{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T12:21:18Z","timestamp":1764937278662,"version":"3.37.3"},"reference-count":63,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","funder":[{"DOI":"10.13039\/501100004359","name":"Swedish Research Council","doi-asserted-by":"publisher","award":["2016-03497"],"award-info":[{"award-number":["2016-03497"]}],"id":[{"id":"10.13039\/501100004359","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100003077","name":"CAISR Program of the Swedish Knowledge Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100003077","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004895","name":"European Social Fund via IT Academy Programme","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004895","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Biom. Behav. Identity Sci."],"published-print":{"date-parts":[[2021,7]]},"DOI":"10.1109\/tbiom.2021.3078073","type":"journal-article","created":{"date-parts":[[2021,5,6]],"date-time":"2021-05-06T19:50:10Z","timestamp":1620330610000},"page":"405-426","source":"Crossref","is-referenced-by-count":15,"title":["Writer Identification Using Microblogging Texts for Social Media Forensics"],"prefix":"10.1109","volume":"3","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1400-346X","authenticated-orcid":false,"given":"Fernando","family":"Alonso-Fernandez","sequence":"first","affiliation":[]},{"given":"Nicole Mariah Sharon","family":"Belvisi","sequence":"additional","affiliation":[]},{"given":"Kevin","family":"Hernandez-Diaz","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5965-1965","authenticated-orcid":false,"given":"Naveed","family":"Muhammad","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4929-1262","authenticated-orcid":false,"given":"Josef","family":"Bigun","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.1002\/asi.21001"},{"key":"ref38","first-page":"22","article-title":"Authorship analysis studies: A survey","volume":"86","author":"bouanani","year":"2014","journal-title":"Int J Comput Appl"},{"year":"2019","author":"brocardo","journal-title":"Biometric-Based Physical and Cybersecurity Systems","key":"ref33"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1109\/CITS.2013.6705711"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1109\/AINA.2014.18"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1109\/PST.2014.6890938"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1093\/biomet\/62.1.207"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1109\/ICB2018.2018.00048"},{"key":"ref35","first-page":"191","article-title":"A graph model based author attribution technique for single-class e-mail classification","author":"nirmal","year":"2015","journal-title":"Proc IEEE\/ACIS 14th Int Conf Comput Inf Sci"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1145\/2766462.2767799"},{"doi-asserted-by":"publisher","key":"ref60","DOI":"10.1016\/j.ipm.2007.05.012"},{"doi-asserted-by":"publisher","key":"ref62","DOI":"10.1109\/ICECOS47637.2019.8984558"},{"doi-asserted-by":"publisher","key":"ref61","DOI":"10.1016\/j.patrec.2005.06.008"},{"doi-asserted-by":"publisher","key":"ref63","DOI":"10.1109\/Deep-ML.2019.00011"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1109\/BigData.2014.7004491"},{"key":"ref27","first-page":"37","article-title":"Identifying idiolect in forensic authorship attribution: An n-gram textbite approach","volume":"1","author":"johnson","year":"2014","journal-title":"Language and the Law"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1007\/978-3-642-55415-5_28"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/ICFHR.2010.54"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.14569\/IJACSA.2013.040505"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1007\/s10579-009-9111-2"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/CTC.2012.16"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1145\/2393347.2396398"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1109\/ICIInfS.2013.6732015"},{"key":"ref23","first-page":"1484","article-title":"Summary: A system for the automated author attribution of text and instant messages","author":"donais","year":"2013","journal-title":"Proc IEEE\/ACM Int Conf Adv Social Netw Anal