Follow
Lisa Kaati
Title
Cited by
Cited by
Year
Detecting linguistic markers for radical violence in social media
K Cohen, F Johansson, L Kaati, JC Mork
Terrorism and Political Violence 26 (1), 246-256, 2014
2372014
Harvesting and analysis of weak signals for detecting lone wolf terrorists
J Brynielsson, A Horndahl, F Johansson, L Kaati, C Mårtenson, ...
Security Informatics 2, 1-15, 2013
1322013
Detecting jihadist messages on twitter
M Ashcroft, A Fisher, L Kaati, E Omer, N Prucha
2015 European intelligence and security informatics conference, 161-164, 2015
1052015
Detecting multiple aliases in social media
F Johansson, L Kaati, A Shrestha
Proceedings of the 2013 IEEE/ACM international conference on advances in …, 2013
722013
Detecting social positions using simulation
J Brynielsson, J Högberg, L Kaati, C Mårtenson, P Svenson
2010 International Conference on Advances in Social Networks Analysis and …, 2010
702010
Detecting multipliers of jihadism on twitter
L Kaati, E Omer, N Prucha, A Shrestha
2015 IEEE international conference on data mining workshop (ICDMW), 954-960, 2015
632015
Analysis of weak signals for detecting lone wolf terrorists
J Brynielsson, A Horndahl, F Johansson, L Kaati, C Mårtenson, ...
2012 European Intelligence and Security Informatics Conference, 197-204, 2012
522012
Computing Simulations over Tree Automata: (Efficient Techniques for Reducing Tree Automata)
PA Abdulla, A Bouajjani, L Holík, L Kaati, T Vojnar
Tools and Algorithms for the Construction and Analysis of Systems: 14th …, 2008
522008
Linguistic analysis of lone offender manifestos
L Kaati, A Shrestha, K Cohen
2016 IEEE international conference on cybercrime and computer forensic …, 2016
492016
Political bots and the Swedish general election
J Fernquist, L Kaati, R Schroeder
2018 ieee international conference on intelligence and security informatics …, 2018
452018
Detecting key players in terrorist networks
A Berzinji, L Kaati, A Rezine
2012 European Intelligence and Security Informatics Conference, 297-302, 2012
422012
Bisimulation minimization of tree automata
PA Abdulla, L Kaati, J Högberg
Implementation and Application of Automata: 11th International Conference …, 2006
392006
Measuring online affects in a white supremacy forum
L Figea, L Kaati, R Scrivens
2016 IEEE conference on intelligence and security informatics (ISI), 85-90, 2016
382016
Timeprints for identifying social media users with multiple aliases
F Johansson, L Kaati, A Shrestha
Security Informatics 4 (1), 1-11, 2015
352015
Identifying warning behaviors of violent lone offenders in written communication
L Kaati, A Shrestha, T Sardella
2016 IEEE 16th international conference on data mining workshops (ICDMW …, 2016
272016
Detecting linguistic markers of violent extremism in online environments
F Johansson, L Kaati, M Sahlgren
Artificial intelligence: Concepts, methodologies, tools, and applications …, 2017
262017
Combining entity matching techniques for detecting extremist behavior on discussion boards
J Dahlin, F Johansson, L Kaati, C Mårtenson, P Svenson
2012 IEEE/ACM International Conference on Advances in Social Networks …, 2012
252012
Analysis of competing hypothesis for investigating lone wolf terrorist
L Kaati, P Svenson
2011 European Intelligence and Security Informatics Conference, 295-299, 2011
242011
Development of computerized support tools for intelligence work
J Brynielsson, A Horndahl, L Kaati, C Mårtenson, P Svenson
14th International Command and Control Research and Technology Symposium …, 2009
242009
Time profiles for identifying users in online environments
F Johansson, L Kaati, A Shrestha
2014 IEEE Joint Intelligence and Security Informatics Conference, 83-90, 2014
222014
The system can't perform the operation now. Try again later.
Articles 1–20