Follow
Amendra Shrestha
Title
Cited by
Cited by
Year
Detecting multiple aliases in social media
F Johansson, L Kaati, A Shrestha
2013 IEEE/ACM International Conference on Advances in Social Networks …, 2013
672013
Detecting multipliers of jihadism on twitter
L Kaati, E Omer, N Prucha, A Shrestha
2015 IEEE international conference on data mining workshop (ICDMW), 954-960, 2015
542015
Linguistic analysis of lone offender manifestos
L Kaati, A Shrestha, K Cohen
2016 IEEE international conference on cybercrime and computer forensic …, 2016
352016
Timeprints for identifying social media users with multiple aliases
F Johansson, L Kaati, A Shrestha
Security Informatics 4 (1), 1-11, 2015
302015
Identifying warning behaviors of violent lone offenders in written communication
L Kaati, A Shrestha, T Sardella
2016 IEEE 16th international conference on data mining workshops (ICDMW …, 2016
232016
Time profiles for identifying users in online environments
F Johansson, L Kaati, A Shrestha
2014 IEEE Joint Intelligence and Security Informatics Conference, 83-90, 2014
212014
Activity profiles in online social media
MF Atig, S Cassel, L Kaati, A Shrestha
2014 IEEE/ACM International Conference on Advances in Social Networks …, 2014
142014
Automatic detection of xenophobic narratives: A case study on Swedish alternative media
L Kaati, A Shrestha, K Cohen, S Lindquist
2016 IEEE conference on intelligence and security informatics (ISI), 121-126, 2016
102016
Assessment of risk in written communication: Introducing the Profile Risk Assessment Tool (PRAT)
N Akrami, A Shrestha, M Berggren, L Kaati, M Obaidi, K Cohen
EUROPOL, 2018
92018
A machine learning approach towards detecting extreme adopters in digital communities
A Shrestha, L Kaati, K Cohen
2017 28th international workshop on database and expert systems applications …, 2017
72017
Multi-domain alias matching using machine learning
M Ashcroft, F Johansson, L Kaati, A Shrestha
2016 Third European Network Intelligence Conference (ENIC), 77-84, 2016
52016
Linguistic markers of a radicalized mind-set among extreme adopters
K Cohen, T Isbister, L Kaati, A Shrestha
WSDM 2017, 1st International Workshop on Cyber Deviance Detection, 823-824, 2017
42017
PRAT-a tool for assessing risk in written communication
A Shrestha, L Kaati, N Akrami
2019 IEEE International Conference on Big Data (Big Data), 4755-4762, 2019
32019
Personalized mobile-assisted smart transportation
ECH Ngai, S Brandauer, A Shrestha, K Vandikas
2016 Digital Media Industry & Academic Forum (DMIAF), 158-160, 2016
32016
Introducing Digital-7 Threat Assessment of Individuals in Digital Environments
A Shrestha, N Akrami, L Kaati
2020 IEEE/ACM International Conference on Advances in Social Networks …, 2020
22020
Extreme adopters in digital communities.
A Shrestha, L Kaati, K Cohen
Journal of Threat Assessment and Management 7 (1-2), 72, 2020
22020
Author profiling in the wild
L Kaati, E Lundeqvist, A Shrestha, M Svensson
2017 European Intelligence and Security Informatics Conference (EISIC), 155-158, 2017
22017
A Tool for Visualizing and Analyzing Users on Discussion Boards
A Shrestha
2013 European Intelligence and Security Informatics Conference, 229-229, 2013
12013
Visualization and Detection of Multiple Aliases in Social Media
A Shrestha
12013
Words of Suicide: Identifying Suicidal Risk in Written Communications
A Shrestha, N Akrami, L Kaati, J Kupper, MR Schumacher
2021 IEEE International Conference on Big Data (Big Data), 2144-2150, 2021
2021
The system can't perform the operation now. Try again later.
Articles 1–20