{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:03:00Z","timestamp":1773615780132,"version":"3.50.1"},"reference-count":39,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.3103\/s0146411624700925","type":"journal-article","created":{"date-parts":[[2025,3,14]],"date-time":"2025-03-14T14:23:22Z","timestamp":1741962202000},"page":"1271-1282","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Identification and Verification of Authorship Using Machine and Deep Learning Methods"],"prefix":"10.3103","volume":"58","author":[{"given":"T. D.","family":"Ovasapyan","sequence":"first","affiliation":[]},{"given":"E. M.","family":"Tolgorenko","sequence":"additional","affiliation":[]},{"given":"E. A.","family":"Zubkov","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2025,3,14]]},"reference":[{"key":"7791_CR1","doi-asserted-by":"publisher","unstructured":"Tyo, J., Dhingra, B., and Lipton, Z.C., Valla: Standardizing and benchmarking authorship attribution and verification through empirical evaluation and comparative analysis, Proceedings of the 13th International Joint Conference on Natural Language Processing and the 3rd Conference of the Asia-Pacific Chapter of the Association for Computational Linguistics, Nusa Dua, Bali, Indonesia, 2023, Park, J.C., Arase, Yu., Hu, B., Lu, W., Wijaya, D., Purwarianti, A., and Krisnadhi, A.A., Eds., Association for Computational Linguistics, 2023, vol. 1, pp. 649\u2013660. https:\/\/doi.org\/10.18653\/v1\/2023.ijcnlp-main.43","DOI":"10.18653\/v1\/2023.ijcnlp-main.43"},{"key":"7791_CR2","doi-asserted-by":"publisher","first-page":"9","DOI":"10.13053\/rcs-123-1-1","volume":"123","author":"E. Stamatatos","year":"2016","unstructured":"Stamatatos, E., Authorship verification: A review of recent advances, Research in Computing Science, 2016, vol. 123, no. 1, pp. 9\u201325. https:\/\/doi.org\/10.13053\/rcs-123-1-1","journal-title":"Research in Computing Science"},{"key":"7791_CR3","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/tcss.2021.3123895","volume":"10","author":"A. Theophilo","year":"2021","unstructured":"Theophilo, A., Giot, R., and Rocha, A., Authorship attribution of social media messages, IEEE Trans. Comput. Soc. Syst., 2021, vol. 10, no. 1, pp. 10\u201323. https:\/\/doi.org\/10.1109\/tcss.2021.3123895","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"key":"7791_CR4","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1080\/00031305.2016.1148630","volume":"70","author":"X. Puig","year":"2016","unstructured":"Puig, X., Font, M., and Ginebra, J., A unified approach to authorship attribution and verification, Am. Stat., 2016, vol. 70, no. 3, pp. 232\u2013242. https:\/\/doi.org\/10.1080\/00031305.2016.1148630","journal-title":"Am. Stat."},{"key":"7791_CR5","doi-asserted-by":"publisher","unstructured":"Stamatatos, E., Authorship attribution using text distortion, Proceedings of the 15th Conference of the European Chapter of the Association for Computational Linguistics, Valencia, 2017, Lapata, M., Blunsom, P., and Koller, A., Eds., Association for Computational Linguistics, 2017, vol. 1, pp. 1138\u20131149. https:\/\/doi.org\/10.18653\/v1\/e17-1107","DOI":"10.18653\/v1\/e17-1107"},{"key":"7791_CR6","doi-asserted-by":"publisher","unstructured":"Luyckx, K. and Daelemans, W., Authorship attribution and verification with many authors and limited data, Proceedings of the 22nd International Conference on Computational Linguistics\u2014COLING \u201908, Manchester, 2008, Stroudsburg, PA: Association for Computational Linguistics, 2008, pp. 513\u2013520. https:\/\/doi.org\/10.3115\/1599081.1599146","DOI":"10.3115\/1599081.1599146"},{"key":"7791_CR7","first-page":"3","volume":"2552","author":"A. Romanov","year":"2019","unstructured":"Romanov, A., Fedotova, A., Kurtukova, A., and Meshcheryakov, R., Natural text anonymization using universal transformer with a self-attention, CEUR Workshop Proc., 2019, vol. 2552, p. 3. https:\/\/ceur-ws.org\/Vol-2552\/Paper3.pdf.","journal-title":"CEUR Workshop Proc."