{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T23:27:17Z","timestamp":1725751637216},"publisher-location":"Berlin, Heidelberg","reference-count":30,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642411472"},{"type":"electronic","value":"9783642411489"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-41148-9_25","type":"book-chapter","created":{"date-parts":[[2013,10,9]],"date-time":"2013-10-09T18:47:31Z","timestamp":1381344451000},"page":"385-398","source":"Crossref","is-referenced-by-count":3,"title":["Towards Active Linguistic Authentication"],"prefix":"10.1007","author":[{"given":"Patrick","family":"Juola","sequence":"first","affiliation":[]},{"suffix":"Jr.","given":"John","family":"Noecker","sequence":"additional","affiliation":[]},{"given":"Ariel","family":"Stolerman","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Ryan","sequence":"additional","affiliation":[]},{"given":"Patrick","family":"Brennan","sequence":"additional","affiliation":[]},{"given":"Rachel","family":"Greenstadt","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"25_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1344411.1344413","volume":"26","author":"A. Abbasi","year":"2008","unstructured":"A. Abbasi and H. Chen, Writeprints: A stylometric approach to identity-level identification and similarity detection in cyberspace, ACM Transactions on Information Systems, vol. 26(2), pp. 7:1\u20137:29, 2008.","journal-title":"ACM Transactions on Information Systems"},{"issue":"2","key":"25_CR2","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1145\/1461928.1461959","volume":"52","author":"S. Argamon","year":"2009","unstructured":"S. Argamon, M. Koppel, J. Pennebaker and J. Schler, Automatically profiling the author of an anonymous text, Communications of the ACM, vol. 52(2), pp. 119\u2013123, 2009.","journal-title":"Communications of the ACM"},{"issue":"2","key":"25_CR3","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1080\/09332480.2003.10554843","volume":"16","author":"J. Binongo","year":"2003","unstructured":"J. Binongo, Who wrote the 15th Book of Oz? An application of multivariate analysis of authorship attribution, Chance, vol. 16(2), pp. 9\u201317, 2003.","journal-title":"Chance"},{"key":"25_CR4","first-page":"60","volume-title":"Proceedings of the Twenty-First Conference on Innovative Applications of Artificial Intelligence","author":"M. Brennan","year":"2009","unstructured":"M. Brennan and R. Greenstadt, Practical attacks against authorship recognition techniques, Proceedings of the Twenty-First Conference on Innovative Applications of Artificial Intelligence, pp. 60\u201365, 2009."},{"key":"25_CR5","unstructured":"C. Chaski, Who\u2019s at the keyboard: Authorship attribution in digital evidence investigations, International Journal of Digital Evidence, vol. 4(1), 2005."},{"issue":"2","key":"25_CR6","first-page":"441","volume":"21","author":"M. Coulthard","year":"2013","unstructured":"M. Coulthard, On the admissibility of linguistic evidence, Brooklyn Law School Journal of Law and Policy, vol. 21(2), pp. 441\u2013466, 2013.","journal-title":"Brooklyn Law School Journal of Law and Policy"},{"issue":"2","key":"25_CR7","first-page":"467","volume":"21","author":"T. Grant","year":"2013","unstructured":"T. Grant, TXT 4N6: Method, consistency and distinctiveness in the forensic authorship analysis of SMS text messaging, Brooklyn Law School Journal of Law and Policy, vol. 21(2), pp. 467\u2013494, 2013.","journal-title":"Brooklyn Law School Journal of Law and Policy"},{"key":"25_CR8","volume-title":"Chicago Colloquium on Digital Humanities and Computer Science","author":"C. Gray","year":"2012","unstructured":"C. Gray and P. Juola, Personality identification through on-line text analysis, presented at the Chicago Colloquium on Digital Humanities and Computer Science, 2012."