Continuous Authentication Using Writing Style
暂无分享,去创建一个
[1] Justin Zobel,et al. Searching With Style: Authorship Attribution in Classic Literature , 2007, ACSC.
[2] Isaac Woungang,et al. Toward a Framework for Continuous Authentication Using Stylometry , 2014, 2014 IEEE 28th International Conference on Advanced Information Networking and Applications.
[3] Ophir Frieder,et al. Repeatable evaluation of search services in dynamic environments , 2007, TOIS.
[4] D. Holmes. The Evolution of Stylometry in Humanities Scholarship , 1998 .
[5] Charles C. Tappert,et al. A Stylometry System for Authenticating Students Taking Online Tests , 2011 .
[6] Rajarathnam Chandramouli,et al. Gender identification from E-mails , 2009, 2009 IEEE Symposium on Computational Intelligence and Data Mining.
[7] Ahmed Awad E. Ahmed,et al. A New Biometric Technology Based on Mouse Dynamics , 2007, IEEE Transactions on Dependable and Secure Computing.
[8] T C Mendenhall,et al. THE CHARACTERISTIC CURVES OF COMPOSITION. , 1887, Science.
[9] Moshe Koppel,et al. Exploiting Stylistic Idiosyncrasies for Authorship Attribution , 2003 .
[10] Eric Backer,et al. On musical stylometry - a pattern recognition approac , 2005, Pattern Recognit. Lett..
[11] Yuezhong Tang,et al. Spam Filter for Short Messages Using Winnow , 2008, 2008 International Conference on Advanced Language Processing and Web Information Technology.
[12] Isaac Woungang,et al. Authorship verification for short messages using stylometry , 2013, 2013 International Conference on Computer, Information and Telecommunication Systems (CITS).
[13] Hsinchun Chen,et al. Applying authorship analysis to extremist-group Web forum messages , 2005, IEEE Intelligent Systems.
[14] Yejin Choi,et al. Gender Attribution: Tracing Stylometric Evidence Beyond Topic and Genre , 2011, CoNLL.
[15] Benjamin C. M. Fung,et al. A unified data mining solution for authorship analysis in anonymous textual communications , 2013, Inf. Sci..
[16] Naomie Salim,et al. Understanding Plagiarism Linguistic Patterns, Textual Features, and Detection Methods , 2012, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[17] Hong Peng,et al. Research on a Naive Bayesian Based Short Message Filtering System , 2006, 2006 International Conference on Machine Learning and Cybernetics.
[18] Angela Orebaugh,et al. Classification of Instant Messaging Communications for Forensics Analysis , 2009 .
[19] Daniel P. Lopresti,et al. Biometric Authentication Revisited: Understanding the Impact of Wolves in Sheep's Clothing , 2006, USENIX Security Symposium.
[20] Issa Traore,et al. Continuous Authentication Using Biometrics: Data, Models, and Metrics , 2011 .
[21] Peng Hao,et al. Authorship Similarity Detection from Email Messages , 2011, MLDM.
[22] Hsinchun Chen,et al. Writeprints: A stylometric approach to identity-level identification and similarity detection in cyberspace , 2008, TOIS.
[23] John Burrows,et al. 'Delta': a Measure of Stylistic Difference and a Guide to Likely Authorship , 2002, Lit. Linguistic Comput..
[24] Yiming Yang,et al. The Enron Corpus: A New Dataset for Email Classi(cid:12)cation Research , 2004 .
[25] F. Mosteller,et al. Inference in an Authorship Problem , 1963 .
[26] Efstathios Stamatatos. A survey of modern authorship attribution methods , 2009 .
[27] George M. Mohay,et al. Mining e-mail content for author identification forensics , 2001, SGMD.
[28] Dale Schuurmans,et al. Language independent authorship attribution using character level language models , 2003, Proceedings of the tenth conference on European chapter of the Association for Computational Linguistics - EACL '03.
[29] Hans Van Halteren,et al. Author verification by linguistic profiling: An exploration of the parameter space , 2007, TSLP.
[30] Norman Shapiro,et al. Authentication by Keystroke Timing: Some Preliminary Results , 1980 .
[31] J. P. Carvalho,et al. Authorship identification and author fuzzy “fingerprints” , 2011, 2011 Annual Meeting of the North American Fuzzy Information Processing Society.
[32] Issa Traoré,et al. Continuous authentication using micro-messages , 2014, 2014 Twelfth Annual International Conference on Privacy, Security and Trust.
[33] Patrick Juola,et al. A Controlled-corpus Experiment in Authorship Identification by Cross-entropy , 2003 .
[34] Shlomo Argamon,et al. Style mining of electronic messages for multiple authorship discrimination: first results , 2003, KDD '03.
[35] Issa Traoré,et al. Dynamic sample size detection in continuous authentication using sequential sampling , 2011, ACSAC '11.
[36] R. Harald Baayen,et al. How Variable May a Constant be? Measures of Lexical Richness in Perspective , 1998, Comput. Humanit..
[37] Moshe Koppel,et al. Authorship verification as a one-class classification problem , 2004, ICML.
[38] H. van Halteren,et al. Outside the cave of shadows: using syntactic annotation to enhance authorship attribution , 1996 .
[39] John Burrows,et al. Word-Patterns and Story-Shapes: The Statistical Analysis of Narrative Style , 1987 .
[40] Benno Stein,et al. Overview of the Author Profiling Task at PAN 2013 , 2013, CLEF.
[41] Carole E. Chaski,et al. Who's At The Keyboard? Authorship Attribution in Digital Evidence Investigations , 2005, Int. J. Digit. EVid..
[42] Mohammad S. Obaidat,et al. Authorship verification using deep belief network systems , 2017, Int. J. Commun. Syst..
[43] Rajarathnam Chandramouli,et al. Author gender identification from text , 2011, Digit. Investig..
[44] Patrick Juola,et al. Authorship Attribution for Electronic Documents , 2006, IFIP Int. Conf. Digital Forensics.
[45] Martha E. Crosby,et al. Continuous identity authentication using multimodal physiological sensors , 2004, SPIE Defense + Commercial Sensing.
[46] Rachel Greenstadt,et al. Practical Attacks Against Authorship Recognition Techniques , 2009, IAAI.
[47] Hsinchun Chen,et al. A framework for authorship identification of online messages: Writing-style features and classification techniques , 2006 .
[48] Ophir Frieder,et al. Discrimination of Authorship Using Visualization , 1994, Inf. Process. Manag..
[49] Shlomo Argamon,et al. Authorship attribution in the wild , 2010, Lang. Resour. Evaluation.
[50] Benjamin C. M. Fung,et al. e-mail authorship verification for forensic investigation , 2010, SAC '10.
[51] Benjamin C. M. Fung,et al. A novel approach of mining write-prints for authorship attribution in e-mail forensics , 2008, Digit. Investig..
[52] Mourad Debbabi,et al. Towards an integrated e-mail forensic analysis framework , 2009, Digit. Investig..