Visualizing Authorship for Identification. Abbasi, A. & Chen, H. In Hutchison, D., Kanade, T., Kittler, J., Kleinberg, J. M., Mattern, F., Mitchell, J. C., Naor, M., Nierstrasz, O., Pandu Rangan, C., Steffen, B., Sudan, M., Terzopoulos, D., Tygar, D., Vardi, M. Y., Weikum, G., Mehrotra, S., Zeng, D. D., Chen, H., Thuraisingham, B., & Wang, F., editors, Intelligence and Security Informatics, volume 3975, pages 60–71. Springer Berlin Heidelberg, Berlin, Heidelberg, 2006. Series Title: Lecture Notes in Computer SciencePaper doi bibtex @incollection{hutchison_visualizing_2006,
address = {Berlin, Heidelberg},
title = {Visualizing {Authorship} for {Identification}},
volume = {3975},
isbn = {978-3-540-34478-0 978-3-540-34479-7},
url = {http://link.springer.com/10.1007/11760146_6},
urldate = {2021-08-03},
booktitle = {Intelligence and {Security} {Informatics}},
publisher = {Springer Berlin Heidelberg},
author = {Abbasi, Ahmed and Chen, Hsinchun},
editor = {Hutchison, David and Kanade, Takeo and Kittler, Josef and Kleinberg, Jon M. and Mattern, Friedemann and Mitchell, John C. and Naor, Moni and Nierstrasz, Oscar and Pandu Rangan, C. and Steffen, Bernhard and Sudan, Madhu and Terzopoulos, Demetri and Tygar, Dough and Vardi, Moshe Y. and Weikum, Gerhard and Mehrotra, Sharad and Zeng, Daniel D. and Chen, Hsinchun and Thuraisingham, Bhavani and Wang, Fei-Yue},
year = {2006},
doi = {10.1007/11760146_6},
note = {Series Title: Lecture Notes in Computer Science},
pages = {60--71},
}
Downloads: 0
{"_id":"JKL4qdEnGvwBg8xEg","bibbaseid":"abbasi-chen-visualizingauthorshipforidentification-2006","author_short":["Abbasi, A.","Chen, H."],"bibdata":{"bibtype":"incollection","type":"incollection","address":"Berlin, Heidelberg","title":"Visualizing Authorship for Identification","volume":"3975","isbn":"978-3-540-34478-0 978-3-540-34479-7","url":"http://link.springer.com/10.1007/11760146_6","urldate":"2021-08-03","booktitle":"Intelligence and Security Informatics","publisher":"Springer Berlin Heidelberg","author":[{"propositions":[],"lastnames":["Abbasi"],"firstnames":["Ahmed"],"suffixes":[]},{"propositions":[],"lastnames":["Chen"],"firstnames":["Hsinchun"],"suffixes":[]}],"editor":[{"propositions":[],"lastnames":["Hutchison"],"firstnames":["David"],"suffixes":[]},{"propositions":[],"lastnames":["Kanade"],"firstnames":["Takeo"],"suffixes":[]},{"propositions":[],"lastnames":["Kittler"],"firstnames":["Josef"],"suffixes":[]},{"propositions":[],"lastnames":["Kleinberg"],"firstnames":["Jon","M."],"suffixes":[]},{"propositions":[],"lastnames":["Mattern"],"firstnames":["Friedemann"],"suffixes":[]},{"propositions":[],"lastnames":["Mitchell"],"firstnames":["John","C."],"suffixes":[]},{"propositions":[],"lastnames":["Naor"],"firstnames":["Moni"],"suffixes":[]},{"propositions":[],"lastnames":["Nierstrasz"],"firstnames":["Oscar"],"suffixes":[]},{"propositions":[],"lastnames":["Pandu","Rangan"],"firstnames":["C."],"suffixes":[]},{"propositions