},{"issue":"1","key":"25_CR9","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1145\/1656274.1656278","volume":"11","author":"M. Hall","year":"2009","unstructured":"M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann and I. Witten, The Weka Data Mining Software: An update, SIGKDD Explorations Newsletter, vol. 11(1), pp. 10\u201318, 2009.","journal-title":"SIGKDD Explorations Newsletter"},{"issue":"2","key":"25_CR10","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1093\/llc\/fqq001","volume":"25","author":"M. Jockers","year":"2010","unstructured":"M. Jockers and D. Witten, A comparative study of machine learning methods for authorship attribution, Literary and Linguistic Computing, vol. 25(2), pp. 215\u2013223, 2010.","journal-title":"Literary and Linguistic Computing"},{"key":"25_CR11","volume-title":"First Conference on Quantitative Investigation in Theoretical Linguistics","author":"P. Juola","year":"2002","unstructured":"P. Juola, Operationalizing lexical choice in language change, presented at the First Conference on Quantitative Investigation in Theoretical Linguistics, 2002."},{"issue":"3","key":"25_CR12","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1561\/1500000005","volume":"1","author":"P. Juola","year":"2008","unstructured":"P. Juola, Authorship attribution, Foundations and Trends in Information Retrieval, vol. 1(3), pp. 233\u2013334, 2008.","journal-title":"Foundations and Trends in Information Retrieval"},{"key":"25_CR13","volume-title":"American Association for Corpus Linguistics Conference","author":"P. Juola","year":"2008","unstructured":"P. Juola, Authorship attribution: What mixture-of-experts says we don\u2019t yet know, presented at the American Association for Corpus Linguistics Conference, 2008."},{"issue":"2","key":"25_CR14","first-page":"287","volume":"21","author":"P. Juola","year":"2013","unstructured":"P. Juola, Authorship and immigration: A case study, Brooklyn Law School Journal of Law and Policy, vol. 21(2), pp. 287\u2013298, 2013.","journal-title":"Brooklyn Law School Journal of Law and Policy"},{"key":"25_CR15","unstructured":"P. Juola, J. Noecker, M. Ryan and S. Speer, JGAAP 4.0 \u2013 A revised authorship attribution tool, presented at the Digital Humanities Conference, 2009."},{"key":"25_CR16","volume-title":"American Association for Corpus Linguistics Conference","author":"P. Juola","year":"2011","unstructured":"P. Juola, M. Ryan and M. Mehok, Geographically localizing tweets using stylometric analysis, presented at the American Association for Corpus Linguistics Conference, 2011."},{"key":"25_CR17","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1145\/1866423.1866427","volume-title":"Proceedings of the Third ACM Workshop on Artificial Intelligence and Security","author":"P. Juola","year":"2010","unstructured":"P. Juola and D. Vescovi, Empirical evaluation of authorship obfuscation using JGAAP, Proceedings of the Third ACM Workshop on Artificial Intelligence and Security, pp. 14\u201318, 2010."},{"issue":"1","key":"25_CR18","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1002\/asi.20961","volume":"60","author":"M. Koppel","year":"2009","unstructured":"M. Koppel, J. Schler and S. Argamon, Computational methods in authorship attribution, Journal of the American Society for Information Science and Technology, vol. 60(1), pp. 9\u201326, 2009.","journal-title":"Journal of the American Society for Information Science and Technology"},{"key":"25_CR19","doi-asserted-by":"publisher","first-page":"624","DOI":"10.1145\/1081870.1081947","volume-title":"Proceedings of the Eleventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","author":"M. Koppel","year":"2005","unstructured":"M. Koppel, J. Schler and K. Zigdon, Determining an author\u2019s native language by mining a text for errors, Proceedings of the Eleventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 624\u2013628, 2005."},{"key":"25_CR20","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1007\/978-3-642-31680-7_16","volume-title":"Privacy Enhancing Technologies","author":"A. McDonald","year":"2012","unstructured":"A. McDonald, S. Afroz, A. Caliskan, A. Stolerman and R. Greenstadt, Use fewer instances of the letter \u201ci\u201d: Toward writing style anonymization, in Privacy Enhancing Technologies, S. Fischer-Hubner and M. Wright (Eds.), Springer-Verlag, Berlin, Germany, pp. 299\u2013318, 2012."