Z. Andra, 10 alarming cyber security facts that threaten your data, Heimdalsecurity, 2015.

B. Tareaf, R. Berger, P. Hennig, P. Meinel, and C. , Identifying Audience Attributes, Proceedings of the 2017 International Conference on Cloud and Big Data Computing , ICCBDC 2017, pp.79-88, 2017.
DOI : 10.1007/978-3-642-24571-8_71

M. L. Brocardo, I. Traore, S. Saad, and I. Woungang, Authorship verification for short messages using stylometry, 2013 International Conference on Computer, Information and Telecommunication Systems (CITS), pp.1-6, 2013.
DOI : 10.1109/CITS.2013.6705711

M. Corney, D. Vel, O. Anderson, A. Mohay, and G. , Gender-preferential text mining of e-mail discourse, 18th Annual Computer Security Applications Conference, 2002. Proceedings., pp.282-289, 2002.
DOI : 10.1109/CSAC.2002.1176299

A. Boutyline and R. Willer, The Social Structure of Political Echo Chambers: Variation in Ideological Homophily in Online Networks, Political Psychology, vol.116, issue.2, pp.551-569, 2017.
DOI : 10.1086/653658

D. Vel, O. Anderson, A. Corney, M. Mohay, and G. , Mining e-mail content for author identification forensics, ACM SIGMOD Record, vol.30, issue.4, pp.55-64, 2001.
DOI : 10.1145/604264.604272

B. Tareaf and R. , Tweets Dataset -Top 20 most followed users in Twitter social platform, 2017.

M. Egele, G. Stringhini, C. Kruegel, and G. Vigna, Compa: Detecting compromised accounts on social networks, p.NDSS, 2013.
DOI : 10.1109/tdsc.2015.2479616

URL : https://doi.org/10.1109/tdsc.2015.2479616

D. Guthrie, L. Guthrie, B. Allison, and Y. Wilks, Unsupervised anomaly detection, IJCAI. pp, pp.1624-1628, 2007.

D. Guthrie, L. Guthrie, and Y. Wilks, An unsupervised approach for the detection of outliers in corpora, LREC, 2008.

M. Koppel, S. Argamon, and A. R. Shimoni, Automatically Categorizing Written Texts by Author Gender, Literary and linguistic computing, pp.401-412, 2002.
DOI : 10.1093/llc/17.4.401

URL : http://www.cs.biu.ac.il/~koppel/papers/male-female-llc-final.pdf

R. Schwartz, O. Tsur, A. Rappoport, and M. Koppel, Authorship attribution of micro-messages, Proceedings of the 2013 Conference on Empirical Methods in Natural Language Processing, pp.1880-1891, 2013.

G. Stringhini, C. Kruegel, and G. Vigna, Detecting spammers on social networks, Proceedings of the 26th Annual Computer Security Applications Conference on, ACSAC '10, pp.1-9, 2010.
DOI : 10.1145/1920261.1920263

R. Zheng, J. Li, H. Chen, and Z. Huang, A framework for authorship identification of online messages: Writing-style features and classification techniques, Journal of the American Society for Information Science and Technology, vol.30, issue.3, pp.378-393, 2006.
DOI : 10.1093/biomet/30.1-2.1