Kathleen M. Carley

Orcid: 0000-0002-6356-0238

Affiliations:
  • Carnegie Mellon University, Pittsburgh, USA


According to our database1, Kathleen M. Carley authored at least 335 papers between 1995 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Awards

IEEE Fellow

IEEE Fellow 2014, "For contributions to multi-dimensional human and cyber dynamic networks".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Duped by Bots: Why Some are Better than Others at Detecting Fake Social Media Personas.
Hum. Factors, January, 2024

An Exploratory Analysis of COVID Bot vs Human Disinformation Dissemination stemming from the Disinformation Dozen on Telegram.
CoRR, 2024

Detection and Discovery of Misinformation Sources using Attributed Webgraphs.
CoRR, 2024

Cyborgs for strategic communication on social media.
Big Data Soc., 2024

2023
Assembling a multi-platform ensemble social bot detector with applications to US 2020 elections.
Soc. Netw. Anal. Min., December, 2023

Gender dynamics on Twitter during the 2020 U.S. Democratic presidential primary.
Soc. Netw. Anal. Min., December, 2023

Investigating coordinated account creation using burst detection and network analysis.
J. Big Data, December, 2023

Deflating the Chinese balloon: types of Twitter bots in US-China balloon incident.
EPJ Data Sci., December, 2023

A high-dimensional approach to measuring online polarization.
J. Comput. Soc. Sci., October, 2023

Coordinating Narratives Framework for cross-platform analysis in the 2021 US Capitol riots.
Comput. Math. Organ. Theory, September, 2023

Pro or Anti? A Social Influence Model of Online Stance Flipping.
IEEE Trans. Netw. Sci. Eng., 2023

Identifying cross-platform user relationships in 2020 U.S. election fraud and protest discussions.
Online Soc. Networks Media, 2023

Comparison of Online Maneuvers by Authentic and Inauthentic Local News Organizations.
CoRR, 2023

Simulating the social influence in transport mode choices.
CoRR, 2023

Identity Construction in a Misogynist Incels Forum.
CoRR, 2023

Identity-Based Attribute Prototypes Distinguish Communities on Twitter.
CoRR, 2023

A combined synchronization index for evaluating collective action social media.
Appl. Netw. Sci., 2023

Two Stage Job Title Identification System for Online Job Advertisements.
IEEE Access, 2023

Beyond Accuracy: Cybersecurity Resilience Evaluation Of Intrusion Detection System Against Dos Attacks Using Agent-Based Simulation.
Proceedings of the Winter Simulation Conference, 2023

Simulating the Social Influence in Transport Mode Choices.
Proceedings of the Winter Simulation Conference, 2023

Purpose in the Machine: Do Traffic Simulators Produce Distributionally Equivalent Outcomes for Reinforcement Learning Applications?
Proceedings of the Winter Simulation Conference, 2023

Agent-Based Moral Interaction Simulations in Imbalanced Polarized Settings.
Proceedings of the Social, Cultural, and Behavioral Modeling, 2023

Integrating Human Factors into Agent-Based Simulation for Dynamic Phishing Susceptibility.
Proceedings of the Social, Cultural, and Behavioral Modeling, 2023

Simulating Transport Mode Choices in Developing Countries.
Proceedings of the Social, Cultural, and Behavioral Modeling, 2023

Pandemic Personas: Analyzing Identity Signals in COVID-19 Discourse on Twitter.
Proceedings of the Social, Cultural, and Behavioral Modeling, 2023

Chirping Diplomacy: Analyzing Chinese State Social-Cyber Maneuvers on Twitter.
Proceedings of the Social, Cultural, and Behavioral Modeling, 2023

Social Cybersecurity Analysis of the Telegram Information Environment During the 2022 Invasion of Ukraine.
Proceedings of the Social, Cultural, and Behavioral Modeling, 2023

Tracking China's Cross-Strait Bot Networks Against Taiwan.
Proceedings of the Social, Cultural, and Behavioral Modeling, 2023

Vulnerability Dictionary: Language Use During Times of Crisis and Uncertainty.
Proceedings of the Social, Cultural, and Behavioral Modeling, 2023

Simulation of Stance Perturbations.
Proceedings of the Social, Cultural, and Behavioral Modeling, 2023

BotBuster: Multi-Platform Bot Detection Using a Mixture of Experts.
Proceedings of the Seventeenth International AAAI Conference on Web and Social Media, 2023

Contextualizing Online Conversational Networks.
Proceedings of the Seventeenth International AAAI Conference on Web and Social Media, 2023

Improved Change Detection in Longitudinal Social Network Measures Subject to Pattern-of-Life Variations.
Proceedings of the Complex Networks & Their Applications XII, 2023

An Agent-Based Model of Reddit Interactions and Moderation.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2023

Modeling and Simulation of the Human Firewall Against Phishing Attacks in Small and Medium-Sized Businesses.
Proceedings of the Annual Modeling and Simulation Conference, 2023

A Weakly Supervised Classifier and Dataset of White Supremacist Language.
Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics (Volume 2: Short Papers), 2023

2022
Operation gridlock: opposite sides, opposite strategies.
J. Comput. Soc. Sci., May, 2022

Cross-platform information spread during the January 6th capitol riots.
Soc. Netw. Anal. Min., 2022

From curious hashtags to polarized effect: profiling coordinated actions in indonesian twitter discourse.
Soc. Netw. Anal. Min., 2022

