{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T11:18:07Z","timestamp":1772968687371,"version":"3.50.1"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2003,11,1]],"date-time":"2003-11-01T00:00:00Z","timestamp":1067644800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2003,11,1]],"date-time":"2003-11-01T00:00:00Z","timestamp":1067644800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers and the Humanities"],"published-print":{"date-parts":[[2003,11]]},"DOI":"10.1023\/a:1025786724466","type":"journal-article","created":{"date-parts":[[2003,10,24]],"date-time":"2003-10-24T14:33:40Z","timestamp":1067006020000},"page":"407-429","source":"Crossref","is-referenced-by-count":13,"title":["Authorship Attribution and Pastiche"],"prefix":"10.1007","volume":"37","author":[{"given":"Harold","family":"Somers","sequence":"first","affiliation":[]},{"given":"Fiona","family":"Tweedie","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5120388_CR1","volume-title":"Alice Through the Needle's Eye: A Third Adventure for Lewis Carroll's 'Alice'","author":"G. Adair","year":"1984","unstructured":"Adair G. (1984) Alice Through the Needle's Eye: A Third Adventure for Lewis Carroll's 'Alice'. Macmillan, London."},{"key":"5120388_CR2","volume-title":"Myths & Memories","author":"G. Adair","year":"1986","unstructured":"Adair G. (1986) Myths & Memories. Fontana Paperbacks, London."},{"key":"5120388_CR3","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1093\/llc\/11.3.121","volume":"11","author":"H. Baayen","year":"1996","unstructured":"Baayen H., van Halteren H., Tweedie F. (1996) Outside the Cave of Shadows: Using Syntactic Annotation to Enhance Authorship Attribution. Literary and Linguistic Computing, 11, pp. 121\u2013131.","journal-title":"Literary and Linguistic Computing"},{"key":"5120388_CR4","volume-title":"The Wonderful Wizard of Oz","author":"L.F. Baum","year":"1900","unstructured":"Baum L.F. (1900) The Wonderful Wizard of Oz. G.M. Hill, Chicago."},{"key":"5120388_CR5","doi-asserted-by":"crossref","first-page":"611","DOI":"10.2307\/2343656","volume":"134","author":"R.E. Bee","year":"1971","unstructured":"Bee R.E. (1971) Statistical Methods in the Study of theMasoretic Text of the Old Testament. Journal of the Royal Statistical Society A, 134, pp. 611\u2013622.","journal-title":"Journal of the Royal Statistical Society A"},{"key":"5120388_CR6","doi-asserted-by":"crossref","first-page":"406","DOI":"10.2307\/2344617","volume":"135","author":"R.E. Bee","year":"1972","unstructured":"Bee R.E. (1972) A Statistical Study of the Sinai Pericope. Journal of the Royal Statistical Society A,135, pp. 406\u2013421.","journal-title":"Journal of the Royal Statistical Society A"},{"key":"5120388_CR7","unstructured":"Bell A. (1985) Linked by a Single Tail. Times Literary Supplement, 4th January 1985, p. 18."},{"key":"5120388_CR8","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1093\/llc\/3.4.226","volume":"3","author":"J.D. Benson","year":"1988","unstructured":"Benson J.D., Brainerd B. (1988) Chesterton's Parodies of Swinburne and Yeats: A Lexical Approach. Literary and Linguistic Computing, 3, pp. 221\u2013231.","journal-title":"Literary and Linguistic Computing"},{"key":"5120388_CR9","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1093\/llc\/9.4.267","volume":"9","author":"J.N.G. Binongo","year":"1994","unstructured":"Binongo J.N.G. (1994) Joaquin's Joaquinesquerie, Joaquinesquerie's Joaquin: A Statistical Expression of a Filipino Writer's Style. Literary and Linguistic Computing, 9, pp. 267\u2013279.","journal-title":"Literary and Linguistic Computing"},{"key":"5120388_CR10","doi-asserted-by":"crossref","first-page":"525","DOI":"10.2307\/2983444","volume":"158","author":"A.F. Bissell","year":"1995","unstructured":"Bissell A.F. (1995a) Weighted Cumulative Sums for Text Analysis Using Word Counts. Journal ofthe Royal Statistical Society A, 158, pp. 525\u2013545.","journal-title":"Journal ofthe Royal Statistical Society A"},{"key":"5120388_CR11","volume-title":"Statistical Methods for Text Analysis by Word-Counts","author":"D. Bissell","year":"1995","unstructured":"Bissell D. (1995b) Statistical Methods for Text Analysis by Word-Counts. European Business Management School, University of Wales, Swansea."},{"key":"5120388_CR12","volume-title":"Computation into Criticism: A Study of Jane Austen's Novels and an Experiment in Method","author":"J.F. Burrows","year":"1987","unstructured":"Burrows J.F. (1987) Computation into Criticism: A Study of Jane Austen's Novels and an Experiment in Method. Clarendon Press, Oxford."