2014
DOI: 10.1186/s13388-014-0010-8
|View full text |Cite
|
Sign up to set email alerts
|

Evaluating text visualization for authorship analysis

Abstract: Methods and tools to conduct authorship analysis of web contents is of growing interest to researchers and practitioners in various security-focused disciplines, including cybersecurity, counter-terrorism, and other fields in which authorship of text may at times be uncertain or obfuscated. Here we demonstrate an automated approach for authorship analysis of web contents. Analysis is conducted through the use of machine learning methodologies, an expansive stylometric feature set, and a series of visualization… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 34 publications
0
2
0
Order By: Relevance
“…As observed in Table 2, many studies have been performed on the dark web using content mining techniques only (Abbasi et al , 2008; Benjamin et al , 2013, 2014; Chen, 2008b, 2009; Chen et al , 2008c; Elovici et al , 2004; Endy et al , 2010; Fu et al , 2010; L'Huillier et al , 2010; Prentice et al , 2011; Scanlon, 2014; Simanjuntak et al , 2010; Yang et al , 2009). Some studies have used both structure and content mining techniques to perform feature selection, extraction or topical analysis (Bouchard et al , 2014; Chen, 2008a, b; Fu et al , 2010; Larson and Chen, 2009; Last et al , 2008; Patil et al , 2013; Reid et al , 2005; Zhang et al , 2010; Zhou et al , 2005).…”
Section: Detecting Terrorist/extremists On the Webmentioning
confidence: 99%
“…As observed in Table 2, many studies have been performed on the dark web using content mining techniques only (Abbasi et al , 2008; Benjamin et al , 2013, 2014; Chen, 2008b, 2009; Chen et al , 2008c; Elovici et al , 2004; Endy et al , 2010; Fu et al , 2010; L'Huillier et al , 2010; Prentice et al , 2011; Scanlon, 2014; Simanjuntak et al , 2010; Yang et al , 2009). Some studies have used both structure and content mining techniques to perform feature selection, extraction or topical analysis (Bouchard et al , 2014; Chen, 2008a, b; Fu et al , 2010; Larson and Chen, 2009; Last et al , 2008; Patil et al , 2013; Reid et al , 2005; Zhang et al , 2010; Zhou et al , 2005).…”
Section: Detecting Terrorist/extremists On the Webmentioning
confidence: 99%
“…Social media analytics (SMA) is a rich set of tools and technologies most recently applied to security informatics [2,3]. Traditional domains that SMA is used include business intelligence, online product review analysis, and security informatics [4][5][6].…”
Section: A Social Media Analytics In Security Informaticsmentioning
confidence: 99%