{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T04:12:19Z","timestamp":1748664739804,"version":"3.41.0"},"publisher-location":"Cham","reference-count":47,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319247694"},{"type":"electronic","value":"9783319247700"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc\/2.5"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-24770-0_37","type":"book-chapter","created":{"date-parts":[[2015,10,13]],"date-time":"2015-10-13T23:06:06Z","timestamp":1444777566000},"page":"433-448","source":"Crossref","is-referenced-by-count":0,"title":["Authorship Attribution of Internet Comments with Thousand Candidate Authors"],"prefix":"10.1007","author":[{"given":"Jurgita","family":"Kapo\u010di\u016bt\u0117-Dzikien\u0117","sequence":"first","affiliation":[]},{"given":"Andrius","family":"Utka","sequence":"additional","affiliation":[]},{"given":"Ligita","family":"\u0160arkut\u0117","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,1,10]]},"reference":[{"issue":"2","key":"37_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1344411.1344413","volume":"26","author":"A Abbasi","year":"2008","unstructured":"Abbasi, A., Chen, H.: writerprints: a stylometric approach to identity-level identification and similarity detection in cyberspace. ACM Trans. Inf. Syst. 26(2), 1\u201329 (2008)","journal-title":"ACM Trans. Inf. Syst."},{"issue":"1","key":"37_CR2","doi-asserted-by":"publisher","first-page":"S94","DOI":"10.1016\/j.diin.2014.03.012","volume":"11","author":"S Alrabaee","year":"2014","unstructured":"Alrabaee, S., Saleem, N., Preda, S., Wang, L., Debbabi, M.: OBA2: an onion approach to binary code authorship attribution. Digit. Invest. 11(1), S94\u2013S103 (2014)","journal-title":"Digit. Invest."},{"key":"37_CR3","unstructured":"Argamon, S., Dawhle, S., Koppel, M., Pennebaker, J.W.: Lexical predictors of personality type. In: Proceedings of the Joint Annual Meeting of the Interface and the Classification Society of North America, pp. 1\u201316 (2005)"},{"key":"37_CR4","unstructured":"Argamon, S., Levitan, S.: Measuring the usefulness of function words for authorship attribution. In: Proceedings of the 2005 Joint Conference of the Association for Literary and Linguistic Computing and the Association for Computers and the Humanities, pp. 1\u20133 (2005)"},{"key":"37_CR5","doi-asserted-by":"crossref","unstructured":"Cristani, M., Roffo, G., Segalin, C., Bazzani, L., Vinciarelli, A., Murino, V.: Conversationally-inspired stylometric features for authorship attribution in instant messaging. In: Proceedings of the 20th ACM International Conference on Multimedia, pp. 1121\u20131124 (2012)","DOI":"10.1145\/2393347.2396398"},{"key":"37_CR6","doi-asserted-by":"crossref","unstructured":"Gamon, M.: Linguistic correlates of style: authorship classification with deep linguistic analysis features. In: Proceedings of the 20th International Conference on Computational Linguistics, pp. 611\u2013617 (2004)","DOI":"10.3115\/1220355.1220443"},{"issue":"3","key":"37_CR7","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1093\/llc\/13.3.111","volume":"13","author":"DI Holmes","year":"1998","unstructured":"Holmes, D.I.: The evolution of stylometry in humanities scholarship. Literary Linguist. Comput. 13(3), 111\u2013117 (1998)","journal-title":"Literary Linguist. Comput."},{"issue":"4","key":"37_CR8","first-page":"966","volume":"8","author":"M Ikonomakis","year":"2005","unstructured":"Ikonomakis, M., Kotsiantis, S.B., Tampakas, V.: Text classification using machine learning techniques. WSEAS Trans. Comput. 8(4), 966\u2013974 (2005)","journal-title":"WSEAS Trans. Comput."},{"key":"37_CR9","doi-asserted-by":"crossref","unstructured":"Inches, G., Harvey, M., Crestani, F.: Finding participants in a chat: authorship attribution for conversational documents. In: International Conference on Social Computing, pp. 272\u2013279 (2013)","DOI":"10.1109\/SocialCom.2013.45"},{"key":"37_CR10","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1093\/llc\/fqq001","volume":"25","author":"ML Jockers","year":"2010","unstructured":"Jockers, M.L., Witten, D.M.: A comparative study of machine learning methods for authorship attribution. Literary Linguist. Comput. 