiers with Statistical Language Models, Information Retrieval, vol.7, issue.3/4, pp.317-345, 2004.
DOI : 10.1023/B:INRT.0000011209.19643.e2

J. Schler, M. Koppel, S. Argamon, and J. W. Pennebaker, Effects of age and gender on blogging, AAAI Spring Symposium: Computational Approaches to Analyzing Weblogs, pp.199-205, 2006.

Y. Seroussi, F. Bohnert, and I. Zukerman, Authorship attribution with author-aware topic models, Proceedings of the 50th Annual Meeting of the Association for Computational Linguistics: Short Papers, pp.264-269, 2012.

E. Stamatatos, A survey of modern authorship attribution methods, Journal of the American Society for Information Science and Technology, vol.57, issue.3, pp.538-556, 2009.
DOI : 10.1002/asi.21001

R. Zheng, Y. Qin, Z. Huang, and H. Chen, Authorship Analysis in Cybercrime Investigation, Intelligence and Security Informatics, pp.59-73, 2003.
DOI : 10.1007/3-540-44853-5_5