Lisa Kaati

According to our database1, Lisa Kaati authored at least 42 papers between 2005 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Extracting Account Attributes for Analyzing Influence on Twitter.
Proceedings of the European Intelligence and Security Informatics Conference, 2019

PRAT - a Tool for Assessing Risk in Written Communication.
Proceedings of the 2019 IEEE International Conference on Big Data (Big Data), 2019

A Study on the Feasibility to Detect Hate Speech in Swedish.
Proceedings of the 2019 IEEE International Conference on Big Data (Big Data), 2019

Automatic Extraction of Personality from Text: Challenges and Opportunities.
Proceedings of the 2019 IEEE International Conference on Big Data (Big Data), 2019

Levels of hate in online environments.
Proceedings of the ASONAM '19: International Conference on Advances in Social Networks Analysis and Mining, 2019

2018
Analysis and Mining of Tags, (Micro)Blogs, and Virtual Communities.
Proceedings of the Encyclopedia of Social Network Analysis and Mining, 2nd Edition, 2018

Monitoring Targeted Hate in Online Environments.
CoRR, 2018

Directed Digital Hate.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018

Political Bots and the Swedish General Election.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018

Online Monitoring of Large Events.
Proceedings of the European Intelligence and Security Informatics Conference, 2018

2017
Interpretable Probabilistic Divisive Clustering of Large Node-Attributed Networks.
Proceedings of the European Intelligence and Security Informatics Conference, 2017

Author Profiling in the Wild.
Proceedings of the European Intelligence and Security Informatics Conference, 2017

Gender Classification with Data Independent Features in Multiple Languages.
Proceedings of the European Intelligence and Security Informatics Conference, 2017

IoT Data Profiles: The Routines of Your Life Reveals Who You Are.
Proceedings of the European Intelligence and Security Informatics Conference, 2017

A Machine Learning Approach towards Detecting Extreme Adopters in Digital Communities.
Proceedings of the 28th International Workshop on Database and Expert Systems Applications, 2017

2016
Automatic detection of xenophobic narratives: A case study on Swedish alternative media.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016

Measuring online affects in a white supremacy forum.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016

Identifying Warning Behaviors of Violent Lone Offenders in Written Communication.
Proceedings of the IEEE International Conference on Data Mining Workshops, 2016

Multi-domain Alias Matching Using Machine Learning.
Proceedings of the Third European Network Intelligence Conference, 2016

2015
Timeprints for identifying social media users with multiple aliases.
Secur. Informatics, 2015

Detecting Multipliers of Jihadism on Twitter.
Proceedings of the IEEE International Conference on Data Mining Workshop, 2015

A Step Towards Detecting Online Grooming - Identifying Adults Pretending to be Children.
Proceedings of the 2015 European Intelligence and Security Informatics Conference, 2015

Detecting Jihadist Messages on Twitter.
Proceedings of the 2015 European Intelligence and Security Informatics Conference, 2015

2014
Analysis and Mining of Tags, (Micro)Blogs, and Virtual Communities.
Encyclopedia of Social Network Analysis and Mining, 2014

Time Profiles for Identifying Users in Online Environments.
Proceedings of the IEEE Joint Intelligence and Security Informatics Conference, 2014

Activity profiles in online social media.
Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2014

2013
Harvesting and analysis of weak signals for detecting lone wolf terrorists.
Secur. Informatics, 2013

Detecting multiple aliases in social media.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013

2012
Social positions and simulation relations.
Soc. Netw. Anal. Min., 2012

Aspects of plan operators in a tree automata framework.
Proceedings of the 15th International Conference on Information Fusion, 2012

Analysis of Weak Signals for Detecting Lone Wolf Terrorists.
Proceedings of the 2012 European Intelligence and Security Informatics Conference, 2012

Detecting Key Players in Terrorist Networks.
Proceedings of the 2012 European Intelligence and Security Informatics Conference, 2012

Combining Entity Matching Techniques for Detecting Extremist Behavior on Discussion Boards.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2012

2011
Analysis of Competing Hypothesis for Investigating Lone Wolf Terrorist.
Proceedings of the European Intelligence and Security Informatics Conference, 2011

2010
Analyzing the Security in the GSM Radio Network Using Attack Jungles.
Proceedings of the Leveraging Applications of Formal Methods, Verification, and Validation, 2010

Weighted unranked tree automata as a framework for plan recognition.
Proceedings of the 13th Conference on Information Fusion, 2010

Detecting Social Positions Using Simulation.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2010

2009
Composed Bisimulation for Tree Automata.
Int. J. Found. Comput. Sci., 2009

A Uniform (Bi-)Simulation-Based Framework for Reducing Tree Automata.
Electron. Notes Theor. Comput. Sci., 2009

2008
Computing Simulations over Tree Automata.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2008

2007
Bisimulation Minimization of Tree Automata.
Int. J. Found. Comput. Sci., 2007

2005
Minimization of Non-deterministic Automata with Large Alphabets.
Proceedings of the Implementation and Application of Automata, 2005


  Loading...