{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,20]],"date-time":"2025-05-20T09:33:27Z","timestamp":1747733607396},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2015,9,24]],"date-time":"2015-09-24T00:00:00Z","timestamp":1443052800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Secur Inform"],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1186\/s13388-015-0022-z","type":"journal-article","created":{"date-parts":[[2015,9,24]],"date-time":"2015-09-24T09:19:27Z","timestamp":1443086367000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Timeprints for identifying social media users with multiple aliases"],"prefix":"10.1186","volume":"4","author":[{"given":"Fredrik","family":"Johansson","sequence":"first","affiliation":[]},{"given":"Lisa","family":"Kaati","sequence":"additional","affiliation":[]},{"given":"Amendra","family":"Shrestha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,9,24]]},"reference":[{"key":"22_CR1","doi-asserted-by":"crossref","unstructured":"Abbasi A, Chen H (2007) Affect intensity analysis of dark web forums. In: Proceedings of the 5th IEEE international conference on intelligence and security informatics","DOI":"10.1109\/ISI.2007.379486"},{"key":"22_CR2","doi-asserted-by":"crossref","unstructured":"Brynielsson J, Horndahl A, Johansson F, Kaati L, M\u00e5artenson C, Svenson P (2012) Analysis of weak signals for detecting lone wolf terrorists. In: Proceedings of the 2012 European intelligence and security informatics conference, pp 197\u2013204","DOI":"10.1109\/EISIC.2012.20"},{"issue":"11","key":"22_CR3","first-page":"1","volume":"2","author":"J Brynielsson","year":"2013","unstructured":"Brynielsson J, Horndahl A, Johansson F, Kaati L, M\u00e5artenson C, Svenson P (2013) Harvesting and analysis of weak signals for detecting lone wolf terrorists. Secur Inform 2(11):1\u201315","journal-title":"Secur Inform"},{"issue":"2","key":"22_CR4","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1145\/293411.293443","volume":"42","author":"D Goldschlag","year":"1999","unstructured":"Goldschlag D, Reed M, Syverson P (1999) Onion routing. Commun ACM 42(2):39\u201341","journal-title":"Commun ACM"},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"Narayanan A, Paskov H, Gong NZ, Bethencourt J, Stefanov E, Shin ECR, Song D (2012) On the feasibility of internet-scale author identification. In: 2012 IEEE symposium on security and privacy (SP), pp 300\u2013314","DOI":"10.1109\/SP.2012.46"},{"key":"22_CR6","doi-asserted-by":"crossref","unstructured":"Brennan M, Afroz S, Greenstadt R (2012) Adversarial stylometry: circumventing authorship recognition to preserve privacy and anonymity. ACM Trans Inf Syst Secur 15(3):12:1\u201312:22","DOI":"10.1145\/2382448.2382450"},{"key":"22_CR7","doi-asserted-by":"crossref","unstructured":"Kacmarcik G, Gamon M (2006) Obfuscating document stylometry to preserve author anonymity. In: Proceedings of the 2006 COLING\/ACL","DOI":"10.3115\/1273073.1273131"},{"key":"22_CR8","doi-asserted-by":"crossref","unstructured":"Almishari M, Oguz E, Tsudik G (2014) Fighting authorship linkability with crowdsourcing. In: Proceedings of the second ACM conference on online social networks (COSN\u201914). ACM, New York, pp 69\u201382. doi: 10.1145\/2660460.2660486","DOI":"10.1145\/2660460.2660486"},{"key":"22_CR9","doi-asserted-by":"crossref","unstructured":"Johansson F, Kaati L, Shrestha A (2013) Detecting multiple aliases in social media. In: Proceedings of the 2012 international conference on advances in social networks analysis and mining (ASONAM\u201913), pp 1004\u20131011","DOI":"10.1145\/2492517.2500261"},{"issue":"3","key":"22_CR10","doi-asserted-by":"crossref","first-page":"538","DOI":"10.1002\/asi.21001","volume":"60","author":"E Stamatatos","year":"2009","unstructured":"Stamatatos E (2009) A survey of modern authorship attribution methods. J Am Soc Inf Sci Technol 60(3):538\u2013556","journal-title":"J Am Soc Inf Sci