How disinformation operations against Russian opposition leader Alexei Navalny influence the international audience on Twitter.
Soc. Netw. Anal. Min., 2022

Stabilizing a supervised bot detection algorithm: How much data is needed for consistent predictions?
Online Soc. Networks Media, 2022

The language and targets of online trolling: A psycholinguistic approach for social cybersecurity.
Inf. Process. Manag., 2022

Is my stance the same as your stance? A cross validation study of stance detection datasets.
Inf. Process. Manag., 2022

Mapping state-sponsored information operations with multi-view modularity clustering.
EPJ Data Sci., 2022

A Combined Synchronization Index for Grassroots Activism on Social Media.
CoRR, 2022

Coordinated through aWeb of Images: Analysis of Image-based Influence Operations from China, Iran, Russia, and Venezuela.
CoRR, 2022

Hoaxes and Hidden agendas: A Twitter Conspiracy Theory Dataset: Data Paper.
Proceedings of the Companion of The Web Conference 2022, Virtual Event / Lyon, France, April 25, 2022

Online Coordination: Methods and Comparative Case Studies of Coordinated Groups across Four Events in the United States.
Proceedings of the WebSci '22: 14th ACM Web Science Conference 2022, Barcelona, Spain, June 26, 2022

Linguistic and News-Sharing Polarization During the 2019 South American Protests.
Proceedings of the Social Informatics - 13th International Conference, 2022

Frames and Their Affective Dimensions: A Case Study of Climate Change News Articles.
Proceedings of the Social, Cultural, and Behavioral Modeling, 2022

OSIRIS: Organization Simulation in Response to Intrusion Strategies.
Proceedings of the Social, Cultural, and Behavioral Modeling, 2022

Competing State and Grassroots Opposition Influence in the 2021 Hong Kong Election.
Proceedings of the Social, Cultural, and Behavioral Modeling, 2022

#WhoDefinesDemocracy: Analysis on a 2021 Chinese Messaging Campaign.
Proceedings of the Social, Cultural, and Behavioral Modeling, 2022

The Missing Link Between User Engagement and Misinformation's Impact on Online Behavior.
Proceedings of the Social, Cultural, and Behavioral Modeling, 2022

Coordinated through a Web of Images: Analysis of Image-based Influence Operations from China, Iran, Russia, and Venezuela.
Proceedings of the Workshop Proceedings of the 16th International AAAI Conference on Web and Social Media, 2022

Education Path: Student orientation based on the job market needs.
Proceedings of the IEEE Global Engineering Education Conference, 2022

How Hate Speech Varies by Target Identity: A Computational Analysis.
Proceedings of the 26th Conference on Computational Natural Language Learning, 2022

Investigating the Spread of Russian Disinformation about Biolabs in Ukraine on Twitter Using Social Network Analysis.
Proceedings of the IEEE International Conference on Big Data, 2022

TSPA: Efficient Target-Stance Detection on Twitter.
Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2022

2021
Measuring Node Contribution to Community Structure With Modularity Vitality.
IEEE Trans. Netw. Sci. Eng., 2021

Heated conversations in a warming world: affective polarization in online climate change discourse follows real-world climate anomalies.
Soc. Netw. Anal. Min., 2021

Multi-modal Networks Reveal Patterns of Operational Similarity of Terrorist Organizations.
CoRR, 2021

Coordinating Narratives and the Capitol Riots on Parler.
CoRR, 2021

Climate Change Conspiracy Theories on Social Media.
CoRR, 2021

Flipping Stance: Social Influence on Bot's and Non Bot's COVID Vaccine Stance.
CoRR, 2021

A Synchronized Action Framework for Responsible Detection of Coordination on Social Media.
CoRR, 2021

Learning future terrorist targets through temporal meta-graphs.
CoRR, 2021

Exploring Polarization of Users Behavior on Twitter During the 2019 South American Protests.
CoRR, 2021

The Coronavirus is a Bioweapon: Analysing Coronavirus Fact-Checked Stories.
CoRR, 2021

A Weakly Supervised Approach for Classifying Stance in Twitter Replies.
CoRR, 2021

Active, aggressive, but to little avail: characterizing bot activity during the 2020 Singaporean elections.
Comput. Math. Organ. Theory, 2021

"The coronavirus is a bioweapon": classifying coronavirus stories on fact-checking sites.
Comput. Math. Organ. Theory, 2021

An anatomical comparison of fake-news and trusted-news sharing pattern on Twitter.
Comput. Math. Organ. Theory, 2021

Deceptive accusations and concealed identities as misinformation campaign strategies.
Comput. Math. Organ. Theory, 2021

Characterizing network dynamics of online hate communities around the COVID-19 pandemic.
Appl. Netw. Sci., 2021

Towards a network theory of regulatory burden.
Appl. Netw. Sci., 2021

Optimizing Adaptation of Smart Traffic Lights with Resource Constraints.
Proceedings of the 7th IEEE World Forum on Internet of Things, 2021

Mainstream Consensus and the Expansive Fringe: Characterizing the Polarized Information Ecosystems of Online Climate Change Discourse.
Proceedings of the WebSci '21: 13th ACM Web Science Conference 2021, 2021

An Identity-Based Framework for Generalizable Hate Speech Detection.
Proceedings of the Social, Cultural, and Behavioral Modeling, 2021

