Programming style authorship analysis
CSC '89 Proceedings of the 17th conference on ACM Annual Computer Science Conference
Software forensics: can we track code to its authors?
Computers and Security
The nature of statistical learning theory
The nature of statistical learning theory
Feature selection, perceptron learning, and a usability case study for text categorization
Proceedings of the 20th annual international ACM SIGIR conference on Research and development in information retrieval
A re-examination of text categorization methods
Proceedings of the 22nd annual international ACM SIGIR conference on Research and development in information retrieval
Data mining: practical machine learning tools and techniques with Java implementations
Data mining: practical machine learning tools and techniques with Java implementations
An Evaluation of Statistical Approaches to Text Categorization
Information Retrieval
Machine Learning
Introduction to Modern Information Retrieval
Introduction to Modern Information Retrieval
Text Categorization with Suport Vector Machines: Learning with Many Relevant Features
ECML '98 Proceedings of the 10th European Conference on Machine Learning
Authorship Attribution with Support Vector Machines
Applied Intelligence
Support vector machines for spam categorization
IEEE Transactions on Neural Networks
The myth of the double-blind review?: author identification using only citations
ACM SIGKDD Explorations Newsletter
Proceedings of the 13th international conference on World Wide Web
Detection of Spain e-mails by analyzing the distributing behaviors of e-mail servers
Design and application of hybrid intelligent systems
Discovery and regeneration of hidden emails
Proceedings of the 2005 ACM symposium on Applied computing
Applying Authorship Analysis to Extremist-Group Web Forum Messages
IEEE Intelligent Systems
Next-generation digital forensics
Communications of the ACM - Next-generation cyber forensics
From fingerprint to writeprint
Communications of the ACM - Supporting exploratory search
Crime data mining: an overview and case studies
dg.o '03 Proceedings of the 2003 annual national conference on Digital government research
Fighting cybercrime: a review and the Taiwan experience
Decision Support Systems - Special issue: Intelligence and security informatics
Event sequence mining to develop profiles for computer forensic investigation purposes
ACSW Frontiers '06 Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54
Named entity recognition in a South African context
SAICSIT '06 Proceedings of the 2006 annual research conference of the South African institute of computer scientists and information technologists on IT research in developing countries
ACM Transactions on Information Systems (TOIS)
Author identification: Using text sampling to handle the class imbalance problem
Information Processing and Management: an International Journal
Sentiment analysis in multiple languages: Feature selection for opinion classification in Web forums
ACM Transactions on Information Systems (TOIS)
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
Mining spam email to identify common origins for forensic application
Proceedings of the 2008 ACM symposium on Applied computing
Chat mining: Predicting user and message attributes in computer-mediated communication
Information Processing and Management: an International Journal
Tensor Space Models for Authorship Identification
SETN '08 Proceedings of the 5th Hellenic conference on Artificial Intelligence: Theories, Models and Applications
Finding Identity Group "Fingerprints" in Documents
IWCF '08 Proceedings of the 2nd international workshop on Computational Forensics
Journal of Computer Security
Stylometric Identification in Electronic Markets: Scalability and Robustness
Journal of Management Information Systems
Behavior-based spam detection using a hybrid method of rule-based techniques and neural networks
Expert Systems with Applications: An International Journal
Using case-based reasoning for the design of controls for internet-based information systems
Expert Systems with Applications: An International Journal
A survey of modern authorship attribution methods
Journal of the American Society for Information Science and Technology
A Cybercrime Forensic Method for Chinese Web Information Authorship Analysis
PAISI '09 Proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics
Journal of Computer Security - Best papers of the Sec Track at the 2006 ACM Symposium
Person identification from text and speech genre samples
EACL '09 Proceedings of the 12th Conference of the European Chapter of the Association for Computational Linguistics
Forensic Authorship Attribution Using Compression Distances to Prototypes
IWCF '09 Proceedings of the 3rd International Workshop on Computational Forensics
Fighting cybercrime: a review and the Taiwan experience
Decision Support Systems - Special issue: Intelligence and security informatics
Making sense of archived e-mail: Exploring the Enron collection with NetLens
Journal of the American Society for Information Science and Technology
