Continuous authentication using writing style

ML Brocardo, I Traore, I Woungang - Biometric-based physical and …, 2019 - Springer
… is to apply authorship analysis technique for continuous user … twitter messages with
301,100 characters per author [49]. All … replaced e-mail and web addresses by meta tags “e-mail” …

TB-CoAuth: Text based continuous authentication for detecting compromised accounts in social networks

R Kaur, S Singh, H Kumar - Applied Soft Computing, 2020 - Elsevier
… focuses on the viability of authorship verification process for the … the task of authorship
verification on short texts and applies text … [7] on e-mail and Twitter data using lexical, syntactic and …

Authorship verification applied to detection of compromised accounts on online social networks: A continuous approach

S Barbon, RA Igawa, B Bogaz Zarpelão - Multimedia Tools and …, 2017 - Springer
… Experiments were carried out using a dataset from Twitter composed by tweets of 1000
users. All the three steps were individually evaluated, and the results show that the developed …

An intrinsic authorship verification technique for compromised account detection in social networks

R Kaur, S Singh, H Kumar - Soft Computing, 2021 - Springer
… of continuous authentication on short texts and applies text … in this work using authorship
verification process which involves … ) performed continuous authentication on e-mail and Twitter

Authorship verification using deep belief network systems

ML Brocardo, I Traore, I Woungang… - International Journal of …, 2017 - Wiley Online Library
… , on the basis of the Twitter and Enron e-mail corpuses. Promising … Continuous authentication
(CA) is a reinforcement of the … of which the merging and selection processes were applied. …

Authorship Authentication of Short Messages from Social Networks Machines

NM Demir, M Can - Southeast Europe Journal of Soft …, 2018 - scjournal.ius.edu.ba
… of authorship attribution for an online social network Twitter … for authorship verification model
of continuous authentication. … feature set and used for e-mail authentication. 71 of them are …

Authorship Authentication of Short Messages from Social Networks Using Recurrent Artificial Neural Networks

NM Demir - Southeast Europe Journal of Soft Computing, 2018 - ask2014.ius.edu.ba
… of authorship attribution for an online social network Twitter … for authorship verification model
of continuous authentication. … feature set and used for e-mail authentication. 72 of them are …

Deep dive into authorship verification of email messages with convolutional neural network

M Litvak - Information Management and Big Data: 5th …, 2019 - Springer
… the problem of authorship verification of short messages, which can be accurately applied on
a “… Experimental evaluation on the Enron email and Twitter datasets produced EER results …

Feature extraction and selection for Arabic tweets authorship authentication

M Al-Ayyoub, Y Jararweh, A Rabab'ah… - Journal of Ambient …, 2017 - Springer
… We then apply the BOW approach to compute the uni-gram features of the … In this work,
the aim is to identify the author of a given tweet based on its content. Three different sets of …

Novel authorship verification model for social media accounts compromised by a human

S Alterkavı, H Erbay - Multimedia Tools and Applications, 2021 - Springer
… On the other hand, the current study introduces a model to verify the authorship of a tweet
by … users were crawled, then each tweet was applied to the cleaning process. After that, …