},{"key":"7791_CR8","first-page":"2301","volume":"3180","author":"E. Stamatatos","year":"2022","unstructured":"Stamatatos, E., Kestemont, M., and Kredens, K., Overview of the authorship verification task at PAN, CEUR Workshop Proc., 2022, vol. 3180, pp. 2301\u20132313. https:\/\/ceur-ws.org\/Vol-3497\/paper-199.pdf.","journal-title":"CEUR Workshop Proc."},{"key":"7791_CR9","doi-asserted-by":"publisher","unstructured":"Boenninghoff, B., Hessler, S., Kolossa, D., and Nickel, R.M., Explainable authorship verification in social media via attention-based similarity learning, 2019 IEEE International Conference on Big Data (Big Data), Los Angeles, 2019, IEEE, 2019, pp. 36\u201345. https:\/\/doi.org\/10.1109\/bigdata47090.2019.9005650","DOI":"10.1109\/bigdata47090.2019.9005650"},{"key":"7791_CR10","doi-asserted-by":"publisher","unstructured":"Boenninghoff, B., Nickel, R.M., Zeiler, S., and Kolossa, D., Similarity learning for authorship verification in social media, ICASSP 2019\u20142019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Brighton, United Kingdom, 2019, IEEE, 2019, pp. 2457\u20132461. https:\/\/doi.org\/10.1109\/icassp.2019.8683405","DOI":"10.1109\/icassp.2019.8683405"},{"key":"7791_CR11","doi-asserted-by":"publisher","unstructured":"Halvani, O., Winter, Ch., and Graner, L., Assessing the applicability of authorship verification methods, ARES \u201919: Proceedings of the 14th International Conference on Availability, Reliability and Security, Canterbury, United Kingdom, 2019, New York: Association for Computing Machinery, 2019, p. 38. https:\/\/doi.org\/10.1145\/3339252.3340508","DOI":"10.1145\/3339252.3340508"},{"key":"7791_CR12","first-page":"141","volume":"1391","author":"M. Hurlimann","year":"2015","unstructured":"Hurlimann, M., Weck, B., van den Berg, E., and Suster, S., GLAD: Groningen lightweight authorship detection, CEUR Workshop Proc., 2015, vol. 1391, p. 141. https:\/\/ceur-ws.org\/Vol-1391\/141-CR.pdf.","journal-title":"CEUR Workshop Proc."},{"key":"7791_CR13","doi-asserted-by":"publisher","first-page":"1194","DOI":"10.3103\/s0146411621080460","volume":"55","author":"E.V. Zavadskii","year":"2021","unstructured":"Zavadskii, E.V. and Ivanov, D.V., Implementation of honeypot systems based on the potential attack graph, Autom. Control Comput. Sci., 2021, vol. 55, no. 8, pp. 1194\u20131200. https:\/\/doi.org\/10.3103\/s0146411621080460","journal-title":"Autom. Control Comput. Sci."},{"key":"7791_CR14","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/j.patrec.2020.07.042","volume":"141","author":"P. Wang","year":"2021","unstructured":"Wang, P., Fan, E., and Wang, P., Comparative analysis of image classification algorithms based on traditional machine learning and deep learning, Pattern Recognit. Lett., 2021, vol. 141, pp. 61\u201367. https:\/\/doi.org\/10.1016\/j.patrec.2020.07.042","journal-title":"Pattern Recognit. Lett."},{"key":"7791_CR15","unstructured":"Soshnev, M.D. and Kalinin, M.O., Protecting intelligent systems from threats of extracting computational machine learning models, Metody i Tekhnicheskie Sredstva Obespecheniya Bezopasnosti Informatsii, 2023, no. 32, pp.\u00a0145\u2013146."