Lisa Kaati
Lisa Kaati
Senior scientist and group leader, FOI
Verifierad e-postadress på foi.se
TitelCiteras avÅr
Detecting linguistic markers for radical violence in social media
K Cohen, F Johansson, L Kaati, JC Mork
Terrorism and Political Violence 26 (1), 246-256, 2014
1032014
Harvesting and analysis of weak signals for detecting lone wolf terrorists
J Brynielsson, A Horndahl, F Johansson, L Kaati, C Mårtenson, ...
Security Informatics 2 (1), 11, 2013
772013
Detecting social positions using simulation
J Brynielsson, J Högberg, L Kaati, C Mårtenson, P Svenson
2010 International Conference on Advances in Social Networks Analysis and …, 2010
532010
Detecting multiple aliases in social media
F Johansson, L Kaati, A Shrestha
Proceedings of the 2013 IEEE/ACM international conference on advances in …, 2013
502013
Detecting jihadist messages on twitter
M Ashcroft, A Fisher, L Kaati, E Omer, N Prucha
2015 European Intelligence and Security Informatics Conference, 161-164, 2015
432015
Computing simulations over tree automata
PA Abdulla, A Bouajjani, L Holík, L Kaati, T Vojnar
International Conference on Tools and Algorithms for the Construction and …, 2008
412008
Social positions and simulation relations
J Brynielsson, L Kaati, P Svenson
Social Network Analysis and Mining 2 (1), 39-52, 2012
352012
Analysis of weak signals for detecting lone wolf terrorists
J Brynielsson, A Horndahl, F Johansson, L Kaati, C Mårtenson, ...
2012 European Intelligence and Security Informatics Conference, 197-204, 2012
302012
Bisimulation minimization of tree automata
PA Abdulla, L Kaati, J Högberg
International Conference on Implementation and Application of Automata, 173-185, 2006
282006
Detecting multipliers of jihadism on twitter
L Kaati, E Omer, N Prucha, A Shrestha
2015 IEEE International Conference on Data Mining Workshop (ICDMW), 954-960, 2015
212015
Detecting key players in terrorist networks
A Berzinji, L Kaati, A Rezine
2012 European Intelligence and Security Informatics Conference, 297-302, 2012
202012
Combining entity matching techniques for detecting extremist behavior on discussion boards
J Dahlin, F Johansson, L Kaati, C Mårtenson, P Svenson
2012 IEEE/ACM International Conference on Advances in Social Networks …, 2012
192012
Timeprints for identifying social media users with multiple aliases
F Johansson, L Kaati, A Shrestha
Security Informatics 4 (1), 7, 2015
182015
Analysis of competing hypothesis for investigating lone wolf terrorist
L Kaati, P Svenson
2011 European Intelligence and Security Informatics Conference, 295-299, 2011
182011
Development of computerized support tools for intelligence work
J Brynielsson, A Horndahl, L Kaati, C Mårtenson, P Svenson
Proceedings of the 14th International Command and Control Research and …, 2009
162009
Time profiles for identifying users in online environments
F Johansson, L Kaati, A Shrestha
2014 IEEE Joint Intelligence and Security Informatics Conference, 83-90, 2014
152014
An overview of the Impactorium tools 2008
R Forsgren, L Kaati, C Mårtenson, P Svenson, E Tjörnhammar
Proceedings of the Second Skövde Workshop on Information Fusion Topics …, 2008
152008
Composed bisimulation for tree automata
PA Abdulla, A Bouajjani, L Holík, L Kaati, T Vojnar
International Conference on Implementation and Application of Automata, 212-222, 2008
132008
Minimization of non-deterministic automata with large alphabets
PA Abdulla, J Deneux, L Kaati, M Nilsson
International Conference on Implementation and Application of Automata, 31-42, 2005
132005
A uniform (bi-) simulation-based framework for reducing tree automata
PA Abdulla, L Holík, L Kaati, T Vojnar
Electronic Notes in Theoretical Computer Science 251, 27-48, 2009
122009
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20