{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:05:50Z","timestamp":1773655550782,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,14]],"date-time":"2019-11-14T00:00:00Z","timestamp":1573689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,14]]},"DOI":"10.1145\/3360664.3360677","type":"proceedings-article","created":{"date-parts":[[2019,10,23]],"date-time":"2019-10-23T15:44:57Z","timestamp":1571845497000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Multi-Platform Authorship Verification"],"prefix":"10.1145","author":[{"given":"Abdulaziz","family":"Altamimi","sequence":"first","affiliation":[{"name":"Centre for Security, Communications and Network Research, University of Plymouth, Plymouth, UK"}]},{"given":"Nathan","family":"Clarke","sequence":"additional","affiliation":[{"name":"Centre for Security, Communications and Network Research, University of Plymouth, Plymouth, UK and Security Research Institute, Edith Cowan University, Perth, Western Australia and Security Research Institute, Edith Cowan University, Perth, Western Australia and Centre for Research in Information and Cyber Security, Nelson Mandela University, Port Elizabeth, South Africa"}]},{"given":"Steven","family":"Furnell","sequence":"additional","affiliation":[{"name":"Centre for Security, Communications and Network Research, University of Plymouth, Plymouth, UK"}]},{"given":"Fudong","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computing, University of Portsmouth, Portsmouth, UK"}]}],"member":"320","published-online":{"date-parts":[[2019,11,14]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2005.81"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1344411.1344413"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1344411.1344413"},{"key":"e_1_3_2_1_4_1","volume-title":"2016 AAAI Fall Symposium Series.","author":"Almishari Mishari","year":"2016","unstructured":"Mishari Almishari , Ekin Oguz , and Gene Tsudik . 2016 . Trilateral large-scale osn account linkability study . In 2016 AAAI Fall Symposium Series. Mishari Almishari, Ekin Oguz, and Gene Tsudik. 2016. Trilateral large-scale osn account linkability study. In 2016 AAAI Fall Symposium Series."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956805"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382448.2382450"},{"key":"e_1_3_2_1_7_1","first-page":"3347","article-title":"Verifying online user identity using stylometric analysis for short messages","volume":"9","author":"Brocardo Marcelo Luiz","year":"2014","unstructured":"Marcelo Luiz Brocardo , Issa Traore , Sherif Saad , and Isaac Woungang . 2014 . Verifying online user identity using stylometric analysis for short messages . Journal of networks 9 , 12 (2014), 3347 . Marcelo Luiz Brocardo, Issa Traore, Sherif Saad, and Isaac Woungang. 2014. Verifying online user identity using stylometric analysis for short messages. Journal of networks 9, 12 (2014), 3347.","journal-title":"Journal of networks"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1002\/dac.3259"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/WI-IAT.2014.21"},{"key":"e_1_3_2_1_10_1","unstructured":"Beno\u00eet Cadre G\u00e9rard Biau. 2019. OPTIMIZATION BY GRADIENT BOOSTING. https:\/\/arxiv.org\/pdf\/1707.05023.pdf month=May lastaccessed=  Beno\u00eet Cadre G\u00e9rard Biau. 2019. OPTIMIZATION BY GRADIENT BOOSTING. https:\/\/arxiv.org\/pdf\/1707.05023.pdf month=May lastaccessed="},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1774088.1774428"},{"key":"e_1_3_2_1_12_1","volume-title":"Retrieved","author":"James Ball Paul Lewis","year":"2011","unstructured":"Paul Lewis James Ball . 2011 . Twitter and the riots: how the news spread . Retrieved Aug 06, 2011 from https:\/\/www.theguardian.com\/uk\/2011\/dec\/07\/twitter-riots-how-news-spread Paul Lewis James Ball. 2011. Twitter and the riots: how the news spread. Retrieved Aug 06, 2011 from https:\/\/www.theguardian.com\/uk\/2011\/dec\/07\/twitter-riots-how-news-spread"},{"key":"e_1_3_2_1_13_1","volume-title":"Using Markov chains for identification of writer. Literary and linguistic computing 16, 3","author":"Khmelev Dmitri V","year":"2001","unstructured":"Dmitri V Khmelev and Fiona J Tweedie . 2001. Using Markov chains for identification of writer. Literary and linguistic computing 16, 3 ( 2001 ), 299--307. Dmitri V Khmelev and Fiona J Tweedie. 2001. Using Markov chains for identification of writer. Literary and linguistic computing 16, 3 (2001), 299--307."},{"key":"e_1_3_2_1_14_1","volume-title":"Authorship Attribution: What's Easy and What's Hard? Available at SSRN 2274891","author":"Koppel Moshe","year":"2013","unstructured":"Moshe Koppel , Jonathan Schler , and Shlomo Argamon . 2013 . Authorship Attribution: What's Easy and What's Hard? Available at SSRN 2274891 (2013). Moshe Koppel, Jonathan Schler, and Shlomo Argamon. 2013. Authorship Attribution: What's Easy and What's Hard? Available at SSRN 2274891 (2013)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICEBE.2014.61"},{"key":"e_1_3_2_1_16_1","volume-title":"Authorship Verification-An Approach based on Random Forest. arXiv preprint arXiv:1607.08885","author":"Maitra Promita","year":"2016","unstructured":"Promita Maitra , Souvick Ghosh , and Dipankar Das . 