e-mail authorship verification for forensic investigation
Proceedings of the 2010 ACM Symposium on Applied Computing
Authorship analysis in cybercrime investigation
ISI'03 Proceedings of the 1st NSF/NIJ conference on Intelligence and security informatics
A comparison of data preparation approaches for e-mail categorisation
International Journal of Intelligent Information and Database Systems
Authorship classification: a syntactic tree mining approach
Proceedings of the ACM SIGKDD Workshop on Useful Patterns
Empirical evaluation of authorship obfuscation using JGAAP
Proceedings of the 3rd ACM workshop on Artificial intelligence and security
Cuisine: Classification using stylistic feature sets and-or name-based feature sets
Journal of the American Society for Information Science and Technology
Automatic authorship attribution for texts in croatian language using combinations of features
KES'10 Proceedings of the 14th international conference on Knowledge-based and intelligent information and engineering systems: Part II
Authorship classification: a discriminative syntactic tree mining approach
Proceedings of the 34th international ACM SIGIR conference on Research and development in Information Retrieval
‘twazn me!!! ;(’ automatic authorship analysis of micro-blogging messages
NLDB'11 Proceedings of the 16th international conference on Natural language processing and information systems
Applying biometric principles to avatar recognition
Transactions on computational science XII
On the limitations of query obfuscation techniques for location privacy
Proceedings of the 13th international conference on Ubiquitous computing
Proceedings of the 4th ACM workshop on Security and artificial intelligence
Visualizing authorship for identification
ISI'06 Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics
N-Gram feature selection for authorship identification
AIMSA'06 Proceedings of the 12th international conference on Artificial Intelligence: methodology, Systems, and Applications
Indexing information for data forensics
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
Applying authorship analysis to arabic web content
ISI'05 Proceedings of the 2005 IEEE international conference on Intelligence and Security Informatics
User identity verification via mouse dynamics
Information Sciences: an International Journal
Using psycholinguistic features for profiling first language of authors
Journal of the American Society for Information Science and Technology
Distinguishing venues by writing styles
Proceedings of the 12th ACM/IEEE-CS joint conference on Digital Libraries
Mining co-distribution patterns for large crime datasets
Expert Systems with Applications: An International Journal
A novel approach of mining write-prints for authorship attribution in e-mail forensics
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Towards an integrated e-mail forensic analysis framework
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Mining writeprints from anonymous e-mails for forensic investigation
Digital Investigation: The International Journal of Digital Forensics & Incident Response
From the Editorial Board: Research summary
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Cross-lingual genre classification
EACL '12 Proceedings of the Student Research Workshop at the 13th Conference of the European Chapter of the Association for Computational Linguistics
Conversationally-inspired stylometric features for authorship attribution in instant messaging
Proceedings of the 20th ACM international conference on Multimedia
A sock puppet detection algorithm on virtual spaces
Knowledge-Based Systems
A unified data mining solution for authorship analysis in anonymous textual communications
Information Sciences: an International Journal
Semi-random subspace method for writeprint identification
Neurocomputing
Connecting users across social media sites: a behavioral-modeling approach
Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining
A method of feature selection and sentiment similarity for Chinese micro-blogs
Journal of Information Science
Simplified features for email authorship identification
International Journal of Security and Networks
International Journal of Artificial Life Research
Web search query privacy: Evaluating query obfuscation and anonymizing networks
Journal of Computer Security
Hi-index | 0.01 |
We describe an investigation into e-mail content mining for author identification, or authorship attribution, for the purpose of forensic investigation. We focus our discussion on the ability to discriminate between authors for the case of both aggregated e-mail topics as well as across different e-mail topics. An extended set of e-mail document features including structural characteristics and linguistic patterns were derived and, together with a Support Vector Machine learning algorithm, were used for mining the e-mail content. Experiments using a number of e-mail documents generated by different authors on a set of topics gave promising results for both aggregated and multi-topic author categorisation.