{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,29]],"date-time":"2025-05-29T07:45:19Z","timestamp":1748504719963},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540344780"},{"type":"electronic","value":"9783540344797"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11760146_6","type":"book-chapter","created":{"date-parts":[[2006,5,9]],"date-time":"2006-05-09T15:29:38Z","timestamp":1147188578000},"page":"60-71","source":"Crossref","is-referenced-by-count":41,"title":["Visualizing Authorship for Identification"],"prefix":"10.1007","author":[{"given":"Ahmed","family":"Abbasi","sequence":"first","affiliation":[]},{"given":"Hsinchun","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"5","key":"6_CR1","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1109\/MIS.2005.81","volume":"20","author":"A. Abbasi","year":"2005","unstructured":"Abbasi, A., Chen, H.: Applying Authorship Analysis to Extremist-Group Web Forum Messages. IEEE Intelligent Systems\u00a020(5), 67\u201375 (2005)","journal-title":"IEEE Intelligent Systems"},{"key":"6_CR2","first-page":"110","volume":"2","author":"R.H. Baayen","year":"1996","unstructured":"Baayen, R.H., Halteren, H.v., Tweedie, F.J.: Outside the cave of shadows: using syntactic annotation to enhance authorship attribution. Literary and Linguistic Computing\u00a02, 110\u2013120 (1996)","journal-title":"Literary and Linguistic Computing"},{"key":"6_CR3","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1093\/llc\/2.2.61","volume":"2","author":"J.F. Burrows","year":"1987","unstructured":"Burrows, J.F.: Word patterns and story shapes: the statistical analysis of narrative style. Literary and Linguistic Computing\u00a02, 61\u201367 (1987)","journal-title":"Literary and Linguistic Computing"},{"issue":"4","key":"6_CR4","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1145\/604264.604272","volume":"30","author":"O. Vel De","year":"2001","unstructured":"De Vel, O., Anderson, A., Corney, M., Mohay, G.: Mining E-mail content for author identification forensics. SIGMOD Record\u00a030(4), 55\u201364 (2001)","journal-title":"SIGMOD Record"},{"key":"6_CR5","unstructured":"Donath, J.: Identity and Deception in the Virtual Community. In: Communities in Cyberspace. Routledge Press, London (1999)"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Donath, J., Karahalio, K., Viegas, F.: Visualizing Conversation. In: Proceedings of the 32nd Hawaii International Conference on System Sciences (HICSS 1999), Hawaii, USA (1999)","DOI":"10.1109\/HICSS.1999.772675"},{"issue":"1","key":"6_CR7","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1145\/344949.345004","volume":"7","author":"T. Erickson","year":"2001","unstructured":"Erickson, T., Kellogg, W.A.: Social Translucence: An Approach to Designing Systems that Support Social Processes. ACM Transactions on Computer-Human Interaction\u00a07(1), 59\u201383 (2001)","journal-title":"ACM Transactions on Computer-Human Interaction"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Kelly, S.U., Sung, C., Farnham, S.: Designing for Improved Social Responsibility, User Participation and Content in On-Line Communities. In: Proceedings of the Conference on Human Factors in Computing Systems, CHI 2002 (2002)","DOI":"10.1145\/503376.503446"},{"issue":"1","key":"6_CR9","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1016\/0306-4573(94)90029-9","volume":"30","author":"B. Kjell","year":"1994","unstructured":"Kjell, B., Woods, W.A., Frieder, O.: Discrimination of authorship using visualization. Information Processing and Management\u00a030(1), 141\u2013150 (1994)","journal-title":"Information Processing and Management"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Li, J., Zeng, R., Chen, H.: From Fingerprint to Writeprint. Communications of the ACM (2006) (Forthcoming)","DOI":"10.1145\/1121949.1121951"},{"issue":"12","key":"6_CR11","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1145\/355112.355129","volume":"43","author":"T. Moores","year":"2000","unstructured":"Moores, T., Dhillon, G.: Software Piracy: A View from Hong Kong. Communications of the ACM\u00a043(12), 88\u201393 (2000)","journal-title":"Communications of the ACM"},{"key":"6_CR12","unstructured":"Ribler, R.L., Abrams, M.: Using visualization to detect plagiarism in computer science classess. In: Proceedings of the IEEE Symposium on Information Vizualization (2000)"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Rocco, E.: Trust Breaks Down in Electronic Contexts but can be repaired by some Initial Face-to-Face Contact. In: Proceedings of the Conference on Human Factors in Computing Systems (CHI 1998), pp. 496\u2013502 (1998)","DOI":"10.1145\/274644.274711"},{"issue":"3","key":"6_CR14","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1080\/07421222.2000.11045652","volume":"17","author":"W. Sack","year":"2000","unstructured":"Sack, W.: Conversation Map: An Interface for Very Large-Scale Conversations. Journal of Management Information Systems\u00a017(3), 73\u201392 (2000)","journal-title":"Journal of Management Information Systems"},{"key":"6_CR15","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/s007990050043","volume":"2","author":"C.D. Shaw","year":"1999","unstructured":"Shaw, C.D., Kukla, J.M., Soboroff, I., Ebert, D.S., Nicholas, C.K., Zwa, A., Miller, E.L., Roberts, D.A.: Interactive volumetric information visualization for document corpus management. International Journal on Digital Libraries\u00a02, 144\u2013156 (1999)","journal-title":"International Journal on Digital Libraries"},{"issue":"1","key":"6_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BF00054024","volume":"30","author":"F.J. Tweedie","year":"1996","unstructured":"Tweedie, F.J., Singh, S., Holmes, D.I.: Neural Network applications in stylometry: the Federalist papers. Computers and the Humanities\u00a030(1), 1\u201310 (1996)","journal-title":"Computers and the Humanities"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Viegas, F.B., Smith, M.: Newsgroup Crowds and AuthorLines: Visualizing the Activity of Individuals. In: Conversational Cyberspaces Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS 2004), Hawaii, USA (2004)","DOI":"10.1109\/HICSS.2004.1265288"},{"key":"6_CR18","volume-title":"Pattern Recognition: Human and Mechanical","author":"S. Watanabe","year":"1985","unstructured":"Watanabe, S.: Pattern Recognition: Human and Mechanical. John Wiley and Sons, Inc., New York (1985)"},{"key":"6_CR19","doi-asserted-by":"publisher","DOI":"10.1002\/0470854774","volume-title":"Statistical Pattern Recognition","author":"A. Webb","year":"2002","unstructured":"Webb, A.: Statistical Pattern Recognition. John Wiley and Sons, Inc., New York (2002)"},{"issue":"3","key":"6_CR20","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1002\/asi.20316","volume":"57","author":"R. Zheng","year":"2006","unstructured":"Zheng, R., Qin, Y., Huang, Z., Chen, H.: A Framework for Authorship Analysis of Online Messages: Writing-style Features and Techniques. Journal of the American Society for Information Science and Technology\u00a057(3), 378\u2013393 (2006)","journal-title":"Journal of the American Society for Information Science and Technology"}],"container-title":["Lecture Notes in Computer Science","Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11760146_6.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:08:24Z","timestamp":1619507304000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11760146_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540344780","9783540344797"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/11760146_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}