},{"key":"25_CR21","volume-title":"Inference and Disputed Authorship: The Federalist","author":"F. Mosteller","year":"1964","unstructured":"F. Mosteller and D. Wallace, Inference and Disputed Authorship: The Federalist, Addison-Wesley, Reading, Massachusetts, 1964."},{"key":"25_CR22","unstructured":"J. Noecker and P. Juola, Cosine distance nearest-neighbor classification for authorship attribution, presented at the Digital Humanities Conference, 2009."},{"key":"25_CR23","first-page":"185","volume-title":"Advances in Kernel Methods: Support Vector Learning","author":"J. Platt","year":"1999","unstructured":"J. Platt, Fast training of support vector machines using sequential minimal optimization, in Advances in Kernel Methods: Support Vector Learning, B. Scholkopf, C. Burges and A. Smola (Eds.), MIT Press, Cambridge, Massachusetts, pp. 185\u2013208, 1999."},{"issue":"3","key":"25_CR24","doi-asserted-by":"publisher","first-page":"538","DOI":"10.1002\/asi.21001","volume":"60","author":"E. Stamatatos","year":"2009","unstructured":"E. Stamatatos, A survey of modern authorship attribution methods, Journal of the American Society for Information Science and Technology, vol. 60(3), pp. 538\u2013556, 2009.","journal-title":"Journal of the American Society for Information Science and Technology"},{"issue":"2","key":"25_CR25","first-page":"421","volume":"21","author":"E. Stamatatos","year":"2013","unstructured":"E. Stamatatos, On the robustness of authorship attribution based on character n-gram features, Brooklyn Law School Journal of Law and Policy, vol. 21(2), pp. 421\u2013439, 2013.","journal-title":"Brooklyn Law School Journal of Law and Policy"},{"key":"25_CR26","unstructured":"S. Stein and S. Argamon, A mathematical explanation of Burrows\u2019s delta, presented at the Digital Humanities Conference, 2006."},{"issue":"1","key":"25_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1187415.1187416","volume":"4","author":"H. Halteren van","year":"2007","unstructured":"H. van Halteren, Author verification by linguistic profiling: An exploration of the parameter space, ACM Transactions on Speech and Language Processing, vol. 4(1), pp. 1:1\u20131:17, 2007.","journal-title":"ACM Transactions on Speech and Language Processing"},{"issue":"1","key":"25_CR28","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1080\/09296170500055350","volume":"12","author":"H. Halteren van","year":"2005","unstructured":"H. van Halteren, R. Baayen, F. Tweedie, M. Haverkort and A. Neijt, New machine learning methods demonstrate the existence of a human stylome, Journal of Quantitative Linguistics, vol. 12(1), pp. 65\u201377, 2005.","journal-title":"Journal of Quantitative Linguistics"},{"key":"25_CR29","volume-title":"The Art of Cross-Examination","author":"F. Wellman","year":"1936","unstructured":"F. Wellman, The Art of Cross-Examination, Macmillan, New York, 1936."},{"key":"25_CR30","first-page":"139","volume-title":"Proceedings of the Eighteenth ACM Conference on Computer and Communications Security","author":"N. Zheng","year":"2011","unstructured":"N. Zheng, A. Paloski and H. Wang, An efficient user verification system via mouse movements, Proceedings of the Eighteenth ACM Conference on Computer and Communications Security, pp. 139\u2013150, 2011."}],"container-title":["IFIP Advances in Information and Communication Technology","Advances in Digital Forensics IX"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-41148-9_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,29]],"date-time":"2020-01-29T15:27:23Z","timestamp":1580311643000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-41148-9_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642411472","9783642411489"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-41148-9_25","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2013]]}}}