Min"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1109\/ICISA.2014.6847369"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1109\/SocialCom.2013.45"},{"doi-asserted-by":"publisher","key":"ref50","DOI":"10.1109\/34.75512"},{"doi-asserted-by":"publisher","key":"ref51","DOI":"10.1007\/3-540-45428-4_32"},{"doi-asserted-by":"publisher","key":"ref59","DOI":"10.1007\/11527923_50"},{"doi-asserted-by":"publisher","key":"ref58","DOI":"10.1007\/978-1-4757-2440-0"},{"doi-asserted-by":"publisher","key":"ref57","DOI":"10.1109\/ICASSP.2019.8683747"},{"doi-asserted-by":"publisher","key":"ref56","DOI":"10.1002\/asi.20316"},{"doi-asserted-by":"publisher","key":"ref55","DOI":"10.1109\/IWBF.2015.7110234"},{"key":"ref54","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1007\/BF03253249","article-title":"Biosecure reference systems for on-line signature verification: A study of complementarity","volume":"62","author":"garcia-salicetti","year":"2007","journal-title":"Ann Telecommun"},{"key":"ref53","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1007\/BF03253250","article-title":"Combining multiple matchers for fingerprint verification: A case study in biosecure network of excellence","volume":"62","author":"alonso-fernandez","year":"2007","journal-title":"Ann Telecommun"},{"doi-asserted-by":"publisher","key":"ref52","DOI":"10.1007\/11553595_127"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/BTAS.2013.6712705"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1016\/j.diin.2011.04.002","article-title":"Author gender identification from text","volume":"8","author":"cheng","year":"2011","journal-title":"Journal of digital investigation"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.3115\/1067807.1067843"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1093\/llc\/fqi024"},{"key":"ref13","first-page":"1","article-title":"Forensic authorship analysis of microblogging texts using n-grams and stylometric features","author":"belvisi","year":"2020","journal-title":"Proc Int Workshop Biometr Forensics (IWBF)"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/CW.2014.47"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/THMS.2017.2681673"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/SMC.2018.00424"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1007\/11427995_15"},{"key":"ref18","first-page":"295","article-title":"Mining online diaries for blogger identification","author":"mohtasseb","year":"2009","journal-title":"Proc World Congr Eng"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/ecrime.2010.5706693"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/TIFS.2016.2603960"},{"key":"ref3","first-page":"31","article-title":"Exploiting character class information in forensic writer identification","author":"alonso-fernandez","year":"2010","journal-title":"Proc Int Workshop Comput Forensics (IWCF)"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/TMC.2019.2911506"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.13176\/11.427"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1016\/j.patrec.2015.12.013"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1520\/JFS15447J"},{"doi-asserted-by":"publisher","key":"ref49","DOI":"10.1016\/j.inffus.2017.12.003"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1093\/llc\/10.2.111"},{"doi-asserted-by":"publisher","key":"ref46","DOI":"10.1109\/TPAMI.2007.1009"},{"doi-asserted-by":"publisher","key":"ref45","DOI":"10.23919\/BIOSIG.2018.8553348"},{"key":"ref48","first-page":"7","article-title":"Features from frequency: Authorship and stylistic analysis using repetitive sound","author":"forstall","year":"2009","journal-title":"Proc Chicago Colloquium Digit Humanities Comput Sci"},{"key":"ref47","first-page":"453","article-title":"Curves of pauline and pseudo-pauline style I","volume":"30","author":"mascol","year":"1888","journal-title":"Unitarian Review"},{"doi-asserted-by":"publisher","key":"ref42","DOI":"10.1016\/0167-8655(94)90127-9"},{"doi-asserted-by":"publisher","key":"ref41","DOI":"10.1098\/rstb.2014.0254"},{"year":"2021","journal-title":"Boundary Analysis","key":"ref44"},{"year":"2021","journal-title":"Unicode Text Segmentation","key":"ref43"}],"container-title":["IEEE Transactions on Biometrics, Behavior, and Identity Science"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8423754\/9467110\/09424712.pdf?arnumber=9424712","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,26]],"date-time":"2022-12-26T14:53:49Z","timestamp":1672066429000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9424712\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7]]},"references-count":63,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tbiom.2021.3078073","relation":{},"ISSN":["2637-6407"],"issn-type":[{"type":"electronic","value":"2637-6407"}],"subject":[],"published":{"date-parts":[[2021,7]]}}}