Writeprints, ACM Transactions on Information Systems, vol.26, issue.2, pp.1-729, 2008. ,
DOI : 10.1145/1344411.1344413
Automatically profiling the author of an anonymous text, Communications of the ACM, vol.52, issue.2, pp.119-123, 2009. ,
DOI : 10.1145/1461928.1461959
Who Wrote the 15th Book of Oz? An Application of Multivariate Analysis to Authorship Attribution, CHANCE, vol.24, issue.2, pp.9-17, 2003. ,
DOI : 10.1080/14786440109462720
Practical attacks against authorship recognition techniques, Proceedings of the Twenty-First Conference on Innovative Applications of Artificial Intelligence, pp.60-65, 2009. ,
Who's at the keyboard: Authorship attribution in digital evidence investigations, International Journal of Digital Evidence, vol.4, issue.1, 2005. ,
On the admissibility of linguistic evidence, Brooklyn Law School Journal of Law and Policy, vol.21, issue.2, pp.441-466, 2013. ,
Method, consistency and distinctiveness in the forensic authorship analysis of SMS text messaging, Brooklyn Law School Journal of Law and Policy, vol.21, issue.2, pp.467-494, 2013. ,
Personality identification through on-line text analysis, presented at the Chicago Colloquium on Digital Humanities and Computer Science, 2012. ,
The WEKA data mining software, ACM SIGKDD Explorations Newsletter, vol.11, issue.1, pp.10-18, 2009. ,
DOI : 10.1145/1656274.1656278
A comparative study of machine learning methods for authorship attribution, Literary and Linguistic Computing, pp.215-223, 2010. ,
DOI : 10.1093/llc/fqq001
Operationalizing lexical choice in language change, presented at the First Conference on Quantitative Investigation in Theoretical Linguistics, 2002. ,
Authorship attribution, Foundations and Trends in Information Retrieval, pp.233-334, 2008. ,
Authorship Attribution, Foundations and Trends?? in Information Retrieval, vol.1, issue.3, 2008. ,
DOI : 10.1561/1500000005
Authorship and immigration: A case study, Brooklyn Law School Journal of Law and Policy, vol.21, issue.2, pp.287-298, 2013. ,
Geographically localizing tweets using stylometric analysis, presented at the American Association for Corpus Linguistics Conference, 2011. ,
Empirical evaluation of authorship obfuscation using JGAAP, Proceedings of the 3rd ACM workshop on Artificial intelligence and security, AISec '10, pp.14-18, 2010. ,
DOI : 10.1145/1866423.1866427
Computational methods in authorship attribution, Journal of the American Society for Information Science and Technology, vol.57, issue.3, pp.9-26, 2009. ,
DOI : 10.1002/asi.20961
Determining an author's native language by mining a text for errors, Proceeding of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining , KDD '05, pp.624-628, 2005. ,
DOI : 10.1145/1081870.1081947
Use Fewer Instances of the Letter ???i???: Toward Writing Style Anonymization, Privacy Enhancing Technologies, pp.299-318, 2012. ,
DOI : 10.1007/978-3-642-31680-7_16
Inference and Disputed Authorship: The Federalist, 1964. ,
Cosine distance nearest-neighbor classification for authorship attribution, presented at the Digital Humanities Conference, 2009. ,
Fast training of support vector machines using sequential minimal optimization, in Advances in Kernel Methods: Support Vector Learning, pp.185-208, 1999. ,
A survey of modern authorship attribution methods, Journal of the American Society for Information Science and Technology, vol.57, issue.3, pp.538-556, 2009. ,
DOI : 10.1002/asi.21001
On the robustness of authorship attribution based on character n-gram features, Brooklyn Law School Journal of Law and Policy, vol.21, issue.2, pp.421-439, 2013. ,
A mathematical explanation of Burrows's delta, presented at the Digital Humanities Conference, 2006. ,
Author verification by linguistic profiling, ACM Transactions on Speech and Language Processing, vol.4, issue.1, pp.1-1, 2007. ,
DOI : 10.1145/1187415.1187416
New Machine Learning Methods Demonstrate the Existence of a Human Stylome, Journal of Quantitative Linguistics, vol.12, issue.1, pp.65-77, 2005. ,
DOI : 10.1080/09296170500055350
The Art of Cross-Examination, 1936. ,
An efficient user verification system via mouse movements, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, pp.139-150, 2011. ,
DOI : 10.1145/2046707.2046725
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.220.9410