":[],"lastnames":["Steffen"],"firstnames":["Bernhard"],"suffixes":[]},{"propositions":[],"lastnames":["Sudan"],"firstnames":["Madhu"],"suffixes":[]},{"propositions":[],"lastnames":["Terzopoulos"],"firstnames":["Demetri"],"suffixes":[]},{"propositions":[],"lastnames":["Tygar"],"firstnames":["Dough"],"suffixes":[]},{"propositions":[],"lastnames":["Vardi"],"firstnames":["Moshe","Y."],"suffixes":[]},{"propositions":[],"lastnames":["Weikum"],"firstnames":["Gerhard"],"suffixes":[]},{"propositions":[],"lastnames":["Mehrotra"],"firstnames":["Sharad"],"suffixes":[]},{"propositions":[],"lastnames":["Zeng"],"firstnames":["Daniel","D."],"suffixes":[]},{"propositions":[],"lastnames":["Chen"],"firstnames":["Hsinchun"],"suffixes":[]},{"propositions":[],"lastnames":["Thuraisingham"],"firstnames":["Bhavani"],"suffixes":[]},{"propositions":[],"lastnames":["Wang"],"firstnames":["Fei-Yue"],"suffixes":[]}],"year":"2006","doi":"10.1007/11760146_6","note":"Series Title: Lecture Notes in Computer Science","pages":"60–71","bibtex":"@incollection{hutchison_visualizing_2006,\n\taddress = {Berlin, Heidelberg},\n\ttitle = {Visualizing {Authorship} for {Identification}},\n\tvolume = {3975},\n\tisbn = {978-3-540-34478-0 978-3-540-34479-7},\n\turl = {http://link.springer.com/10.1007/11760146_6},\n\turldate = {2021-08-03},\n\tbooktitle = {Intelligence and {Security} {Informatics}},\n\tpublisher = {Springer Berlin Heidelberg},\n\tauthor = {Abbasi, Ahmed and Chen, Hsinchun},\n\teditor = {Hutchison, David and Kanade, Takeo and Kittler, Josef and Kleinberg, Jon M. and Mattern, Friedemann and Mitchell, John C. and Naor, Moni and Nierstrasz, Oscar and Pandu Rangan, C. and Steffen, Bernhard and Sudan, Madhu and Terzopoulos, Demetri and Tygar, Dough and Vardi, Moshe Y. and Weikum, Gerhard and Mehrotra, Sharad and Zeng, Daniel D. and Chen, Hsinchun and Thuraisingham, Bhavani and Wang, Fei-Yue},\n\tyear = {2006},\n\tdoi = {10.1007/11760146_6},\n\tnote = {Series Title: Lecture Notes in Computer Science},\n\tpages = {60--71},\n}\n\n","author_short":["Abbasi, A.","Chen, H."],"editor_short":["Hutchison, D.","Kanade, T.","Kittler, J.","Kleinberg, J. M.","Mattern, F.","Mitchell, J. C.","Naor, M.","Nierstrasz, O.","Pandu Rangan, C.","Steffen, B.","Sudan, M.","Terzopoulos, D.","Tygar, D.","Vardi, M. Y.","Weikum, G.","Mehrotra, S.","Zeng, D. D.","Chen, H.","Thuraisingham, B.","Wang, F."],"key":"hutchison_visualizing_2006","id":"hutchison_visualizing_2006","bibbaseid":"abbasi-chen-visualizingauthorshipforidentification-2006","role":"author","urls":{"Paper":"http://link.springer.com/10.1007/11760146_6"},"metadata":{"authorlinks":{}}},"bibtype":"incollection","biburl":"https://api.zotero.org/groups/2535696/items?key=3gRHj8hfOfGJBww9EhlzpL4j&format=bibtex&limit=100","dataSources":["fYpRkmgfP3xRwWzJ6"],"keywords":[],"search_terms":["visualizing","authorship","identification","abbasi","chen"],"title":"Visualizing Authorship for Identification","year":2006}