共 32 条
[2]
Alhuqail NK., 2021, Eur. J. Comput. Sci. Info. Tech, V9, P1
[3]
Ali N., 2014, Academy of Science and Engineering[C]., V42, P67
[4]
Identifying Cyber Predators through Forensic Authorship Analysis of Chat Logs
[J].
2012 THIRD CYBERCRIME AND TRUSTWORTHY COMPUTING WORKSHOP (CTC 2012),
2012,
:28-37
[5]
[Anonymous], 2006, P INT C EMP METH NAT
[6]
[Anonymous], 2014, Information Access Evaluation. Multilinguality, Multimodality, and Interaction
[7]
Baayen H., 1996, Literary & Linguistic Computing, V11, P121, DOI 10.1093/llc/11.3.121
[9]
de Vel O, 2001, SIGMOD REC, V30, P55, DOI 10.1145/604264.604272
[10]
De Vel O, 2001, PROC WORKSHOP DATA M