Technol"},{"issue":"2","key":"22_CR11","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1145\/1344411.1344413","volume":"26","author":"A Abbasi","year":"2008","unstructured":"Abbasi A, Chen H (2008) Writeprints: a stylometric approach to identity-level identification and similarity detection in cyberspace. ACM Trans Inf Syst 26(2):7\u20131729","journal-title":"ACM Trans Inf Syst"},{"issue":"3","key":"22_CR12","doi-asserted-by":"crossref","first-page":"378","DOI":"10.1002\/asi.20316","volume":"57","author":"R Zheng","year":"2006","unstructured":"Zheng R, Li J, Chen H, Huang Z (2006) A framework for authorship identification of online messages: writing-style features and classification techniques. J Am Soc Inf Sci Technol 57(3):378\u2013393","journal-title":"J Am Soc Inf Sci Technol"},{"issue":"3","key":"22_CR13","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1561\/1500000005","volume":"1","author":"P Juola","year":"2006","unstructured":"Juola P (2006) Authorship attribution. Found Trends Inf Retr 1(3):233\u2013334","journal-title":"Authorship attribution. Found Trends Inf Retr"},{"key":"22_CR14","doi-asserted-by":"crossref","unstructured":"Johansson F, Kaati L, Shrestha A (2014) Time profiles for identifying users in online environments. In: Proceedings of the 2014 IEEE joint intelligence and security informatics conference (JISIC\u201914), pp 83\u201390","DOI":"10.1109\/JISIC.2014.22"},{"key":"22_CR15","doi-asserted-by":"crossref","unstructured":"Zafarani R, Liu H (2009) Connecting corresponding identities across communities. In: Adar E, Hurst M, Finin T, Glance NS, Nicolov N, Tseng BL (eds) Proceedings of the third international conference on weblogs and social media","DOI":"10.1609\/icwsm.v3i1.13993"},{"key":"22_CR16","doi-asserted-by":"crossref","unstructured":"Perito D, Castelluccia C, Kaafar M, Manils P (2011) How unique and traceable are usernames? In: Fischer-H\u00fcbner S, Hopper N (eds) Privacy Enhancing Technologies. Lecture Notes in Computer Science, vol 6794. Springer, Berlin, Heidelberg, pp 1\u201317 (2011)","DOI":"10.1007\/978-3-642-22263-4_1"},{"key":"22_CR17","doi-asserted-by":"crossref","unstructured":"Zafarani R, Liu H (2013) Connecting users across social media sites: a behavioral-modeling approach. In: Proceedings of the 19th ACM SIGKDD international conference on knowledge discovery and data mining, pp 41\u201349","DOI":"10.1145\/2487575.2487648"},{"key":"22_CR18","unstructured":"Amitay E, Yogev S, Yom-Tov E (2007) Serial sharers: detecting split identities of web authors. In: ACM SIGIR 2007 workshop on plagiarism analysis, authorship identification, and near-duplicate detection. ACM, New York"},{"key":"22_CR19","doi-asserted-by":"crossref","unstructured":"H\u00f6lzer R, Malin B, Sweeney L (2005) Email alias detection using social network analysis. In: Proceedings of the 3rd international workshop on link discovery (LinkKDD\u201905). ACM, New York, pp 52\u201357","DOI":"10.1145\/1134271.1134279"},{"key":"22_CR20","doi-asserted-by":"crossref","unstructured":"Dahlin J, Johansson F, Kaati L, M\u00e5artenson C, Svenson P (2012) Combining entity matching techniques for detecting extremist behavior on discussion boards. In: Proceedings of the 2012 international conference on advances in social networks analysis and mining (ASONAM\u201912), pp 850\u2013857","DOI":"10.1109\/ASONAM.2012.154"},{"key":"22_CR21","doi-asserted-by":"crossref","unstructured":"Liu S, Wang S, Zhu F, Zhang J, Krishnan R (2014) Hydra: large-scale social identity linkage via heterogeneous behavior modeling. In: Proceedings of the 2014 ACM SIGMOD international conference on management of data (SIGMOD\u201914), pp 51\u201362","DOI":"10.1145\/2588555.2588559"},{"issue":"2","key":"22_CR22","first-page":"97","volume":"4","author":"JA Horne","year":"1976","unstructured":"Horne JA, \u00d6stberg O (1976) A self-assessment questionnaire to determine morningness-eveningness in human circadian rhythms. Int J Chronobiol 4(2):97\u2013110","journal-title":"Int J