{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T17:02:22Z","timestamp":1742922142068,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030522452"},{"type":"electronic","value":"9783030522469"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-52246-9_48","type":"book-chapter","created":{"date-parts":[[2020,7,3]],"date-time":"2020-07-03T11:03:49Z","timestamp":1593774229000},"page":"656-666","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Authorship Identification for Arabic Texts Using Logistic Model Tree Classification"],"prefix":"10.1007","author":[{"given":"Safaa","family":"Hriez","sequence":"first","affiliation":[]},{"given":"Arafat","family":"Awajan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,7,4]]},"reference":[{"key":"48_CR1","doi-asserted-by":"publisher","first-page":"538","DOI":"10.1002\/asi.21001","volume":"60","author":"E Stamatatos","year":"2009","unstructured":"Stamatatos, E.: A survey of modern authorship attribution methods. J. Am. Soc. Inf. Sci. Technol. 60, 538\u2013556 (2009)","journal-title":"J. Am. Soc. Inf. Sci. Technol."},{"key":"48_CR2","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1016\/j.ins.2011.03.006","volume":"231","author":"F Iqbal","year":"2013","unstructured":"Iqbal, F., Binsalleeh, H., Fung, B.C., Debbabi, M.: A unified data mining solution for authorship analysis in anonymous textual communications. Inf. Sci. 231, 98\u2013112 (2013)","journal-title":"Inf. Sci."},{"issue":"5","key":"48_CR3","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1109\/MIS.2005.81","volume":"20","author":"A Abbasi","year":"2005","unstructured":"Abbasi, A., Chen, H.: Applying authorship analysis to extremist-group web forum messages. IEEE Intell. Syst. 20(5), 67\u201375 (2005)","journal-title":"IEEE Intell. Syst."},{"key":"48_CR4","doi-asserted-by":"crossref","unstructured":"Mendenhall, T.C.: The characteristic curves of composition. Science IX, 237\u2013249 (1887)","DOI":"10.1126\/science.ns-9.214S.237"},{"issue":"4","key":"48_CR5","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1145\/604264.604272","volume":"30","author":"O de Vel","year":"2001","unstructured":"de Vel, O., Anderson, A., Corney, M., Mohay, G.: Mining e-mail content for author identification forensics. SIGMOD Rec. 30(4), 55\u201364 (2001)","journal-title":"SIGMOD Rec."},{"key":"48_CR6","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511486975","volume-title":"A Reference Grammar of Modern Standard Arabic","author":"KC Ryding","year":"2005","unstructured":"Ryding, K.C.: A Reference Grammar of Modern Standard Arabic. Cambridge University Press, Cambridge (2005)"},{"key":"48_CR7","first-page":"188","volume":"8","author":"A Awajan","year":"2011","unstructured":"Awajan, A.: Multilayer model for Arabic text compression. Int. Arab J. Inf. Technol. 8, 188\u2013196 (2011)","journal-title":"Int. Arab J. Inf. Technol."},{"key":"48_CR8","unstructured":"Estival, D., Gaustad, T., Pham, S.B., Radford, W., Hutchinson, B.: Tat: an author profiling tool with application to Arabic emails. In: Proceedings of the Australasian Language Technology Workshop, pp. 21\u201330 (2007)"},{"key":"48_CR9","doi-asserted-by":"crossref","unstructured":"Shaker, K., Corne, D.: Authorship attribution in Arabic using a hybrid of evolutionary search and linear discriminant analysis. In: Computational Intelligence (UKCI), pp. 1\u20136. IEEE (2010)","DOI":"10.1109\/UKCI.2010.5625580"},{"key":"48_CR10","doi-asserted-by":"crossref","unstructured":"Ouamour, S., Sayoud, H.: Authorship attribution of ancient texts written by ten Arabic travelers using a SMO-SVM classifier. In: Communications and Information Technology (ICCIT), International Conference. pp. 44\u201347. IEEE (2012)","DOI":"10.1109\/ICCITechnol.2012.6285841"},{"key":"48_CR11","doi-asserted-by":"crossref","unstructured":"Ouamour, S., Sayoud, H.: Authorship attribution of short historical Arabic texts based on lexical features. In: