1. Lecture Notes in Computer Science;RM Coyotl-Morales,2006
2. Kim, S., Kim, H., Weninger, T., Han, J. and Kim, H. D.: Authorship Classification: A Discriminative Syntactic Tree Mining Approach. In: Proceedings of the ACM SIGIR, July 24–28, Beijing, China (2011)
3. Nirkhi, S.M., Dharaskar, R.V.: Comparative Study of Authorship Identification Techniques for Cyber Forensics Analysis. International Journal of Advanced Computer Science and Applications 4(5), 32–35 (2013)
4. Khan, S.R., Nirkhi, S.M., Dharaskar, R..V.: E-mail Data Analysis for Application to Cyber Forensic Investigation using Data Mining. In: Proceedings of the 2nd National Conference on Innovative Paradigms in Engineering & Technology (NCIPET 2013), New York, USA (2013)
5. Maurer, H., Zaka, B.: Plagiarism–A Problem and How to Fight It. In: Proceedings of World Conference on Education Multimedia, Hypermedia and Telecommunications, AACE, pp. 4451–4458 (2007)