Mining Online Social Media to Drive Psychologically Valid Agent Models of Regional Covid-19 Mask Wearing.
Proceedings of the Social, Cultural, and Behavioral Modeling, 2021

Bot-Based Emotion Behavior Differences in Images During Kashmir Black Day Event.
Proceedings of the Social, Cultural, and Behavioral Modeling, 2021

Simulating Social-Cyber Maneuvers to Deter Disinformation Campaigns.
Proceedings of the Social, Cultural, and Behavioral Modeling, 2021

Computational Analysis of Bot Activity in the Asia-Pacific: A Comparative Study of Four National Elections.
Proceedings of the Fifteenth International AAAI Conference on Web and Social Media, 2021

Influencing the Influencers: Evaluating Person-to-Person Influence on Social Networks Using Granger Causality.
Proceedings of the Complex Networks & Their Applications X - Volume 2, Proceedings of the Tenth International Conference on Complex Networks and Their Applications COMPLEX NETWORKS 2021, Madrid, Spain, November 30, 2021

Internet Trolls against Russian Opposition: A Case Study Analysis of Twitter Disinformation Campaigns against Alexei Navalny.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

Conversations around organizational risk and insider threat.
Proceedings of the ASONAM '21: International Conference on Advances in Social Networks Analysis and Mining, Virtual Event, The Netherlands, November 8, 2021

Skill mismatch evidence for Cybersecurity skills in Morocco.
Proceedings of the 12th International Conference on Ambient Systems, 2021

2020
Attentive Stacked Denoising Autoencoder With Bi-LSTM for Personalized Context-Aware Citation Recommendation.
IEEE ACM Trans. Audio Speech Lang. Process., 2020

Exploring the stability of communication network metrics in a dynamic nursing context.
Soc. Networks, 2020

Bots and online hate during the COVID-19 pandemic: case studies in the United States and the Philippines.
J. Comput. Soc. Sci., 2020

The evolution of political memes: Detecting and characterizing internet memes with multi-modal deep learning.
Inf. Process. Manag., 2020

Social Cybersecurity Chapter 13: Casestudy with COVID-19 Pandemic.
CoRR, 2020

Bot-Match: Social Bot Detection with Recursive Nearest Neighbors Search.
CoRR, 2020

Disinformation and Misinformation on Twitter during the Novel Coronavirus Outbreak.
CoRR, 2020

Stance in Replies and Quotes (SRQ): A New Dataset For Learning Stance in Twitter Conversations.
CoRR, 2020

Discover Your Social Identity from What You Tweet: a Content Based Approach.
CoRR, 2020

Modularity-Deltas: a Semi-Global Centrality Measure for Complex Networks.
CoRR, 2020

Interoperable pipelines for social cyber-security: assessing Twitter information operations during NATO Trident Juncture 2018.
Comput. Math. Organ. Theory, 2020

The collapse of the second Yatsenyuk government: roll call vote and dynamic network analysis.
Comput. Math. Organ. Theory, 2020

Detecting malware communities using socio-cultural cognitive mapping.
Comput. Math. Organ. Theory, 2020

Social cybersecurity: an emerging science.
Comput. Math. Organ. Theory, 2020

The best of SBP-BRiMS.
Comput. Math. Organ. Theory, 2020

Characterizing communities of hashtag usage on twitter during the 2020 COVID-19 pandemic by multi-view clustering.
Appl. Netw. Sci., 2020

Analysis of Malware Communities Using Multi-Modal Features.
IEEE Access, 2020

A Computational Analysis of Polarization on Indian and Pakistani Social Media.
Proceedings of the Social Informatics - 12th International Conference, 2020

Clustering Analysis of Website Usage on Twitter During the COVID-19 Pandemic.
Proceedings of the Information Management and Big Data, 2020

Bot Impacts on Public Sentiment and Community Structures: Comparative Analysis of Three Elections in the Asia-Pacific.
Proceedings of the Social, Cultural, and Behavioral Modeling, 2020

Polarizing Tweets on Climate Change.
Proceedings of the Social, Cultural, and Behavioral Modeling, 2020

Modeling Interventions for Insider Threat.
Proceedings of the Social, Cultural, and Behavioral Modeling, 2020

Characterizing Sociolinguistic Variation in the Competing Vaccination Communities.
Proceedings of the Social, Cultural, and Behavioral Modeling, 2020

Artifacts of Crisis: Textual Analysis of Euromaidan.
Proceedings of the Social, Cultural, and Behavioral Modeling, 2020

Canadian Federal Election and Hashtags that Do Not Belong.
Proceedings of the Social, Cultural, and Behavioral Modeling, 2020

Lying About Lying on Social Media: A Case Study of the 2019 Canadian Elections.
Proceedings of the Social, Cultural, and Behavioral Modeling, 2020

Towards Agent Validation of a Military Cyber Team Performance Simulation.
Proceedings of the Social, Cultural, and Behavioral Modeling, 2020

Characterizing COVID-19 Misinformation Communities Using a Novel Twitter Dataset.
Proceedings of the CIKM 2020 Workshops co-located with 29th ACM International Conference on Information and Knowledge Management (CIKM 2020), 2020

Affective Polarization in Online Climate Change Discourse on Twitter.
Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2020

Graph-Hist: Graph Classification from Latent Feature Histograms with Application to Bot Detection.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
Location Order Recovery in Trails with Low Temporal Resolution.
IEEE Trans. Netw. Sci. Eng., 2019