},{"key":"7791_CR16","doi-asserted-by":"publisher","unstructured":"Kamath, C.N., Bukhari, S.S., and Dengel, A., Comparative study between traditional machine learning and deep learning approaches for text classification, Proceedings of the ACM Symposium on Document Engineering 2018, Halifax, Canada, 2018, New York: Association for Computing Machinery, 2018, p. 14. https:\/\/doi.org\/10.1145\/3209280.3209526","DOI":"10.1145\/3209280.3209526"},{"key":"7791_CR17","first-page":"272","volume":"17","author":"M.O. Kalinin","year":"2014","unstructured":"Kalinin, M.O. and Konoplev, A.S., Formalization of objectives of grid systems resources protection against unauthorized access, Nonlinear Phenom. Complex Syst., 2014, vol. 17, no. 3, pp. 272\u2013277.","journal-title":"Nonlinear Phenom. Complex Syst."},{"key":"7791_CR18","doi-asserted-by":"publisher","unstructured":"Vakili, M., Ghamsari, M., and Rezaei, M., Performance analysis and comparison of machine and deep learning algorithms for IoT data classification, arXiv Preprint, 2020. https:\/\/doi.org\/10.48550\/arXiv.2001.09636","DOI":"10.48550\/arXiv.2001.09636"},{"key":"7791_CR19","doi-asserted-by":"publisher","first-page":"129021","DOI":"10.1155\/2015\/129021","volume":"2015","author":"Sh. Ding","year":"2015","unstructured":"Ding, Sh., Zhang, N., Xu, X., Guo, L., and Zhang, J., Deep extreme learning machine and its application in EEG classification, Math. Probl. Eng., 2015, vol. 2015, p. 129021. https:\/\/doi.org\/10.1155\/2015\/129021","journal-title":"Math. Probl. Eng."},{"key":"7791_CR20","doi-asserted-by":"publisher","first-page":"1045","DOI":"10.3103\/s0146411619080212","volume":"53","author":"R.A. Ognev","year":"2019","unstructured":"Ognev, R.A., Zhukovskii, E.V., and Zegzhda, D.P., Clustering of malicious executable files based on the sequence analysis of system calls, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 1045\u20131055. https:\/\/doi.org\/10.3103\/s0146411619080212","journal-title":"Autom. Control Comput. Sci."},{"key":"7791_CR21","doi-asserted-by":"publisher","first-page":"1025","DOI":"10.3103\/s0146411621080198","volume":"55","author":"I.I. Marshev","year":"2021","unstructured":"Marshev, I.I., Zhukovskii, E.V., and Aleksandrova, E.B., Protection against adversarial attacks on malware detectors using machine learning algorithms, Autom. Control Comput. Sci., 2021, vol. 55, no. 8, pp. 1025\u20131028. https:\/\/doi.org\/10.3103\/s0146411621080198","journal-title":"Autom. Control Comput. Sci."},{"key":"7791_CR22","doi-asserted-by":"publisher","unstructured":"Chauhan, N.K. and Singh, K., A review on conventional machine learning vs deep learning, 2018 International Conference on Computing, Power and Communication Technologies (GUCON), Greater Noida, India, 2018, IEEE, 2018, pp. 347\u2013352. https:\/\/doi.org\/10.1109\/gucon.2018.8675097","DOI":"10.1109\/gucon.2018.8675097"},{"key":"7791_CR23","doi-asserted-by":"publisher","first-page":"2208","DOI":"10.3390\/sym14102208","volume":"14","author":"M. Kalinin","year":"2022","unstructured":"Kalinin, M., Ovasapyan, T., and Poltavtseva, M., Application of the learning automaton model for ensuring cyber resiliency, Symmetry, 2022, vol. 14, no. 10, p. 2208. https:\/\/doi.org\/10.3390\/sym14102208","journal-title":"Symmetry"},{"key":"7791_CR24","unstructured":"Yugai, P.E. and Zhukovskii, E.V., Detecting and classifying malicious installation files using machine learning, Metody i Tekhnicheskie Sredstva Obespecheniya Bezopasnosti Informatsii, 2022, no. 31, pp. 53\u201354."},{"key":"7791_CR25","doi-asserted-by":"publisher","first-page":"991","DOI":"10.3103\/s0146411621080241","volume":"55","author":"T.D. Ovasapyan","year":"2021","unstructured":"Ovasapyan, T.D., Danilov, V.D., and Moskvin, D.A., Application of synthetic data generation methods to the detection of network attacks on Internet of Things devices, Autom. Control Comput. Sci., 2021, vol. 55, no. 8, pp.