{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T17:06:25Z","timestamp":1774285585539,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,5,22]],"date-time":"2016-05-22T00:00:00Z","timestamp":1463875200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100003407","name":"Ministero dell'Istruzione, dell'Universit\u00e0 e della Ricerca","doi-asserted-by":"publisher","award":["AMANDA"],"award-info":[{"award-number":["AMANDA"]}],"id":[{"id":"10.13039\/501100003407","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,5,22]]},"DOI":"10.1145\/2908131.2908156","type":"proceedings-article","created":{"date-parts":[[2016,5,18]],"date-time":"2016-05-18T10:28:05Z","timestamp":1463567285000},"page":"233-243","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Content attribution ignoring content"],"prefix":"10.1145","author":[{"given":"Mattia","family":"Samory","sequence":"first","affiliation":[{"name":"Univ. Padova, Italy"}]},{"given":"Enoch","family":"Peserico","sequence":"additional","affiliation":[{"name":"Univ. Padova, Italy"}]}],"member":"320","published-online":{"date-parts":[[2016,5,22]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"10 tips to creating engaging page posts. https:\/\/www.facebook.com\/business\/a\/online-sales\/page-post-tips. Accessed: 2015-07-17."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2005.81"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1344411.1344413"},{"issue":"3","key":"e_1_3_2_1_4_1","first-page":"276","article-title":"Detecting Email Forgery using Random Forests and Na\u00efve Bayes Classifiers","volume":"6","author":"Abdallah E. E.","year":"2012","unstructured":"E. E. Abdallah, A. F. Otoom, O. Abu-Aisheh, D. Omari, and G. Salem. Detecting Email Forgery using Random Forests and Na\u00efve Bayes Classifiers. International Science Index, 6(3):276--280, 2012.","journal-title":"International Science Index"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0077793"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.23126"},{"key":"e_1_3_2_1_7_1","first-page":"26","volume-title":"Proc. ICWSM","author":"Aumayr E.","year":"2011","unstructured":"E. Aumayr, J. Chan, and C. Hayes. Reconstruction of Threaded Conversations in Online Discussion Forums. In Proc. ICWSM, pages 26--33, 2011."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2433396.2433401"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2014.12.019"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASRU.2005.1566507"},{"issue":"1","key":"e_1_3_2_1_12_1","first-page":"1","article-title":"Empirical evaluations of language-based author identification techniques","volume":"8","author":"Chaski C. E.","year":"2001","unstructured":"C. E. Chaski. Empirical evaluations of language-based author identification techniques. Forensic Linguistics, 8(1):1--65, 2001.","journal-title":"Forensic Linguistics"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/2132890.2132895"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1038\/srep01376"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/604264.604272"},{"key":"e_1_3_2_1_16_1","first-page":"132","volume-title":"Proc. Digital Scholarship in the Humanities","author":"Eder M.","year":"2010","unstructured":"M. Eder. Does size matter? Authorship attribution, small samples, big problem. In Proc. Digital Scholarship in the Humanities, pages 132--135, 2010."},{"key":"e_1_3_2_1_17_1","volume-title":"Proc. WIN","author":"Govindan P.","year":"2013","unstructured":"P. Govindan, J. Xu, S. Hill, T. Eliassi-Rad, and C. Volinsky. Local Structural Features Threaten Privacy across Social Networks. In Proc. WIN, 2013."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1561\/1500000005"},{"key":"e_1_3_2_1_19_1","unstructured":"D. Koessler Gosnell. Social Fingerprinting: Identifying Users of Social Networks by their Data Footprint. PhD thesis The University of Tennessee Knoxville 2014."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1093\/llc\/17.4.401"},{"issue":"4","key":"e_1_3_2_1_21_1","first-page":"90","volume":"14","author":"Koppel M.","year":"2008","unstructured":"M. Koppel, J. Schler, and S. Argamon. Computational Methods in Authorship Attribution. International Review of Research in Open and Distance Learning, 14(4):90--103, 2008.","journal-title":"Computational Methods in Authorship Attribution. International Review of Research in Open and Distance Learning"},{"issue":"2006","key":"e_1_3_2_1_22_1","first-page":"317","article-title":"Authorship Attribution: What's Easy and What's Hard?","volume":"39","author":"Koppel M.","year":"2013","unstructured":"M. Koppel, J. Schler, and S. Argamon. Authorship Attribution: What's Easy and What's Hard? Journal of Law and Policy, 39(2006):317--331, 2013.","journal-title":"Journal of Law and Policy"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1080\/0013838X.2012.668794"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/1314498.1314541"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835875"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/1394399"},{"key":"e_1_3_2_1_27_1","first-page":"534","volume-title":"Proc. ICKD","author":"Mohtasseb H.","year":"2009","unstructured":"H. Mohtasseb and A. Ahmed. More blogging features for author identification. In Proc. ICKD, pages 534--539, 2009."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.46"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.22"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1093\/llc\/fqs070"},{"key":"e_1_3_2_1_31_1","volume-title":"Proc. SemDial","author":"R.","year":"2009","unstructured":"R. op den Akker and D. Traum. A comparison of addressee detection methods for multiparty conversations. In Proc. SemDial, 2009."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2078195"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.3115\/1067807.1067843"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ecrime.2010.5706693"},{"key":"e_1_3_2_1_35_1","first-page":"645","volume-title":"Textual Modeling with Authorship Attribution in Big Data. In Proc. HDM","author":"Pratanwanich N.","year":"2014","unstructured":"N. Pratanwanich and P. Lio'. Who Wrote This? Textual Modeling with Authorship Attribution in Big Data. In Proc. HDM, pages 645--652, 2014."},{"issue":"3","key":"e_1_3_2_1_36_1","first-page":"259","article-title":"The State of Non-Traditional Authorship Attribution Studies---2012","volume":"93","author":"Rudman J.","year":"2012","unstructured":"J. Rudman. The State of Non-Traditional Authorship Attribution Studies---2012: Some Problems and Solutions. English Studies, 93(3):259--274, 2012.","journal-title":"Some Problems and Solutions. English Studies"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2908131.2908195"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786451.2786928"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.5555\/2018936.2018957"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.v60:3"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2014.04.025"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.v57:3"}],"event":{"name":"WebSci '16: ACM Web Science Conference","location":"Hannover Germany","acronym":"WebSci '16","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of the 8th ACM Conference on Web Science"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2908131.2908156","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2908131.2908156","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T16:22:01Z","timestamp":1774282921000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2908131.2908156"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5,22]]},"references-count":42,"alternative-id":["10.1145\/2908131.2908156","10.1145\/2908131"],"URL":"https:\/\/doi.org\/10.1145\/2908131.2908156","relation":{},"subject":[],"published":{"date-parts":[[2016,5,22]]},"assertion":[{"value":"2016-05-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}