25, 215\u2013223 (2010)","journal-title":"Literary Linguist. Comput."},{"key":"37_CR11","doi-asserted-by":"crossref","unstructured":"Juola, P.: Future trends in authorship attribution. In: Advances in Digital Forensics III - IFIP International Conference on Digital Forensics, vol. 242, pp. 119\u2013132 (2007)","DOI":"10.1007\/978-0-387-73742-3_8"},{"key":"37_CR12","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1007\/978-3-319-10816-2_12","volume-title":"Text, Speech and Dialogue","author":"Jurgita Kapo\u010di\u016bt\u0117-Dzikien\u0117","year":"2014","unstructured":"Kapo\u010di\u016bt\u0117-Dzikien\u0117, J., Utka, A., \u0160arkut\u0117, L.: Feature exploration for authorship attribution of lithuanian parliamentary speeches. In: 17th International Conference on Text, Speech, and Dialogue, pp. 93\u2013100 (2014)"},{"key":"37_CR13","unstructured":"Kapo\u010di\u016bt\u0117-Dzikien\u0117, J., Vaassen, F., Daelemans, W., Krupavi\u010dius, A.: Improving topic classification for highly inflective languages. In: Proceedings of 24th International Conference on Computational Linguistics, pp. 1393\u20131410 (2012)"},{"key":"37_CR14","unstructured":"Kapo\u010di\u016bt\u0117-Dzikien\u0117, J., \u0160arkut\u0117, L., Utka, A.: The effect of author set size in authorship attribution for lithuanian. In: NODALIDA: 20th Nordic Conference of Computational Linguistics, pp. 87\u201396 (2015)"},{"issue":"4","key":"37_CR15","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1093\/llc\/17.4.401","volume":"17","author":"M Koppel","year":"2002","unstructured":"Koppel, M., Argamon, S., Shimoni, A.R.: Automatically categorizing written texts by author gender. Literary Linguist. Comput. 17(4), 401\u2013412 (2002)","journal-title":"Literary Linguist. Comput."},{"issue":"1","key":"37_CR16","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/s10579-009-9111-2","volume":"45","author":"M Koppel","year":"2011","unstructured":"Koppel, M., Schler, J., Argamon, S.: Authorship attribution in the wild. Lang. Resour. Eval. 45(1), 83\u201394 (2011)","journal-title":"Lang. Resour. Eval."},{"key":"37_CR17","first-page":"317","volume":"21","author":"M Koppel","year":"2013","unstructured":"Koppel, M., Schler, J., Argamon, S.: Authorship attribution: what\u2019s easy and what\u2019s hard? J. Law Policy 21, 317\u2013331 (2013)","journal-title":"J. Law Policy"},{"key":"37_CR18","doi-asserted-by":"crossref","unstructured":"Koppel, M., Schler, J., Argamon, S., Messeri, E.: Authorship attribution with thousands of candidate authors. In: Proceedings of the 29th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 659\u2013660 (2006)","DOI":"10.1145\/1148170.1148304"},{"issue":"3","key":"37_CR19","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1080\/0013838X.2012.668794","volume":"93","author":"M Koppel","year":"2012","unstructured":"Koppel, M., Schler, J., Argamon, S., Winter, Y.: The \u201cfundamental problem\u201d of authorship attribution. Engl. Stud. 93(3), 284\u2013291 (2012)","journal-title":"Engl. Stud."},{"key":"37_CR20","first-page":"1261","volume":"8","author":"M Koppel","year":"2007","unstructured":"Koppel, M., Schler, J., Bonchek-Dokow, E.: Measuring differentiability: unmasking pseudonymous authors. J. Mach. Learn. Res. 8, 1261\u20131276 (2007)","journal-title":"J. Mach. Learn. Res."},{"key":"37_CR21","unstructured":"Luyckx, K.: Scalability Issues in Authorship Attribution. Ph.D. thesis, University of Antwerp, Belgium (2010)"},{"key":"37_CR22","doi-asserted-by":"crossref","unstructured":"Luyckx, K., Daelemans, W.: Authorship attribution and verification with many authors and limited data. In: Proceedings of the 22nd International Conference on Computational Linguistics, vol. 1, pp. 513\u2013520 (2008)","DOI":"10.3115\/1599081.1599146"},{"issue":"2","key":"37_CR23","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/BF02295996","volume":"12","author":"QM McNemar","year":"1947","unstructured":"McNemar, Q.M.: Note on the sampling error of the difference between correlated proportions or percentages. Psychometrika 12(2), 153\u2013157 (1947)","journal-title":"Psychometrika"},{"issue":"214","key":"37_CR24","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1126\/science.ns-9.214S.237","volume":"9","author":"TC Mendenhall","year":"1887","unstructured":"Mendenhall, T.C.: The characteristic curves of composition. Science 9(214), 237\u2013246 (1887)","journal-title":"Science"},{"key":"37_CR25","unstructured":"Mikros, G.K., Argiri, E.K.: Investigating topic influence in authorship attribution. In: Proceedings of the 30th SIGIR, Workshop on Plagiarism Analysis, Authorship Identification, and Near-Duplicate Detection, pp. 29\u201335 (2007)"},{"issue":"302","key":"37_CR26","first-page":"275","volume":"58","author":"F Mosteller","year":"1963","unstructured":"Mosteller, F., Wallace, D.L.: Inference in an authorship problem. J. Am. Stat. Assoc. 58(302), 275\u2013309 (1963)","journal-title":"J. Am. Stat. Assoc."},{"key":"37_CR27","doi-asserted-by":"crossref","unstructured":"Narayanan, A., Paskov, H., Gong, N.Z., Bethencourt, J., Stefanov, E., Shin, E.C.R., Song, D.: On the feasibility of internet-scale author identification. In: Proceedings of the 2012 IEEE Symposium on Security and Privacy, pp. 300\u2013314 (2012)","DOI":"10.1109\/SP.2012.46"},{"key":"37_CR28","doi-asserted-by":"crossref","unstructured":"Okuno, S., Asai, H., Yamana, H.: A challenge of authorship identification for ten-thousand-scale microblog users. In: IEEE International Conference on Big Data, pp. 52\u201354 (2014)","DOI":"10.1109\/BigData.2014.7004491"},{"issue":"5","key":"37_CR29","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1016\/0306-4573(88)90021-0","volume":"24","author":"G Salton","year":"1988","unstructured":"Salton, G., Buckley, C.: Term-weighting approaches in automatic text retrieval. Inf. Process. Manage. 24(5), 513\u2013523 (1988)","journal-title":"Inf. Process. Manage."},{"key":"37_CR30","doi-asserted-by":"crossref","unstructured":"Sanderson, C., Guenter, S.: Short text authorship attribution via sequence kernels, Markov chains and author unmasking: an investigation. In: Proceedings of the 2006 Conference on Empirical Methods in Natural Language Processing, pp. 482\u2013491 (2006)","DOI":"10.3115\/1610075.1610142"},{"issue":"2","key":"37_CR31","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1080\/09296174.2012.659003","volume":"19","author":"J Savoy","year":"2012","unstructured":"Savoy, J.: Authorship attribution: a comparative study of three text corpora and three languages. J. Quant. Linguist. 19(2), 132\u2013161 (2012)","journal-title":"J. Quant. Linguist."},{"issue":"1","key":"37_CR32","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1016\/j.ipm.2012.06.003","volume":"49","author":"J Savoy","year":"2013","unstructured":"Savoy, J.: Authorship attribution based on a probabilistic topic model. Inf. Process. Manage. 49(1), 341\u2013354 (2013)","journal-title":"Inf. Process. Manage."},{"key":"37_CR33","unstructured":"Schler, J., Koppel, M., Argamon, S., Pennebaker, J.W.: Effects of age and gender on blogging. In: Proceedings of AAAI Spring Symposium on Computational Approaches for Analyzing Weblogs, pp. 199\u2013205 (2006)"},{"key":"37_CR34","doi-asserted-by":"crossref","unstructured":"Schwartz, R., Tsur, O., Rappoport, A., Koppel, M.: Authorship attribution of micro-messages. In: Empirical Methods in Natural Langauge Processing, pp. 1880\u20131891 (2013)","DOI":"10.18653\/v1\/D13-1193"},{"key":"37_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/505282.505283","volume":"34","author":"F Sebastiani","year":"2002","unstructured":"Sebastiani, F.: Machine learning in automated text categorization. ACM Comput. Surv. 34, 1\u201347 (2002)","journal-title":"ACM Comput. Surv."