Forensic analysis of e-mail for authorship attribution: Research perspective
KA Apoorva, S Sangeetha - Proceeding of First Doctoral Symposium on …, 2021 - Springer
E-mail has emerged as an important means of communication. Lots of criminal activities
have been reported using e-mail as a primary source for the scam. Extracting the information …
have been reported using e-mail as a primary source for the scam. Extracting the information …
Authorship verification of opinion articles in online newspapers using the idiolect of author: a comparative study
MA Al-Khatib, JK Al-qaoud - Information, Communication & Society, 2021 - Taylor & Francis
Many approaches have been introduced to solve the authorship verification problem,
including the use of machine learning techniques. These techniques proved to be effective …
including the use of machine learning techniques. These techniques proved to be effective …
[HTML][HTML] Information extraction framework for disability determination using a mental functioning use-case
Natural language processing (NLP) in health care enables transformation of complex
narrative information into high value products such as clinical decision support and adverse …
narrative information into high value products such as clinical decision support and adverse …
Age and gender identification by SMS text messages
In this study, age and gender identification are tried to be predicted from SMS text
messages. 38,588 preprocessed text messages were tested which were written by native …
messages. 38,588 preprocessed text messages were tested which were written by native …
Text-based authorship identification-a survey
The virtual world provides criminals with an anonymous environment to conduct malicious
activities such as mal-ware, sending ransom messages, spamming, theft intellectual …
activities such as mal-ware, sending ransom messages, spamming, theft intellectual …
Autonomic author identification in internet relay chat (IRC)
With the advances in Internet technologies and services, the social media has been gaining
excessive popularity, especially because these technologies provide anonymity where they …
excessive popularity, especially because these technologies provide anonymity where they …
Using Authorship Verification to Mitigate Abuse in Online Communities
J Weerasinghe, R Singh, R Greenstadt - Proceedings of the …, 2022 - ojs.aaai.org
Social media has become an important method for information sharing. This has also
created opportunities for bad actors to easily spread disinformation and manipulate public …
created opportunities for bad actors to easily spread disinformation and manipulate public …
Predictive analysis for text classification: discrete units in company registration discourse
E Więcławska - Białostockie Studia Prawnicze, 2022 - ceeol.com
Legal discourse shows variation most commonly in terms of contrasts between languages,
textual genres, communicative settings (professional vs. lay communication), translation …
textual genres, communicative settings (professional vs. lay communication), translation …
Integrating Bidirectional Long Short-Term Memory with Subword Embedding for Authorship Attribution
A Modupe, T Celik, V Marivate… - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
The problem of unveiling the author of a given text document from multiple candidate
authors is called authorship attribution. Manifold word-based stylistic markers have been …
authors is called authorship attribution. Manifold word-based stylistic markers have been …
Proposed intelligence systems based on digital Forensics
The field of information security, in general, has seen shifts a traditional approach to an
intelligence system. Moreover, an increasing of researchers to focus on propose intelligence …
intelligence system. Moreover, an increasing of researchers to focus on propose intelligence …