{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T18:35:59Z","timestamp":1768588559857,"version":"3.49.0"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319226347","type":"print"},{"value":"9783319226354","type":"electronic"}],"license":[{"start":{"date-parts":[[2015,8,4]],"date-time":"2015-08-04T00:00:00Z","timestamp":1438646400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,8,4]],"date-time":"2015-08-04T00:00:00Z","timestamp":1438646400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-22635-4_34","type":"book-chapter","created":{"date-parts":[[2015,8,3]],"date-time":"2015-08-03T14:44:03Z","timestamp":1438613043000},"page":"371-379","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Feature Selection for Enhanced Author Identification of Turkish Text"],"prefix":"10.1007","author":[{"given":"Yasemin","family":"Bay","sequence":"first","affiliation":[]},{"given":"Erbu\u011d","family":"\u00c7elebi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,4]]},"reference":[{"key":"34_CR1","unstructured":"Mosteller, F., Wallace, D.: Inference and disputed authorship: the federalist. Adison Wesley (1964)"},{"key":"34_CR2","unstructured":"Mikros, G.K., Perifanos, K.: Authorship identification in large email collections: experiments using features that belong to different linguistic levels, CLEF (2011)"},{"issue":"2","key":"34_CR3","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1145\/980972.981001","volume":"5","author":"S Hill","year":"2003","unstructured":"Hill, S., Provost, F.: The myth of the double-blind review$$? $$author identification using only citations. ACM SIGKDD Explor. Newsl. 5(2), 179\u2013184 (2003)","journal-title":"ACM SIGKDD Explor. Newsl."},{"key":"34_CR4","first-page":"86","volume":"1","author":"J Zhao","year":"2008","unstructured":"Zhao, J., Zhan, G., Feng, J.: Disputed authorship in C program code after detection of plagiarism. Int. Conf. Comput. Sci. Softw. Eng. 1, 86\u201389 (2008)","journal-title":"Int. Conf. Comput. Sci. Softw. Eng."},{"issue":"4","key":"34_CR5","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1145\/604264.604272","volume":"30","author":"O de Vel","year":"2001","unstructured":"de Vel, O., Anderson, A., Corney, M., Mohay, G.: Mining e-mail content for author identification forensics. SIGMOD Rec. 30(4), 55\u201364 (2001)","journal-title":"SIGMOD Rec."},{"key":"34_CR6","unstructured":"Gray, A., Sallis, P., MacDonnel, S.: Software forensics: extending authorship analysis techniques to computer programs. In: Biannual Conference of the International Association of Forensic Linguists (IAFL\u201997), pp. 1\u20138 (1997)"},{"key":"34_CR7","doi-asserted-by":"crossref","unstructured":"Cheng, N., Chen, X., Chandramouli, R., Subbalakshmi, K.P.: Gender identification from E-mails. In: IEEE Symposium on Computational Intelligence and Data Mining, CIDM \u201909, pp. 154\u2013158 (2009)","DOI":"10.1109\/CIDM.2009.4938643"},{"issue":"3","key":"34_CR8","doi-asserted-by":"crossref","first-page":"330","DOI":"10.1016\/j.patrec.2012.10.027","volume":"34","author":"Upul Bandara","year":"2013","unstructured":"Bandara, U., Wijayarathna, G.: Source code author identification with unsupervised feature learning. Pattern Recogn. Lett. 34(3), 330\u2013334","journal-title":"Pattern Recognition Letters"},{"issue":"4","key":"34_CR9","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1093\/applin\/25.4.431","volume":"25","author":"M Coulthard","year":"2004","unstructured":"Coulthard, M.: Author identification. Idiolects Linguist. Uniquenes Appl. Linguist. 25(4), 431\u2013447 (2004)","journal-title":"Idiolects Linguist. Uniquenes Appl. Linguist."},{"issue":"36","key":"34_CR10","first-page":"59","volume":"11","author":"D Pavelec","year":"2007","unstructured":"Pavelec, D., Justino, E., Oliveira, L.S.: Author Identification using Stylometric Features. Inteligencia Artif. Rev. Iberoamericana de Inteligencia Artif. 11(36), 59\u201365 (2007)","journal-title":"Inteligencia Artif. Rev. Iberoamericana de Inteligencia Artif."