Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2013
DOI: 10.1145/2492517.2500308
|View full text |Cite
|
Sign up to set email alerts
|

A system for the automated author attribution of text and instant messages

Abstract: The paper presents a summary of the ChatSafe

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(9 citation statements)
references
References 1 publication
0
9
0
Order By: Relevance
“…Instance-based approaches are usually implemented using clustering algorithms or machine learning classifiers such as Support Vector Machines (SVMs), Artificial Neural Networks (ANNs), or Decision Trees (DTs). Some studies have been conducted specifically using short digital texts such as Tweets [6], [16], [17], [18], [19], [30], [33], SMS [4], [5], or small pieces of texts from blog posts [35]. They are indicated in bold in Table 1.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Instance-based approaches are usually implemented using clustering algorithms or machine learning classifiers such as Support Vector Machines (SVMs), Artificial Neural Networks (ANNs), or Decision Trees (DTs). Some studies have been conducted specifically using short digital texts such as Tweets [6], [16], [17], [18], [19], [30], [33], SMS [4], [5], or small pieces of texts from blog posts [35]. They are indicated in bold in Table 1.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Some other approaches detected intrusion and compromised accounts in short messages by applying text mining techniques as Authorship Attribution (AA) and AV [5,4]. Their main contribution was to aid the search for cyber criminals [27] or to increase cyber space security and reliability [5].…”
Section: Related Workmentioning
confidence: 99%
“…Some other approaches detected intrusion and compromised accounts in short messages by applying text mining techniques as Authorship Attribution (AA) and AV [Donais et al 2013, Brocardo et al 2013, Brocardo et al 2014. Their main contribution was to aid the search for cyber criminals [Zhang et al 2014] or to increase cyber space security and reliability [Donais et al 2013].…”
Section: Related Workmentioning
confidence: 99%