{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T10:48:09Z","timestamp":1725706089230},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,8]]},"DOI":"10.1109\/iri.2013.6642511","type":"proceedings-article","created":{"date-parts":[[2013,10,30]],"date-time":"2013-10-30T20:13:22Z","timestamp":1383164002000},"page":"497-503","source":"Crossref","is-referenced-by-count":3,"title":["Author attribution on streaming data"],"prefix":"10.1109","author":[{"given":"Sadi Evren","family":"Seker","sequence":"first","affiliation":[]},{"given":"Khaled","family":"Al-Naami","sequence":"additional","affiliation":[]},{"given":"Latifur","family":"Khan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1126\/science.ns-9.214S.237"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1002\/asi.21001"},{"key":"ref3","article-title":"Authorship Attribution with Thousands of Candidate Authors. SIGIR\u201906","volume-title":"ACM 1\u201359593\u2013369\u20137\/06\/0008","author":"Koppel","year":"2006"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20316"},{"first-page":"177","volume-title":"Detecting Remote Exploits using Data Mining. IFIP Int. Conf. Digital Forensics 2008","author":"Masud","key":"ref5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2011.49"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2010.61"},{"key":"ref8","first-page":"181","article-title":"Authorship Attribution with Latent Dirichlet Allocation","volume-title":"Proceedings of Fifteenth Conferene on Computational Natural Language Learning","author":"Seroussi"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3115\/1073445.1073478"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s12665-012-2214-x"},{"article-title":"Personalised rating prediction for tnew users using latent factor models","volume-title":"Hpertext 2011: Proceedings of the 22nd ACM Conference on Hypertext and Hypermedia","author":"Yanir","key":"ref11"},{"volume-title":"Effects of Age and Gender on Blogging in Proceedings of 2006 AAAI Spring Symposium on Computational Approaches for Analyzing Weblogs","author":"Schler","key":"ref12"}],"event":{"name":"2013 IEEE 14th International Conference on Information Reuse & Integration (IRI)","start":{"date-parts":[[2013,8,14]]},"location":"San Francisco, CA, USA","end":{"date-parts":[[2013,8,16]]}},"container-title":["2013 IEEE 14th International Conference on Information Reuse &amp; Integration (IRI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6621630\/6642428\/06642511.pdf?arnumber=6642511","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,23]],"date-time":"2024-01-23T18:17:28Z","timestamp":1706033848000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6642511\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/iri.2013.6642511","relation":{},"subject":[],"published":{"date-parts":[[2013,8]]}}}