},{"key":"34_CR11","doi-asserted-by":"crossref","unstructured":"Bozkurt, D., Baglioglu, O., Uyar, E.: Authorship attribution: performance of various features and classification methods computer and information sciences (2007)","DOI":"10.1109\/ISCIS.2007.4456854"},{"key":"34_CR12","first-page":"151","volume":"7","author":"T Ta\u015f","year":"2007","unstructured":"Ta\u015f, T., G\u00f6r\u00fcr, A.: Author identification for Turkish texts. J. Arts Sci. 7, 151\u2013161 (2007)","journal-title":"J. Arts Sci."},{"key":"34_CR13","unstructured":"T\u00fcrko\u011flu, F., Diri, B., Amasyal\u0131, M.F.: Author attribution of Turkish texts by feature mining. In: Proceedings of the 3rd International Conference on Intelligent Computing, ICIC 2007 Qingdao, China, LNCS 4681\/2007 (2007)"},{"issue":"4","key":"34_CR14","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1162\/089120100750105920","volume":"26","author":"E Stamatatos","year":"2000","unstructured":"Stamatatos, E., Fakotakis, N., Kokkinakis, G.: Automatic text categorization in terms of genre and author. Comput. Linguist. 26(4), 471\u2013495 (2000)","journal-title":"Comput. Linguist."},{"issue":"1","key":"34_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/505282.505283","volume":"34","author":"F Sebastiani","year":"2002","unstructured":"Sebastiani, F.: Machine learning in automated text categorization. ACM Comput. Surv. 34(1), 1\u201347 (2002)","journal-title":"ACM Comput. Surv."},{"issue":"3","key":"34_CR16","doi-asserted-by":"crossref","first-page":"538","DOI":"10.1002\/asi.21001","volume":"60","author":"Efstathios Stamatatos","year":"2009","unstructured":"Stamatatos, E.: A survey of modern authorship attribution methods. J. Am. Soc. Inf. Sci. Technol. 60(3), 538\u2013556","journal-title":"Journal of the American Society for Information Science and Technology"},{"key":"34_CR17","doi-asserted-by":"crossref","unstructured":"Stamatatos, E.: Author identification using imbalanced and limited training text. In: Proceedings of the 18th International Conference and Database and Expert Systems Applications, Regensburg, pp. 237\u201341. IEEE Computer Society, Germany (2007)","DOI":"10.1109\/DEXA.2007.5"},{"issue":"1","key":"34_CR18","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1093\/llc\/fqq013","volume":"26","author":"K Luyckx","year":"2011","unstructured":"Luyckx, K., Daelemans, W.: The effect of author set size and data size in authorship attribution. Literary Linguist. Comput. 26(1), 35\u201355 (2011)","journal-title":"Literary Linguist. Comput."},{"issue":"3","key":"34_CR19","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1093\/llc\/fqm020","volume":"22","author":"J. Grieve","year":"2007","unstructured":"Grieve, J.: Quantitative authorship attribution: an evaluation of techniques. Literary Linguist. Comput. 22, 251\u2013270 (2007)","journal-title":"Literary and Linguistic Computing"},{"key":"34_CR20","unstructured":"http:\/\/code.google.com\/p\/zemberek\/"},{"key":"34_CR21","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-2440-0","volume-title":"The Nature of Statistical Learning Theory","author":"Vladimir N. Vapnik","year":"1995","unstructured":"Vapnik, V.: The nature of statistical learning theory. Springer, New York (1995)"},{"key":"34_CR22","unstructured":"Manning, C.D., Raghavan, P., Sch\u00fctze, H.: Information retrieval. Cambridge University Press (2008)"}],"container-title":["Lecture Notes in Electrical Engineering","Information Sciences and Systems 2015"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-22635-4_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,29]],"date-time":"2025-05-29T21:17:39Z","timestamp":1748553459000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-22635-4_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8,4]]},"ISBN":["9783319226347","9783319226354"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-22635-4_34","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"value":"1876-1100","type":"print"},{"value":"1876-1119","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,8,4]]},"assertion":[{"value":"4 August 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}