2016. Authorship Verification-An Approach based on Random Forest. arXiv preprint arXiv:1607.08885 ( 2016 ). Promita Maitra, Souvick Ghosh, and Dipankar Das. 2016. Authorship Verification-An Approach based on Random Forest. arXiv preprint arXiv:1607.08885 (2016)."},{"key":"e_1_3_2_1_17_1","volume-title":"Applied Bayesian and classical inference: the case of the Federalist papers","author":"Mosteller Frederick","unstructured":"Frederick Mosteller and David L Wallace . 2012. Applied Bayesian and classical inference: the case of the Federalist papers . Springer Science & Business Media . Frederick Mosteller and David L Wallace. 2012. Applied Bayesian and classical inference: the case of the Federalist papers. Springer Science & Business Media."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSec.2012.6246131"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.17705\/1CAIS.01937"},{"key":"e_1_3_2_1_20_1","volume-title":"10th Conference of the European Chapter of the Association for Computational Linguistics (EACL","author":"Peng Fuchim","year":"2003","unstructured":"Fuchim Peng , Dale Schuurmans , Vlado Keselj , and Shaojun Wang . 2003 . Automated authorship attribution with character level language models . In 10th Conference of the European Chapter of the Association for Computational Linguistics (EACL 2003). 267--274. Fuchim Peng, Dale Schuurmans, Vlado Keselj, and Shaojun Wang. 2003. Automated authorship attribution with character level language models. In 10th Conference of the European Chapter of the Association for Computational Linguistics (EACL 2003). 267--274."},{"key":"e_1_3_2_1_21_1","volume-title":"KPCB INTERNET TRENDS 2016","author":"Perkins Kleiner","year":"2016","unstructured":"Kleiner Perkins . [n. d.]. KPCB INTERNET TRENDS 2016 . https:\/\/www.slideshare.net\/kleinerperkins\/ 2016 -internet-trends-report\/99. Kleiner Perkins. [n. d.]. KPCB INTERNET TRENDS 2016. https:\/\/www.slideshare.net\/kleinerperkins\/2016-internet-trends-report\/99."},{"key":"e_1_3_2_1_22_1","volume-title":"Retrieved","author":"Roberts Rachel","year":"2017","unstructured":"Rachel Roberts . 2017 . Online trolling laws under consideration following abuse of MPs . Retrieved Aug 06, 2011 from https:\/\/www.independent.co.uk\/news\/uk\/politics\/trolling-laws-online-abuse-mps-under-consideration-lord-bew-a7857891.html Rachel Roberts. 2017. Online trolling laws under consideration following abuse of MPs. Retrieved Aug 06, 2011 from https:\/\/www.independent.co.uk\/news\/uk\/politics\/trolling-laws-online-abuse-mps-under-consideration-lord-bew-a7857891.html"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNSS.2011.6060004"},{"key":"e_1_3_2_1_24_1","volume-title":"Retrieved","author":"Schultz Jeff","year":"2013","unstructured":"Jeff Schultz . 2013 . How Much Data is Created on the Internet Each Day . Retrieved Aug 06, 2011 from https:\/\/blog.microfocus.com\/how-much-data-is-created-on-the-internet-each-day Jeff Schultz. 2013. How Much Data is Created on the Internet Each Day. Retrieved Aug 06, 2011 from https:\/\/blog.microfocus.com\/how-much-data-is-created-on-the-internet-each-day"},{"key":"e_1_3_2_1_25_1","volume-title":"Retrieved","author":"Smith Kit","year":"2019","unstructured":"Kit Smith . 2019 . 126 Amazing Social Media Statistics and Facts . Retrieved Aug 06, 2011 from https:\/\/www.brandwatch.com\/blog\/amazing-social-media-statistics-and-facts\/ Kit Smith. 2019. 126 Amazing Social Media Statistics and Facts. Retrieved Aug 06, 2011 from https:\/\/www.brandwatch.com\/blog\/amazing-social-media-statistics-and-facts\/"},{"key":"e_1_3_2_1_26_1","volume-title":"Retrieved","year":"2019","unstructured":"Statista. 2019 . Number of social network users worldwide from 2010 to 2021 (in billions) . Retrieved Aug 06, 2011 from https:\/\/www.statista.com\/statistics\/278414\/number-of-worldwide-social-network-users\/ Statista. 2019. Number of social network users worldwide from 2010 to 2021 (in billions). Retrieved Aug 06, 2011 from https:\/\/www.statista.com\/statistics\/278414\/number-of-worldwide-social-network-users\/"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920263"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1002\/bult.2012.1720380212"},{"key":"e_1_3_2_1_29_1","volume-title":"Data mining with R: learning with case studies","author":"Torgo Luis","unstructured":"Luis Torgo . 2011. Data mining with R: learning with case studies . Chapman and Hall\/CRC. Luis Torgo. 2011. Data mining with R: learning with case studies. Chapman and Hall\/CRC."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/1115657.1115669"}],"event":{"name":"CECC 2019: Central European Cybersecurity Conference","location":"Munich Germany","acronym":"CECC 2019","sponsor":["University of Maribor"]},"container-title":["Proceedings of the Third Central European Cybersecurity Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3360664.3360677","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3360664.3360677","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:00Z","timestamp":1750202580000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3360664.3360677"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,14]]},"references-count":30,"alternative-id":["10.1145\/3360664.3360677","10.1145\/3360664"],"URL":"https:\/\/doi.org\/10.1145\/3360664.3360677","relation":{},"subject":[],"published":{"date-parts":[[2019,11,14]]},"assertion":[{"value":"2019-11-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}