Analytic Models of Roll Call Voting Dynamics.
IEEE Trans. Comput. Soc. Syst., 2019

Building a soft skill taxonomy from job openings.
Soc. Netw. Anal. Min., 2019

Misinformation in Social Media: Definition, Manipulation, and Detection.
SIGKDD Explor., 2019

Pairwise similarity of jihadist groups in target and weapon transitions.
J. Comput. Soc. Sci., 2019

Different Faces of False: The Spread and Curtailment of False Information in the <i>Black Panther</i> Twitter Discussion.
ACM J. Data Inf. Qual., 2019

Inductive Graph Representation Learning with Recurrent Graph Neural Networks.
CoRR, 2019

Its all in a name: detecting and labeling bots by their name.
Comput. Math. Organ. Theory, 2019

Community-based time segmentation from network snapshots - Streaming and holistic approaches for semi-static and dynamic nodesets.
Appl. Netw. Sci., 2019

A complex networks approach to find latent clusters of terrorist groups.
Appl. Netw. Sci., 2019

Agent Based Simulation of Bot Disinformation Maneuvers in Twitter.
Proceedings of the 2019 Winter Simulation Conference, 2019

Simulating Complex Social-Behavioral Systems.
Proceedings of the 2019 Spring Simulation Conference, 2019

Characterizing Bot Networks on Twitter: An Empirical Analysis of Contentious Issues in the Asia-Pacific.
Proceedings of the Social, Cultural, and Behavioral Modeling, 2019

Characterizing Organizational Micro-climates in Structural Groups.
Proceedings of the Social, Cultural, and Behavioral Modeling, 2019

Detecting Disruption: Identifying Structural Changes in the Verkhovna Rada.
Proceedings of the Social, Cultural, and Behavioral Modeling, 2019

Syntax-Aware Aspect Level Sentiment Classification with Graph Attention Networks.
Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing, 2019

A Hierarchical Location Prediction Neural Network for Twitter User Geolocation.
Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing, 2019

Analyzing Cybersecurity Job Market Needs in Morocco by Mining Job Ads.
Proceedings of the IEEE Global Engineering Education Conference, 2019

What to track on the Twitter streaming API?: a knapsack bandits approach to dynamically update the search terms.
Proceedings of the ASONAM '19: International Conference on Advances in Social Networks Analysis and Mining, 2019

A large-scale empirical study of geotagging behavior on Twitter.
Proceedings of the ASONAM '19: International Conference on Advances in Social Networks Analysis and Mining, 2019

Tree LSTMs with Convolution Units to Predict Stance and Rumor Veracity in Social Media Conversations.
Proceedings of the 57th Conference of the Association for Computational Linguistics, 2019

2018
ORA: A Toolkit for Dynamic Network Analysis and Visualization.
Proceedings of the Encyclopedia of Social Network Analysis and Mining, 2nd Edition, 2018

A Socio-Computational Approach to Predicting Bioweapon Proliferation.
IEEE Trans. Comput. Soc. Syst., 2018

Remote assessment of countries' cyber weapon capabilities.
Soc. Netw. Anal. Min., 2018

On the Evolution of Spreading Processes in Complex Networks.
CoRR, 2018

Mining online communities to inform strategic messaging: practical methods to identify community-level insights.
Comput. Math. Organ. Theory, 2018

Legislative Voting Dynamics in Ukraine.
Proceedings of the Social, Cultural, and Behavioral Modeling, 2018

People2Vec: Learning Latent Representations of Users Using Their Social-Media Activities.
Proceedings of the Social, Cultural, and Behavioral Modeling, 2018

Aspect Level Sentiment Classification with Attention-over-Attention Neural Networks.
Proceedings of the Social, Cultural, and Behavioral Modeling, 2018

A Computational Model of Cyber Situational Awareness.
Proceedings of the Social, Cultural, and Behavioral Modeling, 2018

Social Cyber-Security.
Proceedings of the Social, Cultural, and Behavioral Modeling, 2018

Complex Networks for Terrorist Target Prediction.
Proceedings of the Social, Cultural, and Behavioral Modeling, 2018

Using Random String Classification to Filter and Annotate Automated Accounts.
Proceedings of the Social, Cultural, and Behavioral Modeling, 2018

Beaten Up on Twitter? Exploring Fake News and Satirical Responses During the Black Panther Movie Event.
Proceedings of the Social, Cultural, and Behavioral Modeling, 2018

Dynamic Network Analytics: Tutorial Outline.
Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, 2018

The Science of Social Cyber-Security.
Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, 2018

StepDeep: A Novel Spatial-temporal Mobility Event Prediction Framework based on Deep Neural Network.
Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2018

Towards Group-Activities Based Community Detection.
Proceedings of the 2018 ACM International Joint Conference and 2018 International Symposium on Pervasive and Ubiquitous Computing and Wearable Computers, 2018

Parameterized Convolutional Neural Networks for Aspect Level Sentiment Classification.
Proceedings of the 2018 Conference on Empirical Methods in Natural Language Processing, Brussels, Belgium, October 31, 2018

Analyzing the needs of the offshore sector in Morocco by mining job ads.
Proceedings of the 2018 IEEE Global Engineering Education Conference, 2018

Detecting Latent Terrorist Communities Testing a Gower's Similarity-Based Clustering Algorithm for Multi-partite Networks.
Proceedings of the Complex Networks and Their Applications VII, 2018

