Lisa Kaati

Orcid: 0000-0002-3724-7504

According to our database1, Lisa Kaati authored at least 52 papers between 2005 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
General Risk Index : A Measure for Predicting Violent Behavior Through Written Communication.
Proceedings of the IEEE International Conference on Big Data, 2023

Harmful Communication: Detection of Toxic Language and Threats on Swedish.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2023

Linguistic Alignments: Detecting Similarities in Language Use in Written Communication.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2023

2022
A Machine Learning Approach to Identify Toxic Language in the Online Space.
Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2022

Predicting Targeted Violence from Social Media Communication.
Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2022

2021
Words of Suicide: Identifying Suicidal Risk in Written Communications.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

Similarity ranking using handcrafted stylometric traits in a swedish context.
Proceedings of the ASONAM '21: International Conference on Advances in Social Networks Analysis and Mining, Virtual Event, The Netherlands, November 8, 2021

2020
The Applicability of Authorship Verification to Swedish Discussion Forums.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

Introducing Digital-7 Threat Assessment of Individuals in Digital Environments.
Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2020

2019
Extracting Account Attributes for Analyzing Influence on Twitter.
Proceedings of the European Intelligence and Security Informatics Conference, 2019

PRAT - a Tool for Assessing Risk in Written Communication.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

A Study on the Feasibility to Detect Hate Speech in Swedish.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

Automatic Extraction of Personality from Text: Challenges and Opportunities.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

Levels of hate in online environments.
Proceedings of the ASONAM '19: International Conference on Advances in Social Networks Analysis and Mining, 2019

2018
Analysis and Mining of Tags, (Micro)Blogs, and Virtual Communities.
Proceedings of the Encyclopedia of Social Network Analysis and Mining, 2nd Edition, 2018

Monitoring Targeted Hate in Online Environments.
CoRR, 2018

Directed Digital Hate.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018

Political Bots and the Swedish General Election.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018

Online Monitoring of Large Events.
Proceedings of the European Intelligence and Security Informatics Conference, 2018

2017
Interpretable Probabilistic Divisive Clustering of Large Node-Attributed Networks.
Proceedings of the European Intelligence and Security Informatics Conference, 2017

Author Profiling in the Wild.
Proceedings of the European Intelligence and Security Informatics Conference, 2017

Gender Classification with Data Independent Features in Multiple Languages.
Proceedings of the European Intelligence and Security Informatics Conference, 2017

IoT Data Profiles: The Routines of Your Life Reveals Who You Are.
Proceedings of the European Intelligence and Security Informatics Conference, 2017

A Machine Learning Approach towards Detecting Extreme Adopters in Digital Communities.
Proceedings of the 28th International Workshop on Database and Expert Systems Applications, 2017

2016
Automatic detection of xenophobic narratives: A case study on Swedish alternative media.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016

Measuring online affects in a white supremacy forum.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016

Identifying Warning Behaviors of Violent Lone Offenders in Written Communication.
Proceedings of the IEEE International Conference on Data Mining Workshops, 2016

Multi-domain Alias Matching Using Machine Learning.
Proceedings of the Third European Network Intelligence Conference, 2016

2015
Timeprints for identifying social media users with multiple aliases.
Secur. Informatics, 2015

Detecting Multipliers of Jihadism on Twitter.
Proceedings of the IEEE International Conference on Data Mining Workshop, 2015

A Step Towards Detecting Online Grooming - Identifying Adults Pretending to be Children.
Proceedings of the 2015 European Intelligence and Security Informatics Conference, 2015

Detecting Jihadist Messages on Twitter.
Proceedings of the 2015 European Intelligence and Security Informatics Conference, 2015

2014
Analysis and Mining of Tags, (Micro)Blogs, and Virtual Communities.
Encyclopedia of Social Network Analysis and Mining, 2014

Time Profiles for Identifying Users in Online Environments.
Proceedings of the IEEE Joint Intelligence and Security Informatics Conference, 2014

Activity profiles in online social media.
Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2014

2013
Harvesting and analysis of weak signals for detecting lone wolf terrorists.
Secur. Informatics, 2013

Detecting multiple aliases in social media.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013

2012
Social positions and simulation relations.
Soc. Netw. Anal. Min., 2012

Aspects of plan operators in a tree automata framework.
Proceedings of the 15th International Conference on Information Fusion, 2012

Analysis of Weak Signals for Detecting Lone Wolf Terrorists.
Proceedings of the 2012 European Intelligence and Security Informatics Conference, 2012

Detecting Key Players in Terrorist Networks.
Proceedings of the 2012 European Intelligence and Security Informatics Conference, 2012

Combining Entity Matching Techniques for Detecting Extremist Behavior on Discussion Boards.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2012

2011
Analysis of Competing Hypothesis for Investigating Lone Wolf Terrorist.
Proceedings of the European Intelligence and Security Informatics Conference, 2011

2010
Analyzing the Security in the GSM Radio Network Using Attack Jungles.
Proceedings of the Leveraging Applications of Formal Methods, Verification, and Validation, 2010

Weighted unranked tree automata as a framework for plan recognition.
Proceedings of the 13th Conference on Information Fusion, 2010

Detecting Social Positions Using Simulation.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2010

2009
Composed Bisimulation for Tree Automata.
Int. J. Found. Comput. Sci., 2009

2008
Reduction Techniques for Finite (Tree) Automata.
PhD thesis, 2008

A Uniform (Bi-)Simulation-Based Framework for Reducing Tree Automata.
Proceedings of the International Doctoral Workshop on Mathematical and Engineering Methods in Computer Science, 2008

Computing Simulations over Tree Automata.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2008

2007
Bisimulation Minimization of Tree Automata.
Int. J. Found. Comput. Sci., 2007

2005
Minimization of Non-deterministic Automata with Large Alphabets.
Proceedings of the Implementation and Application of Automata, 2005


  Loading...