\u00a0991\u2013998. https:\/\/doi.org\/10.3103\/s0146411621080241","journal-title":"Autom. Control Comput. Sci."},{"key":"7791_CR26","doi-asserted-by":"publisher","first-page":"958","DOI":"10.3103\/s0146411623080060","volume":"57","author":"N.A. Gribkov","year":"2023","unstructured":"Gribkov, N.A., Ovasapyan, T.D., and Moskvin, D.A., Analysis of decompiled program code using abstract syntax trees, Autom. Control Comput. Sci., 2023, vol. 57, no. 8, pp. 958\u2013967. https:\/\/doi.org\/10.3103\/s0146411623080060","journal-title":"Autom. Control Comput. Sci."},{"key":"7791_CR27","doi-asserted-by":"publisher","unstructured":"Georgieva-Trifonova, T. and Duraku, M., Research on N-grams feature selection methods for text classification, IOP Conf. Ser.: Mater. Sci. Eng., 2021, vol. 1031, no. 1, p. 012048. https:\/\/doi.org\/10.1088\/1757-899x\/1031\/1\/012048","DOI":"10.1088\/1757-899x\/1031\/1\/012048"},{"key":"7791_CR28","doi-asserted-by":"publisher","first-page":"559","DOI":"10.1080\/14786440109462720","volume":"2","author":"K. Pearson","year":"1901","unstructured":"Pearson, K., LIII. On lines and planes of closest fit to systems of points in space, The London, Edinburgh, and Dublin Philosophical Magazine and Journal of Science, 1901, vol. 2, no. 11, pp. 559\u2013572. https:\/\/doi.org\/10.1080\/14786440109462720","journal-title":"The London, Edinburgh, and Dublin Philosophical Magazine and Journal of Science"},{"key":"7791_CR29","first-page":"42","volume":"19","author":"J.J. Sylvester","year":"1889","unstructured":"Sylvester, J.J., On the reduction of a bilinear quantic of the nth order to the form of a sum of n products by a double orthogonal substitution, Messenger of Mathematics, 1889, vol. 19, no. 6, pp. 42\u201346.","journal-title":"Messenger of Mathematics"},{"key":"7791_CR30","doi-asserted-by":"publisher","first-page":"934","DOI":"10.3103\/s0146411622080211","volume":"56","author":"E.A. Rudnitskaya","year":"2022","unstructured":"Rudnitskaya, E.A. and Poltavtseva, M.A., Adversarial machine learning protection using the example of evasion attacks on medical images, Autom. Control Comput. Sci., 2022, vol. 56, no. 8, pp. 934\u2013941. https:\/\/doi.org\/10.3103\/s0146411622080211","journal-title":"Autom. Control Comput. Sci."},{"key":"7791_CR31","doi-asserted-by":"publisher","first-page":"745","DOI":"10.3103\/s0146411615080118","volume":"49","author":"D.A. Moskvin","year":"2015","unstructured":"Moskvin, D.A. and Ivanov, D.V., Methods of protecting self-organizing networks against attacks on traffic routing, Autom. Control Comput. Sci., 2015, vol. 49, no. 8, pp. 745\u2013750. https:\/\/doi.org\/10.3103\/s0146411615080118","journal-title":"Autom. Control Comput. Sci."},{"key":"7791_CR32","doi-asserted-by":"publisher","unstructured":"Potthast, M., Kiesel, J., Reinartz, K., Bevendorff, J., and Stein, B., A stylometric inquiry into hyperpartisan and fake news, Proceedings of the 56th Annual Meeting of the Association for Computational Linguistics, Gurevych, I. and Miyao, Yu., Eds., Association for Computational Linguistics, 2018, vol. 1, pp. 231\u2013240. https:\/\/doi.org\/10.18653\/v1\/p18-1022","DOI":"10.18653\/v1\/p18-1022"},{"key":"7791_CR33","doi-asserted-by":"publisher","unstructured":"Huang, J., Gu, Sh., Hou, L., Wu, Yu., Wang, X., Yu, H., and Han, J., Large language models can self-improve, Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing, Bouamor, H., Pino, J., and Bali, K., Eds., Association for Computational Linguistics, 2023, pp. 