Publication not explained
This publication has not yet been explained in plain language by the author(s). However, you can still read the publication.
If you are one of the authors, claim this publication so you can create a plain langauage summary to help more people find, understand and use it.
Read the Original
This page is a summary of: Identifying Cyber Predators through Forensic Authorship Analysis of Chat Logs, October 2012, Institute of Electrical & Electronics Engineers (IEEE), DOI: 10.1109/ctc.2012.16.
You can read the full text:
The following have contributed to this page