{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,6]],"date-time":"2024-08-06T07:57:18Z","timestamp":1722931038677},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,9]]},"DOI":"10.1109\/dexa.2007.5","type":"proceedings-article","created":{"date-parts":[[2008,4,28]],"date-time":"2008-04-28T12:54:52Z","timestamp":1209387292000},"source":"Crossref","is-referenced-by-count":36,"title":["Author Identification Using Imbalanced and Limited Training Texts"],"prefix":"10.1109","author":[{"given":"Efstathios","family":"Stamatatos","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/505282.505283"},{"key":"ref11","first-page":"41","article-title":"Ensemble-based Author Identification Using Character N-grams","author":"stamatatos","year":"0","journal-title":"Proc of 3rd Int Workshop on Text-based Information Retrieval"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICMA.2005.1626789"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3115\/1218955.1218981"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134445"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1558\/sll.2001.8.1.1"},{"key":"ref6","article-title":"N-gram-based Author Profiles for Authorship Attribution","author":"keselj","year":"2003","journal-title":"Proc of the Conf of Pacific Association for Computational Linguistics"},{"key":"ref5","first-page":"175","article-title":"Ad-hoc Authorship Attribution Competition","author":"juola","year":"2004","journal-title":"Proc of ALLC\/ACH Joint Conf"},{"key":"ref8","article-title":"Author Identification on the Large Scale","author":"madigan","year":"2005","journal-title":"Proc of CSNA"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/860435.860456"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956805"},{"key":"ref1","article-title":"Detection of New Malicious Code Using Ngram Signatures","author":"abou-assaleh","year":"2004","journal-title":"Proc of the 2nd Annual Conference on Privacy Security and Trust"},{"key":"ref9","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4612-5256-6","author":"mosteller","year":"1984","journal-title":"Applied Bayesian and Classical Inference The Case of the Federalist Papers"}],"event":{"name":"18th International Conference on Database and Expert Systems Applications (DEXA 2007)","location":"Regensburg, Germany","start":{"date-parts":[[2007,9,3]]},"end":{"date-parts":[[2007,9,7]]}},"container-title":["18th International Conference on Database and Expert Systems Applications (DEXA 2007)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4312838\/4312839\/04312893.pdf?arnumber=4312893","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T03:30:06Z","timestamp":1497756606000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4312893\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,9]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/dexa.2007.5","relation":{},"subject":[],"published":{"date-parts":[[2007,9]]}}}