1051\u20131068. https:\/\/doi.org\/10.18653\/v1\/2023.emnlp-main.67","DOI":"10.18653\/v1\/2023.emnlp-main.67"},{"key":"7791_CR34","doi-asserted-by":"publisher","first-page":"160940692412311","DOI":"10.1177\/16094069241231168","volume":"23","author":"R.H. Tai","year":"2024","unstructured":"Tai, R.H., Bentley, L.R., Xia, X., Sitt, J.M., Fankhauser, S.C., Chicas-Mosier, A.M., and Monteith, B.G., An\u00a0examination of the use of large language models to aid analysis of textual data, Int. J. Qual. Methods, 2024, vol. 23, p. 16094069241231168. https:\/\/doi.org\/10.1177\/16094069241231168","journal-title":"Int. J. Qual. Methods"},{"key":"7791_CR35","first-page":"979","volume":"17","author":"A.S. Konoplev","year":"2014","unstructured":"Konoplev, A.S. and Kali, M.O., Formalization the objectives of grid systems resources protection from unauthorized access, Nonlinear Phenom. Complex Syst., 2014, vol. 17, no. 3, p. 979.","journal-title":"Nonlinear Phenom. Complex Syst."},{"key":"7791_CR36","doi-asserted-by":"publisher","first-page":"100211","DOI":"10.1016\/j.hcc.2024.100211","volume":"4","author":"Yi. Yao","year":"2024","unstructured":"Yao, Yi., Duan, J., Xu, K., Cai, Yu., Sun, Zh., and Zhang, Yu., A survey on large language model (LLM) security and privacy: The good, the bad, and the ugly, High-Confidence Comput., 2024, vol. 4, no. 2, p. 100211. https:\/\/doi.org\/10.1016\/j.hcc.2024.100211","journal-title":"High-Confidence Comput."},{"key":"7791_CR37","doi-asserted-by":"publisher","unstructured":"Hadi, M.U., Al Tashi, Q., Shah, A., Muneer, A., Irfan, M., Zafar, A., Shaikh, M.B., Akhtar, N., Hassan, S.Z., Shoman, M., Wu, J., Mirjalili, S., and Shah, M., A survey on large language models: Applications, challenges, limitations, and practical usage, TechRxiv Preprint, 2023. https:\/\/doi.org\/10.36227\/techrxiv.23589741","DOI":"10.36227\/techrxiv.23589741"},{"key":"7791_CR38","doi-asserted-by":"publisher","unstructured":"Patel, A., Rao, D., Kothary, A., Mckeown, K., and Callison-Burch, Ch., Learning interpretable style embeddings via prompting LLMs, Findings of the Association for Computational Linguistics: EMNLP 2023, Singapore, 2023, Bouamor, H., Pino, J., and Bali, K., Eds., Association for Computational Linguistics, 2023, pp. 15270\u201315290. https:\/\/doi.org\/10.18653\/v1\/2023.findings-emnlp.1020","DOI":"10.18653\/v1\/2023.findings-emnlp.1020"},{"key":"7791_CR39","doi-asserted-by":"publisher","first-page":"3","DOI":"10.3390\/fi13010003","volume":"13","author":"A. Romanov","year":"2020","unstructured":"Romanov, A., Kurtukova, A., Shelupanov, A., Fedotova, A., and Goncharov, V., Authorship identification of a Russian-language text using support vector machine and deep neural networks, Future Internet, 2020, vol. 13, no. 1, p. 3. https:\/\/doi.org\/10.3390\/fi13010003","journal-title":"Future Internet"}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411624700925.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411624700925","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411624700925.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:04:29Z","timestamp":1773612269000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411624700925"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12]]},"references-count":39,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["7791"],"URL":"https:\/\/doi.org\/10.3103\/s0146411624700925","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12]]},"assertion":[{"value":"11 March 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 March 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 April 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 March 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors of this work declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}