{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T15:01:55Z","timestamp":1725894115966},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642115332"},{"type":"electronic","value":"9783642115349"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-11534-9_10","type":"book-chapter","created":{"date-parts":[[2010,1,3]],"date-time":"2010-01-03T20:10:03Z","timestamp":1262549403000},"page":"99-110","source":"Crossref","is-referenced-by-count":8,"title":["Data Mining Instant Messaging Communications to Perform Author Identification for Cybercrime Investigations"],"prefix":"10.1007","author":[{"given":"Angela","family":"Orebaugh","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dr. Jeremy","family":"Allnutt","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"issue":"5","key":"10_CR1","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1109\/MIS.2005.81","volume":"20","author":"A. Abbasi","year":"2005","unstructured":"Abbasi, A., Chen, H.: Applying Authorship Analysis to Extremist-Group Web Forum Messages. IEEE Intelligent Systems\u00a020(5), 67\u201375 (2005)","journal-title":"IEEE Intelligent Systems"},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"Abbasi, A., Chen, H.: Visualizing Authorship for Identification. Proceedings of the Intelligence and Security Informatics. In: IEEE International Conference on Intelligence and Security Informatics (2006)","DOI":"10.1007\/11760146_6"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Abbasi, A., Chen, H.: Writeprints: A Stylometric Approach to Identify-Level Identification and Similarity Detection in Cyberspace. ACM Transactions on Information Systems\u00a026(2) (2008)","DOI":"10.1145\/1344411.1344413"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Argamon, S., Saric, M., Stein, S.S.: Style mining of electronic messages for multiple authorship discrimination: First results. In: Proceedings of the 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (2003)","DOI":"10.1145\/956750.956805"},{"key":"10_CR5","unstructured":"BioPassword.: Authentication Solutions Through Keystroke Dynamics (2006)"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Baayen, R.H., van Halteren, H., Tweedie, F.: Outside the Cave of Shadows: Using Syntactic Annotation to Enhance Authorship Attribution. Literary and Linguistic Computing\u00a011(3) (1996)","DOI":"10.1093\/llc\/11.3.121"},{"key":"10_CR7","unstructured":"Chaski, C.E.: Who\u2019s At The Keyboard? Authorship Attribution in Digital Evidence Investigations. International Journal of Digital Evidence\u00a04(1) (2005)"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"de Vel, O., Anderson, A., Corney, M., Mohay, G.: Multi-Topic E-mail Authorship Attribution Forensics. In: ACM Conference on Computer Security - Workshop on Data Mining for Security Applications, Philadelphia, PA, USA (2001)","DOI":"10.1007\/978-1-4615-0953-0_9"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"de Vel, O., Anderson, A., Corney, M., Mohay, G.: Mining E-mail Content for Author Identification Forensics. SIGMOD Record Web Edition\u00a030(4) (2001)","DOI":"10.1145\/604264.604272"},{"key":"10_CR10","unstructured":"de Vel, O.: Mining E-mail Authorship. In: KDD 2000 Workshop on Text Mining, Boston, Massachusetts, USA, pp. 21\u201327 (2000)"},{"issue":"4","key":"10_CR11","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1017\/S1351324905003694","volume":"11","author":"N. Graham","year":"2005","unstructured":"Graham, N., Hirst, G., Marthi, B.: Segmenting documents by stylistic character. Natural Language Engineering\u00a011(4), 397\u2013415 (2005)","journal-title":"Natural Language Engineering"},{"key":"10_CR12","unstructured":"Gray, A., Sallis, P., Macdonnel, S.: Software forensics: Extended authorship analysis techniques to computer programs. In: Proceedings of the 3rd Biannual Conference on the International Association of Forensic Linguists (1997)"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Holmes, D.I.: Authorship Attribution. Computers and the Humanities\u00a028(2) (1994)","DOI":"10.1007\/BF01830689"},{"issue":"4","key":"10_CR14","doi-asserted-by":"publisher","first-page":"1448","DOI":"10.1016\/j.ipm.2007.12.009","volume":"44","author":"T. Kucukyilmaz","year":"2008","unstructured":"Kucukyilmaz, T., Cambazoglu, B.B., Aykanat, C., Can, F.: Chat mining: predicting user and message attributes in computer-mediated communication. Information Processing & Management\u00a044(4), 1448\u20131466 (2008)","journal-title":"Information Processing & Management"},{"key":"10_CR15","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511483165","volume-title":"Attributing authorship: an introduction","author":"H. Love","year":"2002","unstructured":"Love, H.: Attributing authorship: an introduction. Cambridge University Press, Cambridge (2002)"},{"issue":"4","key":"10_CR16","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1145\/1121949.1121951","volume":"49","author":"J. Li","year":"2006","unstructured":"Li, J., Zheng, R., Chen, H.: From fingerprint to writeprint. Commun. ACM\u00a049(4), 76\u201382 (2006)","journal-title":"Commun. ACM"},{"key":"10_CR17","volume-title":"McQuail\u2019s Mass Communication Theory","author":"D. McQuail","year":"2005","unstructured":"McQuail, D.: McQuail\u2019s Mass Communication Theory, 5th edn. SAGE Publications, London (2005)","edition":"5"},{"issue":"12","key":"10_CR18","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1145\/355112.355129","volume":"43","author":"T. Moores","year":"2000","unstructured":"Moores, T., Dhillon, G.: Software Piracy: A View from Hong Kong. Communications of the ACM\u00a043(12), 88\u201393 (2000)","journal-title":"Communications of the ACM"},{"issue":"11","key":"10_CR19","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1126\/science.ns-9.214S.237","volume":"11","author":"T.C. Mendenhall","year":"1887","unstructured":"Mendenhall, T.C.: The Characteristic Curves of Composition. Science\u00a011(11), 237\u2013249 (1887)","journal-title":"Science"},{"key":"10_CR20","volume-title":"Inference and Disputed Authorship: The Federalis","author":"F. Mostellar","year":"1964","unstructured":"Mostellar, F., Wallace, D.: Inference and Disputed Authorship: The Federalis. Addison-Wesley, Reading (1964)"},{"key":"10_CR21","doi-asserted-by":"publisher","DOI":"10.1002\/9780470997949","volume-title":"Behavioral Biometrics: A Remote Access Approach","author":"K. Revett","year":"2008","unstructured":"Revett, K.: Behavioral Biometrics: A Remote Access Approach. John Wiley & Sons, Ltd., Chichester (2008)"},{"key":"10_CR22","doi-asserted-by":"crossref","unstructured":"Rudman, J.: The state of authorship attribution studies: some problems and solutions. Computers and the Humanities\u00a031(4) (1998)","DOI":"10.1023\/A:1001018624850"},{"key":"10_CR23","unstructured":"Teng, G., Lai, M., Ma, J., Li, Y.: E-mail Authorship Mining Based on SVM for Computer Forensic. In: Proceedings of the Third International Conference on Machine Learning and Cybernetics, Shanghai (2004)"},{"issue":"3","key":"10_CR24","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1002\/asi.20316","volume":"57","author":"R. Zheng","year":"2006","unstructured":"Zheng, R., Li, J., Chen, H., Huang, Z.: A Framework for Authorship Identification of Online Messages: Writing-Style Features and Classification Techniques. Journal of the American Society for Information Science and Technology\u00a057(3), 378\u2013393 (2006)","journal-title":"Journal of the American Society for Information Science and Technology"},{"key":"10_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/3-540-44853-5_5","volume-title":"Intelligence and Security Informatics","author":"R. Zheng","year":"2003","unstructured":"Zheng, R., Qin, Y., Huang, Z., Chen, H.: Authorship Analysis in Cybercrime Investigation. In: Chen, H., Miranda, R., Zeng, D.D., Demchak, C.C., Schroeder, J., Madhusudan, T. (eds.) ISI 2003. LNCS, vol.\u00a02665, pp. 59\u201373. Springer, Heidelberg (2003)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Digital Forensics and Cyber Crime"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-11534-9_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,24]],"date-time":"2019-05-24T18:00:54Z","timestamp":1558720854000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-11534-9_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642115332","9783642115349"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-11534-9_10","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2010]]}}}