Bot Conversations are Different: Leveraging Network Metrics for Bot Detection in Twitter.
Proceedings of the IEEE/ACM 2018 International Conference on Advances in Social Networks Analysis and Mining, 2018

2017
Sociocultural Models of Nuclear Deterrence.
IEEE Trans. Comput. Soc. Syst., 2017

Scalable computational techniques for centrality metrics on temporally detailed social network.
Mach. Learn., 2017

The Power of Social Cognition.
J. Soc. Struct., 2017

Towards Network Science Enhanced Cyber Situational Awareness.
Int. J. Cyber Situational Aware., 2017

Efficient Online Inference for Infinite Evolutionary Cluster models with Applications to Latent Social Event Discovery.
CoRR, 2017

A Probabilistic Framework for Location Inference from Social Media.
CoRR, 2017

Reporting a network's most-central actor with a confidence level.
Comput. Math. Organ. Theory, 2017

Simulating DDOS attacks on the us fiber-optics internet infrastructure.
Proceedings of the 2017 Winter Simulation Conference, 2017

Event-Based Model Simulating the Change in DDoS Attack Trends After P/DIME Events.
Proceedings of the Social, Cultural, and Behavioral Modeling, 2017

Socio-Cultural Cognitive Mapping.
Proceedings of the Social, Cultural, and Behavioral Modeling, 2017

On Predicting Geolocation of Tweets Using Convolutional Neural Networks.
Proceedings of the Social, Cultural, and Behavioral Modeling, 2017

Cyber-FIT: An Agent-Based Modelling Approach to Simulating Cyber Warfare.
Proceedings of the Social, Cultural, and Behavioral Modeling, 2017

A Probabilistic Geographical Aspect-Opinion Model for Geo-Tagged Microblogs.
Proceedings of the 2017 IEEE International Conference on Data Mining, 2017

Global Variation in Attack Encounters and Hosting.
Proceedings of the Hot Topics in Science of Security: Symposium and Bootcamp, HoTSoS 2017, 2017

Girls Rule, Boys Drool: Extracting Semantic and Affective Stereotypes from Twitter.
Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, 2017

RATE: Overcoming Noise and Sparsity of Textual Features in Real-Time Location Estimation.
Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 2017

The Role of Different Tie Strength in Disseminating Different Topics on a Microblog.
Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017, Sydney, Australia, July 31, 2017

2016
Longitudinal analysis of a large corpus of cyber threat descriptions.
J. Comput. Virol. Hacking Tech., 2016

Exploring characteristics of suspended users and network stability on Twitter.
Soc. Netw. Anal. Min., 2016

Inadvertent leaks: exploration via agent-based dynamic network simulation.
Comput. Math. Organ. Theory, 2016

Exploring Patterns of Identity Usage in Tweets: A New Problem, Solution and Case Study.
Proceedings of the 25th International Conference on World Wide Web, 2016

An agent-based approach to human migration movement.
Proceedings of the Winter Simulation Conference, 2016

An Agent-Based Framework for Active Multi-level Modeling of Organizations.
Proceedings of the Social, Cultural, and Behavioral Modeling, 9th International Conference, 2016

Contextual Sentiment Analysis.
Proceedings of the Social, Cultural, and Behavioral Modeling, 9th International Conference, 2016

From Tweets to Intelligence: Understanding the Islamic Jihad Supporting Community on Twitter.
Proceedings of the Social, Cultural, and Behavioral Modeling, 9th International Conference, 2016

Approaches to understanding the motivations behind cyber attacks.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016

Understanding DDoS cyber-attacks using social media analytics.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016

DDoS cyber-attacks network: Who's attacking whom.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016

The impact of US cyber policies on cyber-attacks trend.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016

Microblog Sentiment Topic Model.
Proceedings of the IEEE International Conference on Data Mining Workshops, 2016

A new approach to bot detection: Striking the balance between precision and recall.
Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2016

Relating semantic similarity and semantic association to how humans label other people.
Proceedings of the First Workshop on NLP and Computational Social Science, 2016

High-dimensional network analytics: mapping topic networks in Twitter data during the Arab Spring.
Proceedings of the Big Data over Networks, 2016

2015
Measuring Temporal Patterns in Dynamic Social Networks.
ACM Trans. Knowl. Discov. Data, 2015

Remote assessment of countries' nuclear, biological, and cyber capabilities: joint motivation and latent capability approach.
Soc. Netw. Anal. Min., 2015

Agent-based modelling of quality management effects on organizational productivity.
J. Simulation, 2015

A dynamic network analytic perspective on the state of computational social science.
Inf. Knowl. Syst. Manag., 2015

Spatiotemporal Network Analysis and Visualization.
Int. J. Appl. Geospat. Res., 2015

An agent-based model of edit wars in wikipedia: how and when is consensus reached.
Proceedings of the 2015 Winter Simulation Conference, 2015

A Bayesian Graphical Model to Discover Latent Events from Twitter.
Proceedings of the Ninth International Conference on Web and Social Media, 2015

Culture, Networks, Twitter and foursquare: Testing a Model of Cultural Conversion with Social Media Data.
Proceedings of the Ninth International Conference on Web and Social Media, 2015

An empirical study of global malware encounters.
Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 2015

The Fragility of Twitter Social Networks Against Suspended Users.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

2014
ORA: A Toolkit for Dynamic Network Analysis and Visualization.
Encyclopedia of Social Network Analysis and Mining, 2014

