Authorship attribution for social media forensics

A Rocha, WJ Scheirer, CW Forstall… - IEEE transactions on …, 2016 - ieeexplore.ieee.org
The veil of anonymity provided by smartphones with pre-paid SIM cards, public Wi-Fi
hotspots, and distributed networks like Tor has drastically complicated the task of identifying …

Machine learning for e-mail spam filtering: review, techniques and trends

A Bhowmick, SM Hazarika - arxiv preprint arxiv:1606.01042, 2016 - arxiv.org
We present a comprehensive review of the most effective content-based e-mail spam
filtering techniques. We focus primarily on Machine Learning-based spam filters and their …

A survey of modern authorship attribution methods

E Stamatatos - Journal of the American Society for information …, 2009 - Wiley Online Library
Authorship attribution supported by statistical or computational methods has a long history
starting from the 19th century and is marked by the seminal study of Mosteller and Wallace …

Authorship attribution

P Juola - Foundations and Trends® in Information Retrieval, 2008 - nowpublishers.com
Authorship attribution, the science of inferring characteristics of the author from the
characteristics of documents written by that author, is a problem with a long history and a …

Computational methods in authorship attribution

M Koppel, J Schler, S Argamon - Journal of the American …, 2009 - Wiley Online Library
Statistical authorship attribution has a long history, culminating in the use of modern
machine learning classification methods. Nevertheless, most of this work suffers from the …

A framework for authorship identification of online messages: Writing‐style features and classification techniques

R Zheng, J Li, H Chen, Z Huang - Journal of the American …, 2006 - Wiley Online Library
With the rapid proliferation of Internet technologies and applications, misuse of online
messages for inappropriate or illegal purposes has become a major concern for society. The …

Writeprints: A stylometric approach to identity-level identification and similarity detection in cyberspace

A Abbasi, H Chen - ACM Transactions on Information Systems (TOIS), 2008 - dl.acm.org
One of the problems often associated with online anonymity is that it hinders social
accountability, as substantiated by the high levels of cybercrime. Although identity cues are …

Author gender identification from text

N Cheng, R Chandramouli, KP Subbalakshmi - Digital investigation, 2011 - Elsevier
Text is still the most prevalent Internet media type. Examples of this include popular social
networking applications such as Twitter, Craigslist, Facebook, etc. Other web applications …

[PDF][PDF] Who's at the keyboard? Authorship attribution in digital evidence investigations

CE Chaski - International journal of digital evidence, 2005 - Citeseer
In some investigations of digital crime, the question of who was at the keyboard when
incriminating documents were produced can be legitimately raised. Authorship attribution …

Authorship attribution using text distortion

E Stamatatos - Proceedings of the 15th Conference of the …, 2017 - aclanthology.org
Authorship attribution is associated with important applications in forensics and humanities
research. A crucial point in this field is to quantify the personal style of writing, ideally in a …