Applying Authorship Analysis to Extremist-Group Web Forum Messages, IEEE Intelligent Systems, vol.20, issue.5, pp.67-75, 2005. ,
DOI : 10.1109/MIS.2005.81
Writeprints, ACM Transactions on Information Systems, vol.26, issue.2, pp.1-729, 2008. ,
DOI : 10.1145/1344411.1344413
A New Biometric Technology Based on Mouse Dynamics, IEEE Transactions on Dependable and Secure Computing, vol.4, issue.3, pp.165-179, 2007. ,
DOI : 10.1109/TDSC.2007.70207
On the Link Between Error Correlation and Error Reduction in Decision Tree Ensembles, 1995. ,
Mining the Blogosphere: Age, gender and the varieties of self-expression, First Monday, vol.12, issue.9, 2007. ,
DOI : 10.5210/fm.v12i9.2003
Automatically profiling the author of an anonymous text, Communications of the ACM, vol.52, issue.2, pp.119-123, 2009. ,
DOI : 10.1145/1461928.1461959
Continual keystroke biometric authentication on short bursts of keyboard input, Proceedings of the Student-Faculty Research Day, 2012. ,
User authentication through keystroke dynamics, ACM Transactions on Information and System Security, vol.5, issue.4, pp.367-397, 2002. ,
DOI : 10.1145/581271.581272
Who Wrote the 15th Book of Oz? An Application of Multivariate Analysis to Authorship Attribution, CHANCE, vol.24, issue.2, pp.9-17, 2003. ,
DOI : 10.1080/14786440109462720
Optimal Data Fusion in Multiple Sensor Detection Systems, IEEE Transactions on Aerospace and Electronic Systems, vol.22, issue.1, pp.98-101, 1986. ,
DOI : 10.1109/TAES.1986.310699
Who's at the keyboard: Authorship attribution in digital evidence investigations, International Journal of Digital Evidence, vol.4, issue.1, 2005. ,
The keyboard dilemma and forensic authorship attribution , in Advances in Digital Forensics III, pp.133-146, 2007. ,
Personality identification through on-line text analysis, presented at the Chicago Colloquium on Digital Humanities and Computer Science, 2012. ,
The WEKA data mining software, ACM SIGKDD Explorations Newsletter, vol.11, issue.1, pp.10-18, 2009. ,
DOI : 10.1145/1656274.1656278
Improving model accuracy using optimal linear combinations of trained neural networks, IEEE Transactions on Neural Networks, vol.6, issue.3, pp.792-794, 1995. ,
DOI : 10.1109/72.377990
A comparative study of machine learning methods for authorship attribution, Literary and Linguistic Computing, pp.215-223, 2010. ,
DOI : 10.1093/llc/fqq001
Authorship attribution, Foundations and Trends in Information Retrieval, pp.233-334, 2008. ,
Towards Active Linguistic Authentication, Advances in Digital Forensics IX, pp.385-398, 2013. ,
DOI : 10.1007/978-3-642-41148-9_25
URL : https://hal.archives-ouvertes.fr/hal-01460617
Geographically localizing tweets using stylometric analysis, presented at the American Association for Corpus Linguistics Conference, 2011. ,
On combining classifiers, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.20, issue.3, pp.226-239, 1998. ,
DOI : 10.1109/34.667881
Ad-hoc authorship attribution competition ? Approach outline, presented at the Joint International Conference of the Association for Literary and Linguistic Computing and the Association for Computers and the Humanities, 2004. ,
Authorship verification as a one-class classification problem, Twenty-first international conference on Machine learning , ICML '04, 2004. ,
DOI : 10.1145/1015330.1015448
Computational methods in authorship attribution, Journal of the American Society for Information Science and Technology, vol.57, issue.3, pp.9-26, 2009. ,
DOI : 10.1002/asi.20961
Determining an author's native language by mining a text for errors, Proceeding of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining , KDD '05, pp.624-628, 2005. ,
DOI : 10.1145/1081870.1081947
Using literal and grammatical statistics for authorship attribution, Problems of Information Transmission, pp.96-198, 2001. ,
Use Fewer Instances of the Letter ???i???: Toward Writing Style Anonymization, Privacy Enhancing Technologies, pp.299-318, 2012. ,
DOI : 10.1007/978-3-642-31680-7_16
Inference and Disputed Authorship: The Federalist, 1964. ,
On the Feasibility of Internet-Scale Author Identification, 2012 IEEE Symposium on Security and Privacy, pp.300-314, 2012. ,
DOI : 10.1109/SP.2012.46
Verification of computer users using keystroke dynamics, IEEE Transactions on Systems, Man and Cybernetics, Part B (Cybernetics), vol.27, issue.2, pp.261-269, 1997. ,
DOI : 10.1109/3477.558812
User authentication for keypad-based devices using keystroke analysis, Proceedings of the Second International Network Conference, pp.263-272, 2000. ,
Fast training of support vector machines using sequential minimal optimization, in Advances in Kernel Methods: Support Vector Learning, pp.185-208, 1999. ,
The state of authorship attribution studies: Some problems and solutions, Computers and the Humanities, vol.31, issue.4, pp.351-365, 1998. ,
DOI : 10.1023/A:1001018624850
A survey of biometric keystroke dynamics: Approaches, security and challenges, International Journal of Computer Science and Information Security, vol.5, issue.1, pp.115-119, 2009. ,
Continuous Verification Using Multimodal Biometrics, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.29, issue.4, pp.687-700, 2007. ,
DOI : 10.1109/TPAMI.2007.1010
A survey of modern authorship attribution methods, Journal of the American Society for Information Science and Technology, vol.57, issue.3, pp.538-556, 2009. ,
DOI : 10.1002/asi.21001
On the robustness of authorship attribution based on character n-gram features, Brooklyn Law School Journal of Law and Policy, vol.21, issue.2, pp.421-439, 2013. ,
Author verification by linguistic profiling, ACM Transactions on Speech and Language Processing, vol.4, issue.1, pp.1-1, 2007. ,
DOI : 10.1145/1187415.1187416
New Machine Learning Methods Demonstrate the Existence of a Human Stylome, Journal of Quantitative Linguistics, vol.12, issue.1, pp.65-77, 2005. ,
DOI : 10.1080/09296170500055350
FUNDAMENTALS OF BIOMETRIC AUTHENTICATION TECHNOLOGIES, International Journal of Image and Graphics, vol.01, issue.01, pp.93-113, 2001. ,
DOI : 10.1142/S0219467801000086
Technology Assessment for the State of the Art Biometrics Excellence Roadmap, 2009. ,
Behavioral Modeling: an Overview, American Journal of Applied Sciences, vol.5, issue.5, pp.496-503, 2008. ,
DOI : 10.3844/ajassp.2008.496.503
An efficient user verification system via mouse movements, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, pp.139-150, 2011. ,
DOI : 10.1145/2046707.2046725
A framework for authorship identification of online messages: Writing-style features and classification techniques, Journal of the American Society for Information Science and Technology, vol.30, issue.3, pp.378-393, 2006. ,
DOI : 10.1002/asi.20316