Social Network Modeling and Agent-Based Simulation in Support of Crisis De-Escalation.
IEEE Trans. Syst. Man Cybern. Syst., 2014

Check-ins in "Blau Space": Applying Blau's Macrosociological Theory to Foursquare Check-ins from New York City.
ACM Trans. Intell. Syst. Technol., 2014

An incremental algorithm for updating betweenness centrality and k-betweenness centrality and its performance on realistic dynamic social network data.
Soc. Netw. Anal. Min., 2014

Arab Spring: from newspaper.
Soc. Netw. Anal. Min., 2014

Embassies burning: toward a near-real-time assessment of social media using geo-temporal dynamic network analytics.
Soc. Netw. Anal. Min., 2014

Spam diffusion in a social network initiated by hacked e-mail accounts.
Int. J. Secur. Networks, 2014

Multi-disciplinary communication networks for skin risk assessment in nursing homes with high IT sophistication.
Int. J. Medical Informatics, 2014

Comparing hiring strategies in a committee with similarity biases.
Comput. Math. Organ. Theory, 2014

Two 1%s Don't Make a Whole: Comparing Simultaneous Samples from Twitter's Streaming API.
Proceedings of the Social Computing, Behavioral-Cultural Modeling and Prediction, 2014

An approach to selecting keywords to track on twitter during a disaster.
Proceedings of the 11th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2014

2013
Modeling and Simulating Command and Control - For Organizations Under Extreme Situations.
Springer Briefs in Computer Science, Springer, ISBN: 978-1-4471-5037-4, 2013

Extraction of Spatio-Temporal Data for Social Networks.
Proceedings of the Influence of Technology on Social Network Analysis and Mining, 2013

Validating Agent Interactions in Construct Against Empirical Communication Networks Using the Calibrated Grounding Technique.
IEEE Trans. Syst. Man Cybern. Syst., 2013

Network text analysis of conceptual overlap in interviews, newspaper articles and keywords.
Soc. Netw. Anal. Min., 2013

Extracting ordinal temporal trail clusters in networks using symbolic time-series analysis.
Soc. Netw. Anal. Min., 2013

Combination of Empirical Study with Qualitative Simulation for Optimization Problem in Mobile Banking Adoption.
J. Artif. Soc. Soc. Simul., 2013

Cosmopolis: A Massively Multiplayer Online Game for Social and Behavioral Research.
J. Artif. Soc. Soc. Simul., 2013

Monitoring social centrality for peer-to-peer network protection.
IEEE Commun. Mag., 2013

An Agent-Based Model for Simultaneous Phone and SMS Traffic over Time.
Proceedings of the Social Computing, Behavioral-Cultural Modeling and Prediction, 2013

Is the Sample Good Enough? Comparing Data from Twitter's Streaming API with Twitter's Firehose.
Proceedings of the Seventh International Conference on Weblogs and Social Media, 2013

Incremental algorithm for updating betweenness centrality in dynamically growing networks.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013

Incremental closeness centrality for dynamically changing social networks.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013

Near real time assessment of social media using geo-temporal network analytics.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013

2012
What if wireless routers were social? approaching wireless mesh networks from a social networks perspective.
IEEE Wirel. Commun., 2012

Toward Automated Definition Acquisition From Operations Law.
IEEE Trans. Syst. Man Cybern. Part C, 2012

Trends in science networks: understanding structures and statistics of scientific networks.
Soc. Netw. Anal. Min., 2012

Network Text Analysis in Computer-Intensive Rapid Ethnography Retrieval: An Example from Political Networks of Sudan.
J. Soc. Struct., 2012

Analyzing scientific networks for nuclear capabilities assessment.
J. Assoc. Inf. Sci. Technol., 2012

Rapid modeling and analyzing networks extracted from pre-structured news articles.
Comput. Math. Organ. Theory, 2012

Structure of ethnic violence in Sudan: a semi-automated network analysis of online news (2003-2010).
Comput. Math. Organ. Theory, 2012

Extracting socio-cultural networks of the Sudan from open-source, large-scale text data.
Comput. Math. Organ. Theory, 2012

Data-to-model: a mixed initiative approach for rapid ethnographic assessment.
Comput. Math. Organ. Theory, 2012

k-Centralities: local approximations of global measures based on shortest paths.
Proceedings of the 21st World Wide Web Conference, 2012

The impact of component interconnections on software quality: A network analysis approach.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2012

Assessing team performance from a socio-technical congruence perspective.
Proceedings of the 2012 International Conference on Software and System Process, 2012

Who was Where, When? Spatiotemporal Analysis of Researcher Mobility in Nuclear Science.
Proceedings of the Workshops Proceedings of the IEEE 28th International Conference on Data Engineering, 2012

Beyond "local", "categories" and "friends": clustering foursquare users with latent "topics".
Proceedings of the 2012 ACM Conference on Ubiquitous Computing, 2012

Leveraging media repertoires to create new social ties.
Proceedings of the 2012 ACM Conference on Ubiquitous Computing, 2012

2011
Detecting Change in Longitudinal Social Networks.
J. Soc. Struct., 2011

Using ORA to explore the relationship of nursing unit communication to patient safety and quality outcomes.
Int. J. Medical Informatics, 2011

Network sampling and classification: An investigation of network model representations.
Decis. Support Syst., 2011

Measuring CMOT's intellectual structure and its development.
Comput. Math. Organ. Theory, 2011

