2018
DOI: 10.1145/3236391
|View full text |Cite
|
Sign up to set email alerts
|

Arabic Authorship Attribution

Abstract: Law enforcement faces problems in tracing the true identity of offenders in cybercrime investigations. Most offenders mask their true identity, impersonate people of high authority, or use identity deception and obfuscation tactics to avoid detection and traceability. To address the problem of anonymity, authorship analysis is used to identify individuals by their writing styles without knowing their actual identities. Most authorship studies are dedicated to English due to its widespread use over the Internet… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
0
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(7 citation statements)
references
References 42 publications
0
0
0
Order By: Relevance
“…Studies on Arabic AA have been conducted on various text genres and forms, such as news articles [15,38], poetry [28], Tweets [16][17][18][19], and classical Arabic texts [14,[20][21][22].…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…Studies on Arabic AA have been conducted on various text genres and forms, such as news articles [15,38], poetry [28], Tweets [16][17][18][19], and classical Arabic texts [14,[20][21][22].…”
Section: Related Workmentioning
confidence: 99%
“…The SVM outperformed other classifiers, achieving the highest accuracy, 68.67%, on the combined feature set. In another study, Altakrori et al [17] adapted an event visualization tool with Arabic tweets. The researchers compared the profile-based approach based on n-grams as features with instance-based classification techniques using the random forests, SVM, naïve Bayes, and decision trees classification methods with stylometric features.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…People hide their identities when posting sensitive information [13][14][15]. The delinquents usually masked their identities across multiple networks to circumvent the prowess of text-mining methods [16][17][18]. In addition, the use of proxy internet addresses, hashtags, mentioning of people in texts, and reposting of texts written by others is a common phenomenon [7,12,16].…”
Section: Introductionmentioning
confidence: 99%