Author of the publication

Writeprints: A stylometric approach to identity-level identification and similarity detection in cyberspace.

, and . ACM Trans. Inf. Syst., 26 (2): 7:1-7:29 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Twitter Sentiment Analysis: A Bootstrap Ensemble Framework., , and . SocialCom, page 357-364. IEEE Computer Society, (2013)Impact of anti-phishing tool performance on attack success rates., , and . ISI, page 12-17. IEEE, (2012)Enhancing Predictive Analytics for Anti-Phishing by Exploiting Website Genre Information., , , , , and . J. of Management Information Systems, 31 (4): 109-157 (2015)A Framework for Stylometric Similarity Detection in Online Settings., and . AMCIS, page 127. Association for Information Systems, (2007)Detecting Fake Medical Web Sites Using Recursive Trust Labeling., , and . ACM Trans. Inf. Syst., 30 (4): 22:1-22:36 (2012)Writeprints: A stylometric approach to identity-level identification and similarity detection in cyberspace., and . ACM Trans. Inf. Syst., 26 (2): 7:1-7:29 (2008)Social Media Analytics for Smart Health., , , , , , , , , and 5 other author(s). IEEE Intelligent Systems, 29 (2): 60-80 (2014)Affect Analysis of Web Forums and Blogs Using Correlation Ensembles., , , and . IEEE Trans. Knowl. Data Eng., 20 (9): 1168-1180 (2008)Detecting Drug-Drug Interactions using Protein Sequence-Structure Similarity Networks., , , , , and . BIBM, page 3472-3477. IEEE, (2021)Framing Social Movement Identity with Cyber-Artifacts: A Case Study of the International Falun Gong Movement., , and . Security Informatics, volume 9 of Annals of Information Systems, Springer, (2010)