A. Abbasi and H. Chen, Writeprints, ACM Transactions on Information Systems, vol.26, issue.2, pp.1-729, 2008.
DOI : 10.1145/1344411.1344413

S. Argamon, M. Koppel, J. Pennebaker, and J. Schler, Automatically profiling the author of an anonymous text, Communications of the ACM, vol.52, issue.2, pp.119-123, 2009.
DOI : 10.1145/1461928.1461959

J. Binongo, Who Wrote the 15th Book of Oz? An Application of Multivariate Analysis to Authorship Attribution, CHANCE, vol.24, issue.2, pp.9-17, 2003.
DOI : 10.1080/14786440109462720

M. Brennan and R. Greenstadt, Practical attacks against authorship recognition techniques, Proceedings of the Twenty-First Conference on Innovative Applications of Artificial Intelligence, pp.60-65, 2009.

C. Chaski, Who's at the keyboard: Authorship attribution in digital evidence investigations, International Journal of Digital Evidence, vol.4, issue.1, 2005.

M. Coulthard, On the admissibility of linguistic evidence, Brooklyn Law School Journal of Law and Policy, vol.21, issue.2, pp.441-466, 2013.

T. Grant, Method, consistency and distinctiveness in the forensic authorship analysis of SMS text messaging, Brooklyn Law School Journal of Law and Policy, vol.21, issue.2, pp.467-494, 2013.

C. Gray and P. Juola, Personality identification through on-line text analysis, presented at the Chicago Colloquium on Digital Humanities and Computer Science, 2012.

M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann et al., The WEKA data mining software, ACM SIGKDD Explorations Newsletter, vol.11, issue.1, pp.10-18, 2009.
DOI : 10.1145/1656274.1656278

M. Jockers and D. Witten, A comparative study of machine learning methods for authorship attribution, Literary and Linguistic Computing, pp.215-223, 2010.
DOI : 10.1093/llc/fqq001

P. Juola, Operationalizing lexical choice in language change, presented at the First Conference on Quantitative Investigation in Theoretical Linguistics, 2002.

P. Juola, Authorship attribution, Foundations and Trends in Information Retrieval, pp.233-334, 2008.

P. Juola, Authorship Attribution, Foundations and Trends?? in Information Retrieval, vol.1, issue.3, 2008.
DOI : 10.1561/1500000005

P. Juola, Authorship and immigration: A case study, Brooklyn Law School Journal of Law and Policy, vol.21, issue.2, pp.287-298, 2013.

P. Juola, M. Ryan, and M. Mehok, Geographically localizing tweets using stylometric analysis, presented at the American Association for Corpus Linguistics Conference, 2011.

P. Juola and D. Vescovi, Empirical evaluation of authorship obfuscation using JGAAP, Proceedings of the 3rd ACM workshop on Artificial intelligence and security, AISec '10, pp.14-18, 2010.
DOI : 10.1145/1866423.1866427

M. Koppel, J. Schler, and S. Argamon, Computational methods in authorship attribution, Journal of the American Society for Information Science and Technology, vol.57, issue.3, pp.9-26, 2009.
DOI : 10.1002/asi.20961

M. Koppel, J. Schler, and K. Zigdon, Determining an author's native language by mining a text for errors, Proceeding of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining , KDD '05, pp.624-628, 2005.
DOI : 10.1145/1081870.1081947

A. Mcdonald, S. Afroz, A. Caliskan, A. Stolerman, and R. Greenstadt, Use Fewer Instances of the Letter ???i???: Toward Writing Style Anonymization, Privacy Enhancing Technologies, pp.299-318, 2012.
DOI : 10.1007/978-3-642-31680-7_16

F. Mosteller and D. Wallace, Inference and Disputed Authorship: The Federalist, 1964.

J. Noecker and P. Juola, Cosine distance nearest-neighbor classification for authorship attribution, presented at the Digital Humanities Conference, 2009.

J. Platt, Fast training of support vector machines using sequential minimal optimization, in Advances in Kernel Methods: Support Vector Learning, pp.185-208, 1999.

E. Stamatatos, A survey of modern authorship attribution methods, Journal of the American Society for Information Science and Technology, vol.57, issue.3, pp.538-556, 2009.
DOI : 10.1002/asi.21001

E. Stamatatos, On the robustness of authorship attribution based on character n-gram features, Brooklyn Law School Journal of Law and Policy, vol.21, issue.2, pp.421-439, 2013.

S. Stein and S. Argamon, A mathematical explanation of Burrows's delta, presented at the Digital Humanities Conference, 2006.

H. Van-halteren, Author verification by linguistic profiling, ACM Transactions on Speech and Language Processing, vol.4, issue.1, pp.1-1, 2007.
DOI : 10.1145/1187415.1187416

H. Van-halteren, R. Baayen, F. Tweedie, M. Haverkort, and A. Neijt, New Machine Learning Methods Demonstrate the Existence of a Human Stylome, Journal of Quantitative Linguistics, vol.12, issue.1, pp.65-77, 2005.
DOI : 10.1080/09296170500055350

F. Wellman, The Art of Cross-Examination, 1936.

N. Zheng, A. Paloski, and H. Wang, An efficient user verification system via mouse movements, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, pp.139-150, 2011.
DOI : 10.1145/2046707.2046725

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.220.9410