Author:
Lambers Maarten,Veenman Cor J.
Publisher
Springer Berlin Heidelberg
Reference46 articles.
1. Elovici, Y., Kandel, A., Last, M., Shapira, B., Zaafrany, O.: Using data mining techniques for detecting terror-related activities on the web. Journal of Information Warfare 3(1), 17–29 (2004)
2. Stamatatos, E., Fakotakis, N., Kokkinakis, G.: Computer-based authorship attribution without lexical measures. Computers and the Humanities 35(2), 193–214 (2001)
3. Holmes, D., Forsyth, R.: The federalist revisited: New directions in authorship attribution. Literary and LInguistic Computing 10(2), 111–127 (1995)
4. Mosteller, F., Wallace, D.: Inference and disputed authorship: the Federalist. Addison-Wesley, Reading (1964)
5. Abbasi, A., Chen, H.: Applying authorship analysis to extremist-group web forum messages. IEEE Intelligent Systems 20(5), 67–75 (2005)
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献