Detecting linguistic markers for radical violence in social media K Cohen, F Johansson, L Kaati, JC Mork Terrorism and Political Violence 26 (1), 246-256, 2014 | 286 | 2014 |
Harvesting and analysis of weak signals for detecting lone wolf terrorists J Brynielsson, A Horndahl, F Johansson, L Kaati, C Mårtenson, ... Security Informatics 2, 1-15, 2013 | 135 | 2013 |
Detecting jihadist messages on twitter M Ashcroft, A Fisher, L Kaati, E Omer, N Prucha 2015 European intelligence and security informatics conference, 161-164, 2015 | 124 | 2015 |
Detecting multipliers of jihadism on twitter L Kaati, E Omer, N Prucha, A Shrestha 2015 IEEE international conference on data mining workshop (ICDMW), 954-960, 2015 | 79 | 2015 |
Detecting multiple aliases in social media F Johansson, L Kaati, A Shrestha Proceedings of the 2013 IEEE/ACM international conference on advances in …, 2013 | 78 | 2013 |
Detecting social positions using simulation J Brynielsson, J Högberg, L Kaati, C Mårtenson, P Svenson 2010 International Conference on Advances in Social Networks Analysis and …, 2010 | 75 | 2010 |
Political bots and the Swedish general election J Fernquist, L Kaati, R Schroeder 2018 ieee international conference on intelligence and security informatics …, 2018 | 68 | 2018 |
Linguistic analysis of lone offender manifestos L Kaati, A Shrestha, K Cohen 2016 IEEE international conference on cybercrime and computer forensic …, 2016 | 65 | 2016 |
Analysis of weak signals for detecting lone wolf terrorists J Brynielsson, A Horndahl, F Johansson, L Kaati, C Mårtenson, ... 2012 European Intelligence and Security Informatics Conference, 197-204, 2012 | 64 | 2012 |
Toxic language in online incel communities B Pelzer, L Kaati, K Cohen, J Fernquist SN Social Sciences 1, 1-22, 2021 | 63 | 2021 |
Computing Simulations over Tree Automata: (Efficient Techniques for Reducing Tree Automata) PA Abdulla, A Bouajjani, L Holík, L Kaati, T Vojnar Tools and Algorithms for the Construction and Analysis of Systems: 14th …, 2008 | 61 | 2008 |
Measuring online affects in a white supremacy forum L Figea, L Kaati, R Scrivens 2016 IEEE conference on intelligence and security informatics (ISI), 85-90, 2016 | 49 | 2016 |
Detecting key players in terrorist networks A Berzinji, L Kaati, A Rezine 2012 European Intelligence and Security Informatics Conference, 297-302, 2012 | 49 | 2012 |
Detecting linguistic markers of violent extremism in online environments F Johansson, L Kaati, M Sahlgren Artificial intelligence: Concepts, methodologies, tools, and applications …, 2017 | 45 | 2017 |
Timeprints for identifying social media users with multiple aliases F Johansson, L Kaati, A Shrestha Security Informatics 4, 1-11, 2015 | 40 | 2015 |
Bisimulation minimization of tree automata PA Abdulla, L Kaati, J Högberg International Conference on Implementation and Application of Automata, 173-185, 2006 | 40 | 2006 |
Identifying warning behaviors of violent lone offenders in written communication L Kaati, A Shrestha, T Sardella 2016 IEEE 16th international conference on data mining workshops (ICDMW …, 2016 | 34 | 2016 |
Digital Jihad Propaganda from the Islamic State K Cohen, L Kaati Swedish Defence Research Agency (FOI), 2018 | 32 | 2018 |
A Step Towards Detecting Online Grooming--Identifying Adults Pretending to be Children M Ashcroft, L Kaati, M Meyer 2015 European Intelligence and Security Informatics Conference, 98-104, 2015 | 32 | 2015 |
Combining entity matching techniques for detecting extremist behavior on discussion boards J Dahlin, F Johansson, L Kaati, C Mårtenson, P Svenson 2012 IEEE/ACM International Conference on Advances in Social Networks …, 2012 | 28 | 2012 |