},{"key":"5120388_CR13","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1007\/BF02176636","volume":"23","author":"J.F. Burrows","year":"1989","unstructured":"Burrows J.F. (1989) \u201cAn Ocean Where Each Kind \u22ef \u201d: Statistical Analysis and Some Major Determinants of Literary Style. Computers and the Humanities, 23, pp. 309\u2013321.","journal-title":"Computers and the Humanities"},{"key":"5120388_CR14","first-page":"167","volume-title":"Computers andWritten Texts","author":"J.F. Burrows","year":"1992","unstructured":"Burrows J.F. (1992) Computers and the Study of Literature. In Butler C.S. (ed.), Computers andWritten Texts. Blackwell, Oxford, pp. 167\u2013204."},{"key":"5120388_CR15","volume-title":"Alice's Adventures in Wonderland","author":"L. Carroll","year":"1865","unstructured":"Carroll L. (1865) Alice's Adventures in Wonderland. Macmillan, London."},{"key":"5120388_CR16","volume-title":"Through the Looking Glass","author":"L. Carroll","year":"1872","unstructured":"Carroll L. (1872) Through the Looking Glass. Macmillan, London."},{"key":"#cr-split#-5120388_CR17.1","unstructured":"Carroll L. (1891) The Nyctograph. The Lady, 29th October 1891"},{"key":"#cr-split#-5120388_CR17.2","unstructured":"reproduced in Fisher J. (ed.), The Magic of Lewis Carroll, Harmondsworth, Middlesex (1975): Penguin, pp. 214-217."},{"key":"5120388_CR18","volume-title":"Curiosa Mathematica Part I: A New Theory of Parallels","author":"C.L. Dodgson","year":"1889","unstructured":"Dodgson C.L. (1889) Curiosa Mathematica Part I: A New Theory of Parallels. Macmillan, London."},{"key":"5120388_CR19","volume-title":"Analysing for Authorship: A Guide to the Cusum Technique","author":"J.M. Farringdon","year":"1996","unstructured":"Farringdon J.M. (1996) Analysing for Authorship: A Guide to the Cusum Technique. University of Wales Press, Cardiff."},{"key":"5120388_CR20","volume-title":"The Art of Readable Writing","author":"R. Flesch","year":"1974","unstructured":"Flesch R. (1974) The Art of Readable Writing. Harper & Row, New York."},{"key":"5120388_CR21","unstructured":"Fuller J. (1985) Lewis Carroll is not Dead. The New York Times Book Review, 5th May 1985, p. 42."},{"key":"5120388_CR22","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1016\/S1355-0306(97)72158-0","volume":"37","author":"R.A. Hardcastle","year":"1997","unstructured":"Hardcastle R.A. (1997). CUSUM: A Credible Method for the Determination of Authorship? Science & Justice, 37, pp. 129\u2013138.","journal-title":"Science & Justice"},{"key":"5120388_CR23","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1093\/llc\/8.2.73","volume":"8","author":"M.L. Hilton","year":"1993","unstructured":"Hilton M.L., Holmes D.I. (1993) An Assessment of Cumulative Sum Charts for Authorship Attribution. Literary and Linguistic Computing, 8, pp. 73\u201380.","journal-title":"Literary and Linguistic Computing"},{"key":"5120388_CR24","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1007\/BF01830689","volume":"28","author":"D.I. Holmes","year":"1994","unstructured":"Holmes D.I. (1994) Authorship Attribution. Computers and the Humanities, 28, pp. 87\u2013106.","journal-title":"Computers and the Humanities"},{"key":"5120388_CR25","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1093\/llc\/13.3.111","volume":"13","author":"D.I. Holmes","year":"1998","unstructured":"Holmes D.I. (1998) The Evolution of Stylometry in Humanities Scholarship. Literary and Linguistic Computing, 13, pp. 111\u2013117.","journal-title":"Literary and Linguistic Computing"},{"key":"5120388_CR26","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1093\/llc\/10.2.111","volume":"10","author":"D.I. Holmes","year":"1995","unstructured":"Holmes D.I., Forsyth R.S. (1995) The Federalist Revisited: New Directions in Authorship Attribution. Literary and Linguistic Computing, 10, pp. 111\u2013127.","journal-title":"Literary and Linguistic Computing"},{"key":"5120388_CR27","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1093\/llc\/11.3.133","volume":"11","author":"D.I. Holmes","year":"1996","unstructured":"Holmes D.I., Singh S. (1996) A Stylometric Analysis of Conversational Speech of Aphasic Patients. Literary and Linguistic Computing, 11, pp. 133\u2013140.","journal-title":"Literary and Linguistic Computing"},{"key":"5120388_CR28","first-page":"19","volume":"31","author":"D.I. Holmes","year":"1995","unstructured":"Holmes D.I., Tweedie F.J. (1995) Forensic Stylometry: A Review of the Cusum Controversy. Revue Informatique et Statistique dans les Sciences Humaines, 31, pp. 19\u201347.","journal-title":"Revue Informatique et Statistique dans les Sciences Humaines"},{"key":"5120388_CR29","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1007\/BF00056145","volume":"23","author":"E. Irizarry","year":"1989","unstructured":"Irizarry E. (1989) Exploring Conscious Imitation of Style with Ready-made Software. Computers and the Humanities, 23, pp. 