},{"key":"37_CR36","unstructured":"Seroussi, Y., Zukerman, I., Bohnert, F.: Authorship attribution with latent Dirichlet allocation. In: Proceedings of the Fifteenth Conference on Computational Natural Language Learning, pp. 181\u2013189 (2011)"},{"key":"37_CR37","unstructured":"Solorio, T., Pillay, S., Raghavan, S., Montes-y G\u00f3mez, M.: Modality specific meta feature for authorship attribution in web forum posts. In: The 5th International Joint Conference on Natural Language Processing, pp. 156\u2013164 (2011)"},{"key":"37_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/978-3-642-22327-3_16","volume-title":"Natural Language Processing and Information Systems","author":"R Sousa Silva","year":"2011","unstructured":"Sousa Silva, R., Laboreiro, G., Sarmento, L., Grant, T., Oliveira, E., Maia, B.: `twazn me!!!; (\u2018automatic authorship analysis of micro-blogging messages. In: Mu\u00f1oz, R., Montoyo, A., M\u00e9tais, E. (eds.) NLDB 2011. LNCS, vol. 6716, pp. 161\u2013168. Springer, Heidelberg (2011)"},{"issue":"3","key":"37_CR39","doi-asserted-by":"publisher","first-page":"538","DOI":"10.1002\/asi.21001","volume":"60","author":"E Stamatatos","year":"2009","unstructured":"Stamatatos, E.: A survey of modern authorship attribution methods. J. Assoc. Inf. Sci. Technol. 60(3), 538\u2013556 (2009)","journal-title":"J. Assoc. Inf. Sci. Technol."},{"issue":"12","key":"37_CR40","doi-asserted-by":"publisher","first-page":"2512","DOI":"10.1002\/asi.21630","volume":"62","author":"E Stamatatos","year":"2011","unstructured":"Stamatatos, E.: Plagiarism detection using stopword n-grams. J. Am. Soc. Inf. Sci. Technol. 62(12), 2512\u20132527 (2011)","journal-title":"J. Am. Soc. Inf. Sci. Technol."},{"issue":"2","key":"37_CR41","first-page":"421","volume":"21","author":"E Stamatatos","year":"2013","unstructured":"Stamatatos, E.: On the robustness of authorship attribution based on character n-gram features. J. Law Policy 21(2), 421\u2013439 (2013)","journal-title":"J. Law Policy"},{"key":"37_CR42","doi-asserted-by":"crossref","unstructured":"Tan, E., Guo, L., Chen, S., Zhang, X., Zhao, Y.: UNIK: unsupervised social network spam detection. In: Proceedings of the 22nd ACM International Conference on Conference on Information and Knowledge Management, pp. 479\u2013488 (2013)","DOI":"10.1145\/2505515.2505581"},{"key":"37_CR43","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1080\/09296170500055350","volume":"12","author":"H Halteren Van","year":"2005","unstructured":"Van Halteren, H., Baayen, R.H., Tweedie, F., Haverkort, M., Neijt, A.: New machine learning methods demonstrate the existence of a human stylome. J. Quant. Linguist. 12, 65\u201377 (2005)","journal-title":"J. Quant. Linguist."},{"issue":"4","key":"37_CR44","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1145\/604264.604272","volume":"30","author":"O Vel de","year":"2001","unstructured":"de Vel, O., Anderson, A.M., Corney, M.W., Mohay, G.M.: Mining e-mail content for author identification forensics. SIGMOD Rec. 30(4), 55\u201364 (2001)","journal-title":"SIGMOD Rec."},{"key":"37_CR45","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1007\/11562382_14","volume-title":"Information Retrieval Technology","author":"Y Zhao","year":"2005","unstructured":"Zhao, Y., Zobel, J.: Effective and scalable authorship attribution using function words. In: Lee, G.G., Yamada, A., Meng, H., Myaeng, S.-H. (eds.) AIRS 2005. LNCS, vol. 3689, pp. 174\u2013189. Springer, Heidelberg (2005)"},{"issue":"3","key":"37_CR46","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1002\/asi.20316","volume":"57","author":"R Zheng","year":"2006","unstructured":"Zheng, R., Li, J., Chen, H., Huang, Z.: A framework for authorship identification of online messages: writing-style features and classification techniques. J. Am. Soc. Inf. Sci. Technol. 57(3), 378\u2013393 (2006)","journal-title":"J. Am. Soc. Inf. Sci. Technol."},{"key":"37_CR47","first-page":"246","volume":"24","author":"V Zinkevi\u010dius","year":"2000","unstructured":"Zinkevi\u010dius, V.: Lemuoklis \u2013 morfologinei analizei [Morphological Analysis with Lemuoklis] (in Lithuanian). Darbai ir dienos 24, 246\u2013273 (2000)","journal-title":"Darbai ir dienos"}],"container-title":["Communications in Computer and Information Science","Information and Software Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-24770-0_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T01:00:56Z","timestamp":1748653256000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-24770-0_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319247694","9783319247700"],"references-count":47,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-24770-0_37","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2015]]}}}