{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T00:48:45Z","timestamp":1729644525892,"version":"3.28.0"},"reference-count":50,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,7]]},"DOI":"10.1109\/pst.2014.6890938","type":"proceedings-article","created":{"date-parts":[[2014,9,10]],"date-time":"2014-09-10T15:43:34Z","timestamp":1410363814000},"page":"179-188","source":"Crossref","is-referenced-by-count":7,"title":["Continuous authentication using micro-messages"],"prefix":"10.1109","author":[{"given":"Marcelo Luiz","family":"Brocardo","sequence":"first","affiliation":[]},{"given":"Issa","family":"Traore","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"35","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-36891-4_10"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1093\/llc\/11.3.121"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.3115\/1067807.1067843"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1002\/asi.21001"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1145\/604264.604272"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1093\/llc\/fqi024"},{"key":"38","first-page":"59","article-title":"Searching with style: Authorship attribution in classic literature","author":"zhao","year":"2007","journal-title":"Proceedings of the Thirtieth Australasian Conference on Computer Science-Volume 62 Ser ACSC '07"},{"journal-title":"Pattern Recognition and Machine Learning (Information Science and Statistics)","year":"2006","author":"bishop","key":"43"},{"key":"42","first-page":"1022","article-title":"Multi-interval discretization of continuousvalued attributes for classification learning","volume":"2","author":"fayyad","year":"1993","journal-title":"Thirteenth International Joint Conference on Articial Intelligence"},{"key":"41","first-page":"47","article-title":"Discretization techniques: A recent survey","volume":"32","author":"kotsiantis","year":"2006","journal-title":"GESTS International Transactions on Computer Science and Engineering"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20316"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2002.1176299"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2007.12.009"},{"key":"24","first-page":"78","article-title":"Gender attribution: Tracing stylometric evidence beyond topic and genre","author":"ruchita sarawgi","year":"2011","journal-title":"Proceedings of the 15th Conference on Computational Natural Language Learning Ser CoNLL '11"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23199-5_28"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1145\/1217098.1217099"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(97)00005-9"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/CITS.2013.6705711"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2014.18"},{"journal-title":"On Verifying Wordprint Studies Book of Mormon Authorship ser","year":"1991","author":"hilton","key":"3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1121949.1121951"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-61350-129-0"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.3115\/1610075.1610142"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1145\/1774088.1774428"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1015330.1015448"},{"key":"5","article-title":"A stylometry system for authenticating students taking online tests","author":"canales","year":"2011","journal-title":"Proceedings of Student-Faculty Research Day"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1016\/0306-4573(94)90029-9"},{"key":"4","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1145\/1344411.1344413","article-title":"Writeprints: A stylometric approach to identity-level identification and similarity detection in cyberspace","volume":"26","author":"abbasi","year":"2008","journal-title":"ACM Trans Inf Syst"},{"key":"31","first-page":"1","article-title":"Understanding plagiarism linguistic patterns, textual features, and detection methods","author":"alzahrani","year":"2011","journal-title":"Systems Man and Cybernetics Part C Applications and Reviews IEEE Transactions on"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-76631-5_80"},{"key":"8","article-title":"Who's at the keyboard: Authorship attribution in digitet al.vidence investigations","volume":"4","author":"chaski","year":"2005","journal-title":"International Journal of Digitet al vidence"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2005.81"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1007\/s10579-009-9111-2"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.46"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2008.05.001"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.2009.208"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2010.03.003"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2011.03.006"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2009.01.004"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/NAFIPS.2011.5751998"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/CIDM.2009.4938643"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2011.04.002"},{"key":"49","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/1130.003.0016","article-title":"Fast training of support vector machines using sequential minimal optimization","author":"platt","year":"1998","journal-title":"Advances in Kernel Methods-Support Vector Learning"},{"key":"48","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-005-0466-3"},{"key":"45","first-page":"620","article-title":"The bias-variance tradeoff and the randomized gacv","author":"wahba","year":"1999","journal-title":"Advances in neural information processing systems"},{"journal-title":"Estimation of Dependences Based on Empirical Data Springer Series in Statistics","year":"1982","author":"vapnik","key":"44"},{"journal-title":"Weka Practical Machine Learning Tools and Techniques with Java Implementations","year":"1999","author":"witten","key":"47"},{"journal-title":"Boosting SVM Classifiers with Logistic Regression","year":"2003","author":"chang","key":"46"},{"key":"10","doi-asserted-by":"crossref","DOI":"10.3115\/1220355.1220443","article-title":"Linguistic correlates of style: Authorship classification with deep linguistic analysis features","author":"gamon","year":"2004","journal-title":"Proceedings of the 20th International Conference on Computational Linguistics Ser COLING '04"},{"key":"50","first-page":"29","article-title":"Biometric authentication revisited: Understanding the impact of wolves in sheep's clothing","author":"ballard","year":"2006","journal-title":"Proc 15th Annu USENIX Security Symp"}],"event":{"name":"2014 Twelfth Annual Conference on Privacy, Security and Trust (PST)","start":{"date-parts":[[2014,7,23]]},"location":"Toronto, ON, Canada","end":{"date-parts":[[2014,7,24]]}},"container-title":["2014 Twelfth Annual International Conference on Privacy, Security and Trust"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6883276\/6890911\/06890938.pdf?arnumber=6890938","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,16]],"date-time":"2023-07-16T13:39:44Z","timestamp":1689514784000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6890938\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7]]},"references-count":50,"URL":"https:\/\/doi.org\/10.1109\/pst.2014.6890938","relation":{},"subject":[],"published":{"date-parts":[[2014,7]]}}}