Leaving us in tiers: can homophily be used to generate tiering effects?
Comput. Math. Organ. Theory, 2011

The communication infrastructure during the learning process in web based collaborative learning systems.
Proceedings of the Web Science 2011, 2011

Tracking commander's intent in dynamic networks.
Proceedings of the MILCOM 2011, 2011

Analyzing social media in escalating crisis situations.
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011

SORASCS: a case study in soa-based platform design for socio-cultural analysis.
Proceedings of the 33rd International Conference on Software Engineering, 2011

Adversarial Behavior in Complex Adaptive Systems: An Overview of ICST's Research on Competitive Adaptation in Militant Networks.
Proceedings of the Engineering Psychology and Cognitive Ergonomics, 2011

2010
Paying Attention to Each Other in Visible Work Communities: Modeling Bursty Systems of Multiple Activity Streams.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

A Methodology for Integrating Network Theory and Topic Modeling and its Application to Innovation Diffusion.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

Relationale Methoden in der Erforschung, Ermittlung und Prävention von Kriminalität.
Proceedings of the Handbuch Netzwerkforschung, 2010

Extraktion relationaler Daten aus Texten.
Proceedings of the Handbuch Netzwerkforschung, 2010

2009
Principles for Effectively Representing Heterogeneous Populations in Multi-agent Simulations.
Proceedings of the Complex Systems in Knowledge-based Environments: Theory, 2009

The Etiology of Social Change.
Top. Cogn. Sci., 2009

An Agent-based Simulation Study for Exploring Organizational Adaptation.
Simul., 2009

Patterns and dynamics of users' behavior and interaction: Network analysis of an online community.
J. Assoc. Inf. Sci. Technol., 2009

Robustness of centrality measures under uncertainty: Examining the role of network topology.
Comput. Math. Organ. Theory, 2009

Computational modeling for reasoning about the social behavior of humans.
Comput. Math. Organ. Theory, 2009

Using Service-oriented Architectures for Socio-Cultural Analysis.
Proceedings of the 21st International Conference on Software Engineering & Knowledge Engineering (SEKE'2009), 2009

The Words of Warcraft: relational text analysis of quests in an MMORPG.
Proceedings of the 2009 DiGRA International Conference: Breaking New Ground: Innovation in Games, 2009

Topological Analysis and Measurements of an Online Chinese Student Social Network.
Proceedings of the Complex Sciences, 2009

Information assurances and threat identification in networked organizations.
Proceedings of the 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2009

He says, she says. Pat says, Tricia says. How much reference resolution matters for entity extraction, relation extraction, and social network analysis.
Proceedings of the 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2009

2008
Clearing the FOG: Fuzzy, overlapping groups for social networks.
Soc. Networks, 2008

Balancing the criticisms: Validating multi-agent models of social systems.
Simul. Model. Pract. Theory, 2008

Conditional random fields for entity extraction and ontological text coding.
Comput. Math. Organ. Theory, 2008

Unsupervised Plan Detection with Factor Graphs.
Proceedings of the Knowledge Discovery from Sensor Data, 2008

Transforming Raw-Email Data into Social-Network Information.
Proceedings of the Intelligence and Security Informatics, 2008

Using Term-Frequency-Inverse-Document Frequency of Email to Detect Change in Social Groups.
Proceedings of the 2008 International Conference on Information & Knowledge Engineering, 2008

Intelligence Database Creation and Analysis: Network-Based Text Analysis versus Human Cognition.
Proceedings of the 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), 2008

Socio-technical congruence: a framework for assessing the impact of technical and work dependencies on software development productivity.
Proceedings of the Second International Symposium on Empirical Software Engineering and Measurement, 2008

Using Latent Semantic Analysis of Email to Detect Change in Social Groups.
Proceedings of The 2008 International Conference on Data Mining, 2008

2007
Description of a method to support public health information management: Organizational network analysis.
J. Biomed. Informatics, 2007

Research Paper: A Longitudinal Social Network Analysis of the Editorial Boards of Medical Informatics and Bioinformatics Journals.
J. Am. Medical Informatics Assoc., 2007

Guest Editors' Introduction: Social Computing.
IEEE Intell. Syst., 2007

Social Computing: From Social Informatics to Social Intelligence.
IEEE Intell. Syst., 2007

Modeling and Simulating Terrorist Networks in Social and Geospatial Dimensions.
IEEE Intell. Syst., 2007

Toward an interoperable dynamic network analysis toolkit.
Decis. Support Syst., 2007

On effectiveness of wiretap programs in mapping social networks.
Comput. Math. Organ. Theory, 2007

Can tools help unify organization theory? Perspectives on the state of computational modeling.
Comput. Math. Organ. Theory, 2007

Evolving multi-agent network structure with organizational learning.
Proceedings of the 2007 Spring Simulation Multiconference, 2007

Self-organizing social and spatial networks under what-if scenarios.
Proceedings of the 6th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2007), 2007

Factoring games to isolate strategic interactions.
Proceedings of the 6th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2007), 2007

Predicting the Impact of an Electronic Health Record on Practice Patterns Using Computational Modeling and Simulation.
Proceedings of the AMIA 2007, 2007

2006
BioWar: Scalable Agent-Based Model of Bioattacks.
IEEE Trans. Syst. Man Cybern. Part A, 2006

On the robustness of centrality measures under conditions of imperfect data.
Soc. Networks, 2006

