“…More importantly, the plethora of available electronic texts revealed the potential of authorship analysis in various applications (Madigan, Lewis, Argamon, Fradkin, & Ye, 2005) in diverse areas including intelligence (e.g., attribution of messages or proclamations to known terrorists, linking different messages by authorship) (Abbasi & Chen, 2005), criminal law (e.g., identifying writers of harassing messages, verifying the authenticity of suicide notes) and civil law (e.g., copyright disputes) (Chaski, 2005;Grant, 2007), computer forensics (e.g., identifying the authors of source code of malicious software) (Frantzeskou, Stamatatos, Gritzalis, & Katsikas, 2006), in addition to the traditional application to literary research (e.g., attributing anonymous or disputed literary works to known authors) (Burrows, 2002;Hoover, 2004a). Hence, (roughly) the last decade can be viewed as a new era of authorship analysis technology, this time dominated by efforts to develop practical applications dealing with realworld texts (e.g., e-mails, blogs, online forum messages, source code, etc.)…”