{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T05:43:53Z","timestamp":1757569433130,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1109\/ucc.2015.80","type":"proceedings-article","created":{"date-parts":[[2022,2,1]],"date-time":"2022-02-01T21:45:43Z","timestamp":1643751943000},"page":"448-452","source":"Crossref","is-referenced-by-count":11,"title":["Using Big Data Analytics for Authorship Authentication of Arabic Tweets"],"prefix":"10.1109","author":[{"given":"Jafar","family":"Albadarneh","sequence":"first","affiliation":[]},{"given":"Bashar","family":"Talafha","sequence":"additional","affiliation":[]},{"given":"Mahmoud","family":"Al-Ayyoub","sequence":"additional","affiliation":[]},{"given":"Belal","family":"Zaqaibeh","sequence":"additional","affiliation":[]},{"given":"Mohammad","family":"Al-Smadi","sequence":"additional","affiliation":[]},{"given":"Yaser","family":"Jararweh","sequence":"additional","affiliation":[]},{"given":"Elhadj","family":"Benkhelifa","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1147\/JRD.2013.2240732"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1561\/1500000005"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1002\/asi.21001"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20961"},{"key":"ref14","first-page":"317","article-title":"Authorship attribution: What's easy and what's hard","volume":"21","author":"koppel","year":"2012","journal-title":"JL & Pol'y"},{"key":"ref15","article-title":"Mining e-mail authorship","author":"de vel","year":"2000","journal-title":"Proc Workshop on Text Mining ACM International Conference on Knowledge Discovery and Data Mining (KDD 2000)"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/604264.604272"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1007\/3-540-44853-5_5","article-title":"Authorship analysis in cybercrime investigation","author":"zheng","year":"2003","journal-title":"Intelligence and Security Informatics"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ENC.2007.22"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/IACS.2014.6841971"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2009.5137294"},{"key":"ref4","first-page":"73","article-title":"A comparative study of automatic text categorization methods using arabic text","author":"hmeidi","year":"2015","journal-title":"The International Technology Management Conference (ITMC2015)"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA.2014.7073254"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.2200\/S00277ED1V01Y201008HLT010"},{"journal-title":"Data Science and Big Data Analytics Discovering Analyzing Visualizing and Presenting Data","year":"2015","key":"ref6"},{"key":"ref29","article-title":"On the automatic categorization of arabic articles based on their political orientation","author":"abooraig","year":"2014","journal-title":"3rd International Conference on Informatics Engineering and Information Science (ICIEIS)"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/IACS.2015.7103229"},{"key":"ref8","first-page":"43","article-title":"Parallel text categorization of massive text based on hadoop","volume":"10","author":"xiang","year":"2011","journal-title":"Computer Science"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ChinaGrid.2010.14"},{"key":"ref2","article-title":"Automatic arabic text categorisation: A comprehensive comparative study","author":"hmeidi","year":"2014","journal-title":"Journal of Information Science"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2014.43"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/FiCloud.2014.99"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/IACS.2014.6841973"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1007\/11427995_15","article-title":"Applying authorship analysis to arabic web content","author":"abbasi","year":"2005","journal-title":"Intelligence and Security Informatics"},{"key":"ref21","doi-asserted-by":"crossref","DOI":"10.1109\/AICCSA.2015.7507196","article-title":"Emotion analysis of arabic articles and its impact on identifying the author's gender","author":"alsmearat","year":"2015","journal-title":"Computer Systems and Applications (AICCSA) 2015 IEEE\/ACS 12th International Conference on"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICCITechnol.2012.6285841"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2005.81"},{"key":"ref26","first-page":"24","article-title":"Tat: an author profiling tool with application to arabic emails","author":"estival","year":"2007","journal-title":"Proceedings of the Australasian Language Technology Workshop"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CyberC.2013.31"}],"event":{"name":"2015 IEEE\/ACM 8th International Conference on Utility and Cloud Computing (UCC)","start":{"date-parts":[[2015,12,7]]},"location":"Limassol, Cyprus","end":{"date-parts":[[2015,12,10]]}},"container-title":["2015 IEEE\/ACM 8th International Conference on Utility and Cloud Computing (UCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7430473\/7431374\/07431455.pdf?arnumber=7431455","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,2]],"date-time":"2022-02-02T20:00:34Z","timestamp":1643832034000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7431455\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/ucc.2015.80","relation":{},"subject":[],"published":{"date-parts":[[2015,12]]}}}