227\u2013233.","journal-title":"Computers and the Humanities"},{"key":"5120388_CR30","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1093\/llc\/9.3.235","volume":"9","author":"G. Ledger","year":"1994","unstructured":"Ledger G., Merriam T. (1994) Shakespeare, Fletcher and the Two Noble Kinsmen. Literary and Linguistic Computing, 9, pp. 235\u2013247.","journal-title":"Literary and Linguistic Computing"},{"key":"5120388_CR31","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1093\/llc\/10.3.171","volume":"10","author":"D.L. Mealand","year":"1995","unstructured":"Mealand D.L. (1995) Correspondance Analysis of Luke. Literary and Linguistic Computing, 10, pp. 171\u2013182.","journal-title":"Literary and Linguistic Computing"},{"key":"5120388_CR32","volume-title":"Literary Detection: How to Prove Authorship and Fraud in Literature and Documents","author":"A.Q. Morton","year":"1978","unstructured":"Morton A.Q. (1978) Literary Detection: How to Prove Authorship and Fraud in Literature and Documents. Bowker, London."},{"key":"5120388_CR33","volume-title":"The System of Basic English","author":"C.K. Ogden","year":"1934","unstructured":"Ogden C.K. (1934) The System of Basic English. Harcourt, Brace, New York."},{"key":"5120388_CR34","unstructured":"Orlov J.K. (1983) Ein Modell der H\u00e4ufigkeitsstruktur des Vokabulars. In Guiter H. and Arapov M. (eds.), Studies on Zipf 's Law. Brockmeyer, Bochum, pp. 154\u2013233."},{"key":"5120388_CR35","doi-asserted-by":"crossref","first-page":"401","DOI":"10.1007\/BF00141190","volume":"25","author":"R.G. Potter","year":"1991","unstructured":"Potter R.G. (1991) Statistical Analysis of Literature: A Retrospective on Computers and the Humanities, 1966\u20131990. Computers and the Humanities, 25, pp. 401\u2013429.","journal-title":"Computers and the Humanities"},{"key":"5120388_CR36","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1007\/BF01830396","volume":"29","author":"L. Sigelman","year":"1995","unstructured":"Sigelman L. (1995) By Their (New) Words Shall Ye Know Them: Edith Wharton, Marion Mainwaring, and The Buccaneers. Computers and the Humanities, 29, pp. 271\u2013283.","journal-title":"Computers and the Humanities"},{"key":"5120388_CR37","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1007\/BF00054025","volume":"30","author":"L. Sigelman","year":"1996","unstructured":"Sigelman L., Jacoby W. (1996) The Not-so-simple Art of Imitation: Pastiche, Literary Style, and Raymond Chandler. Computers and the Humanities, 30, pp. 11\u201328.","journal-title":"Computers and the Humanities"},{"key":"5120388_CR38","unstructured":"Somers H. (1999) Computational Stylometry and Pastiche: Can a Good Fake Fool the Computer? Unpublished paper presented at ILASH Seminar, University of Sheffield, 8th December 1999. http:\/\/www.dcs.shef.ac.uk\/research\/ilash\/Seminars\/somers.html"},{"key":"5120388_CR39","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1023\/A:1001749303137","volume":"32","author":"F.J. Tweedie","year":"1998","unstructured":"Tweedie F.J., Baayen H.R. (1998) How Variable May a Constant Be? Measures of Lexical Richness in Perspective. Computers and the Humanities, 32, pp. 323\u2013352.","journal-title":"Computers and the Humanities"},{"key":"5120388_CR40","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1093\/llc\/13.2.77","volume":"13","author":"F.J. Tweedie","year":"1998","unstructured":"Tweedie F.J., Holmes D.I., Corns T.N. (1998) The Provenance of De Doctrina Christiana, Attributed to John Milton: A Statistical Investigation. Literary and Linguistic Computing, 13, pp. 77\u201387.","journal-title":"Literary and Linguistic Computing"},{"key":"5120388_CR41","volume-title":"The Statistical Study of Literary Vocabulary","author":"G.U. Yule","year":"1944","unstructured":"Yule G.U. (1944) The Statistical Study of Literary Vocabulary. Cambridge University Press, Cambridge."}],"container-title":["Computers and the Humanities"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1025786724466.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1023\/A:1025786724466\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1025786724466.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,12]],"date-time":"2025-07-12T21:48:13Z","timestamp":1752356893000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1023\/A:1025786724466"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,11]]},"references-count":42,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2003,11]]}},"alternative-id":["5120388"],"URL":"https:\/\/doi.org\/10.1023\/a:1025786724466","relation":{},"ISSN":["0010-4817","1572-8412"],"issn-type":[{"value":"0010-4817","type":"print"},{"value":"1572-8412","type":"electronic"}],"subject":[],"published":{"date-parts":[[2003,11]]}}}