Evolution of Player Skill in the America's Army Game.
Simul., 2006

Organizational Design and Restructuring in Response to Crises: Lessons from Computational Modeling and Real-World Cases.
Organ. Sci., 2006

The Contingent Effects of Transactive Memory: When Is It More Beneficial to Know What Others Know?
Manag. Sci., 2006

Model alignment of anthrax attack simulations.
Decis. Support Syst., 2006

Destabilization of covert networks.
Comput. Math. Organ. Theory, 2006

Introduction.
Comput. Math. Organ. Theory, 2006

Identification of coordination requirements: implications for the Design of collaboration and awareness tools.
Proceedings of the 2006 ACM Conference on Computer Supported Cooperative Work, 2006

Organizational Network Analysis: A Method to Model Information in Public Health Work.
Proceedings of the AMIA 2006, 2006

Estimating the Near-Term Changes of an Organization with Simulations.
Proceedings of the Interaction and Emergent Phenomena in Societies of Agents, 2006

2005
Sampling algorithms for pure network topologies: a study on the stability and the separability of metric embeddings.
SIGKDD Explor., 2005

Structural Knowledge and Success of Anti-Terrorist Activity: The Downside of Structural Equivalence.
J. Soc. Struct., 2005

Using OrgAhead, a computational modeling program, to improve patient care unit safety and quality outcomes.
Int. J. Medical Informatics, 2005

Special Issue on DataMining Large Scale Temporal Data-Bases: Letter from the Special Issue Editors.
Comput. Math. Organ. Theory, 2005

A Network Analysis Model for Disambiguation of Names in Lists.
Comput. Math. Organ. Theory, 2005

Communication Networks from the Enron Email Corpus "It's Always About the People. Enron is no Different".
Comput. Math. Organ. Theory, 2005

Special Issue on Analyzing Large Scale Networks: The Enron Corpus.
Comput. Math. Organ. Theory, 2005

Some Simple Algorithms for Structural Comparison.
Comput. Math. Organ. Theory, 2005

WIZER: An Automated Intelligent Tool for Model Improvement of Multi-Agent Social-Network Systems.
Proceedings of the Eighteenth International Florida Artificial Intelligence Research Society Conference, 2005

Applying Organizational Network Analysis Techniques to Study Information Use in a Public Health Agency.
Proceedings of the AMIA 2005, 2005

2004
The impact of countermeasure propagation on the prevalence of computer viruses.
IEEE Trans. Syst. Man Cybern. Part B, 2004

Modeling Complex Socio-technical Systems using Multi-Agent Simulation Methods.
Künstliche Intell., 2004

Characterization of defense mechanisms against distributed denial of service attacks.
Comput. Secur., 2004

Going Beyond the Data: Empirical Validation Leading to Grounded Theory.
Comput. Math. Organ. Theory, 2004

Aligning Simulation Models of Smallpox Outbreaks.
Proceedings of the Intelligence and Security Informatics, 2004

The Economic Incentives Of Providing Network Security Services On The Internet Infrastructure.
Proceedings of the 10th Americas Conference on Information Systems, 2004

2003
Individual Centrality and Performance in Virtual R&D Groups: An Empirical Study.
Manag. Sci., 2003

Using computational modeling to transform nursing data into actionable information.
J. Biomed. Informatics, 2003

Using Computational Modeling to Study the Impact of Workplace Characteristics on Patient Safety Outcomes.
Proceedings of the AMIA 2003, 2003

2002
Computational organizational science and organizational engineering.
Simul. Model. Pract. Theory, 2002

Emergent Specializations in a Commodity Market: A Multi-Agent Model - Graduate Student Best Paper Award, CASOS 2001 Conference.
Comput. Math. Organ. Theory, 2002

NETEST: Estimating a Terrorist Network's Structure - Graduate Student Best Paper Award, CASOS 2002 Conference.
Comput. Math. Organ. Theory, 2002

TAG Models with Emotion.
Proceedings of the Fifteenth International Florida Artificial Intelligence Research Society Conference, 2002

2001
Monopoly Power on the Web - A Preliminary Investigation of Search Engines
CoRR, 2001

Editor's Note.
Comput. Math. Organ. Theory, 2001

2000
Emotions in crisis management: an analysis of the organisational response of two natural disasters.
Int. J. Technol. Manag., 2000

1999
The interaction of size and density with graph-level indices.
Soc. Networks, 1999

1998
Network Structure in Virtual Organizations.
J. Comput. Mediat. Commun., 1998

Design Versus Cognition: The interaction of agent cognition and organizational design on organizational performance.
J. Artif. Soc. Soc. Simul., 1998

Adaptive Organizations and Emergent Forms.
Proceedings of the Third International Conference on Multiagent Systems, 1998

1997
Organizational adaptation.
Ann. Oper. Res., 1997

Individual performance in distributed design groups: an empirical study.
Proceedings of the ACM SIGCPR Conference on Computer Personnel Research, 1997

1996
Note to reviewers.
Comput. Math. Organ. Theory, 1996

1995
Organizational designs suited to high performance under stress.
IEEE Trans. Syst. Man Cybern., 1995

Editorial.
Comput. Math. Organ. Theory, 1995

Computational and mathematical organization theory: Perspective and directions.
Comput. Math. Organ. Theory, 1995

An empirical study of collaborative wearable computer systems.
Proceedings of the Human Factors in Computing Systems, 1995


  Loading...