International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, pp. 144\u2013147 (2013)","DOI":"10.1109\/CyberC.2013.31"},{"key":"48_CR12","unstructured":"Baraka, R.S., Salem, S., Abu Hussien, M., Nayef, N., Abu Shaban, W.: Arabic Text Author Identification Using Support Vector Machines (2014)"},{"issue":"4","key":"48_CR13","first-page":"473","volume":"26","author":"AS Altheneyan","year":"2014","unstructured":"Altheneyan, A.S., Menai, M.E.B.: Na\u00efve Bayes classifiers for authorship attribution of Arabic texts. J. King Saud Univ. Comput. Inf. Sci. 26(4), 473\u2013484 (2014)","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"key":"48_CR14","doi-asserted-by":"crossref","unstructured":"Alwajeeh, A., Al-Ayyoub, M., Hmeidi, I.: On authorship authentication of Arabic articles. In: 5th International Conference on IEEE Information and Communication Systems (ICICS), pp. 1\u20136 (2014)","DOI":"10.1109\/IACS.2014.6841973"},{"key":"48_CR15","doi-asserted-by":"crossref","unstructured":"Otoom, A.F., Abdullah, E.E., Jaafer, S., Hamdallh, A., Amer, D.: Towards author identification of Arabic text. In: The Fifth International Conference on Information and Communication Systems (2014)","DOI":"10.1109\/IACS.2014.6841971"},{"issue":"1","key":"48_CR16","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1108\/IJWIS-03-2016-0011","volume":"13","author":"M Al-Ayyoub","year":"2017","unstructured":"Al-Ayyoub, M., Alwajeeh, A., Hmeidi, I.: An extensive study of authorship authentication of Arabic articles. Int. J. Web Inf. Syst. 13(1), 85\u2013104 (2017)","journal-title":"Int. J. Web Inf. Syst."},{"key":"48_CR17","doi-asserted-by":"crossref","unstructured":"Albadarneh, J., Talafha, B., Al-Ayyoub, M., Zaqaibeh, B., Al-Smadi, M., Jararweh, Y., Benkhelifa, E.: Using big data analytics for authorship authentication of Arabic tweets. In: Utility and Cloud Computing (UCC) (2015)","DOI":"10.1109\/UCC.2015.80"},{"key":"48_CR18","doi-asserted-by":"crossref","unstructured":"Mustafa, T.K., Razzaq, A.A.A., Al-Zubaidi, E.A.: Authorship Arabic text detection according to style of writing by using (SABA) method. Asian J. Appl. Sci. (2017). (ISSN: 2321\u20130893)","DOI":"10.24203\/ajas.v5i2.4750"},{"key":"48_CR19","doi-asserted-by":"crossref","unstructured":"Bourib, S., Sayoud, H.: Author identification on noise Arabic documents. In: 5th International Conference on Control, Decision and Information Technologies, pp. 216\u2013221 (2018)","DOI":"10.1109\/CoDIT.2018.8394885"},{"issue":"1\u20132","key":"48_CR20","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/s10994-005-0466-3","volume":"59","author":"N Landwehr","year":"2005","unstructured":"Landwehr, N., Hall, M., Frank, E.: Logistic model trees. Mach. Learn. 59(1\u20132), 161\u2013205 (2005)","journal-title":"Mach. Learn."},{"key":"48_CR21","unstructured":"Bouckaert, R.R.: Bayesian Network Classifiers in Weka (2004)"}],"container-title":["Advances in Intelligent Systems and Computing","Intelligent Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-52246-9_48","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,31]],"date-time":"2022-10-31T23:53:53Z","timestamp":1667260433000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-52246-9_48"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030522452","9783030522469"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-52246-9_48","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"4 July 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SAI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Science and Information Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"London","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 July 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 July 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sai2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/saiconference.com\/Computing","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}