Chronobiol"},{"issue":"9","key":"22_CR23","doi-asserted-by":"crossref","first-page":"1153","DOI":"10.3109\/07420528.2012.719971","volume":"29","author":"A Adan","year":"2012","unstructured":"Adan A, Archer SN, Hidalgo MP, Di Milia L, Natale V, Randler C (2012) Circadian typology: a comprehensive review. Chronobiol Int 29(9):1153\u20131175","journal-title":"Chronobiol Int"},{"key":"22_CR24","doi-asserted-by":"crossref","first-page":"238","DOI":"10.3109\/07420528.2010.549599","volume":"28","author":"R Urban","year":"2011","unstructured":"Urban R, Magyarodi T, Riga A (2011) Morningness-eveningness, chronotypes and health-impairing behaviors in adolescents. Chronobiol Int 28:238\u2013247","journal-title":"Chronobiol Int"},{"key":"22_CR25","doi-asserted-by":"crossref","first-page":"455","DOI":"10.1111\/j.1360-0443.1994.tb00926.x","volume":"89","author":"A Adan","year":"1994","unstructured":"Adan A (1994) Chronotype and personality factors in the daily consumption of alcohol and psychostimulants. Addiction 89:455\u2013462","journal-title":"Addiction"},{"key":"22_CR26","unstructured":"Lee B (2012) A temporal analysis of posting behavior in social media streams. In: International AAAI conference on weblogs and social media"},{"key":"22_CR27","doi-asserted-by":"crossref","unstructured":"Malmgren RD, Hofman JM, Amaral LAN, Watts DJ (2009) Characterizing individual communication patterns. In: Proceedings of the 15th ACM SIGKDD international conference on knowledge discovery and data mining, pp 607\u2013616","DOI":"10.1145\/1557019.1557088"},{"key":"22_CR28","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-2440-0","volume-title":"The nature of statistical learning theory","author":"VN Vapnik","year":"1995","unstructured":"Vapnik VN (1995) The nature of statistical learning theory. Springer, New York"},{"issue":"1","key":"22_CR29","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1145\/1656274.1656278","volume":"11","author":"M Hall","year":"2009","unstructured":"Hall M, Frank E, Holmes G, Pfahringer B, Reutemann P, Witten IH (2009) The weka data mining software: an update. SIGKDD Explor Newsl 11(1):10\u201318. doi: 10.1145\/1656274.1656278","journal-title":"SIGKDD Explor Newsl"},{"key":"22_CR30","first-page":"155","volume":"42","author":"C Lee","year":"2006","unstructured":"Lee C, Lee GG (2006) Information gain and divergence-based feature selection for machine learning-based text categorization. Form Methods Inf Retr 42:155\u2013165","journal-title":"Form Methods Inf Retr"},{"key":"22_CR31","doi-asserted-by":"crossref","unstructured":"Layton R, Watters P, Dazeley R (2010) Authorship attribution for twitter in 140 characters or less. In: Proceedings of the second cybercrime and trustworthy computing workshop","DOI":"10.1109\/CTC.2010.17"},{"key":"22_CR32","unstructured":"Zechner N (2014) Effects of division of data in author identification. In: Proceedings of the fifth Swedish language technology conference"},{"key":"22_CR33","doi-asserted-by":"crossref","unstructured":"Novak J, Raghavan P, Tomkins A (2004) Anti-aliasing on the web. In: Proceedings of the 13th international conference on world wide web. ACM, New York, pp 30\u201339","DOI":"10.1145\/988672.988678"}],"container-title":["Security Informatics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13388-015-0022-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13388-015-0022-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13388-015-0022-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,14]],"date-time":"2023-08-14T13:52:05Z","timestamp":1692021125000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.security-informatics.com\/content\/4\/1\/7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9,24]]},"references-count":33,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,12]]}},"alternative-id":["22"],"URL":"https:\/\/doi.org\/10.1186\/s13388-015-0022-z","relation":{},"ISSN":["2190-8532"],"issn-type":[{"value":"2190-8532","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,9,24]]},"article-number":"7"}}