Department of Information Technology

Social media analytics group

We combine what humans are good at with what computers are good at.

In the social media analytics group we develop new intelligent techniques and methods for analyzing data from social media. We focus on applying artificial intelligence and in particular machine learning techniques to analyzing data from a security perspective using an inter disciplinary approach.

Publications

Identifying warning behaviors of violent lone offenders in written communication. Lisa Kaati, Amendra Shrestha, and Tony Sardella. In Proc. 16th ICDM Workshops, pp 1053-1060, IEEE Computer Society, 2016. (DOI, fulltext:postprint).
Multi-domain alias matching using machine learning. Michael Ashcroft, Fredrik Johansson, Lisa Kaati, and Amendra Shrestha. In Proc. 3rd European Network Intelligence Conference, pp 77-84, IEEE, 2016. (DOI, fulltext:postprint).
Automatic detection of xenophobic narratives: A case study on Swedish alternative media. Lisa Kaati, Amendra Shrestha, Katie Cohen, and Sinna Lindquist. In Proc. 14th International Conference on Intelligence and Security Informatics, pp 121-126, IEEE, 2016. (DOI).
Measuring online affects in a white supremacy forum. Léo Figea, Lisa Kaati, and Ryan Scrivens. In Proc. 14th International Conference on Intelligence and Security Informatics, pp 85-90, IEEE, 2016. (DOI).
Linguistic analysis of lone offender manifestos. Lisa Kaati, Amendra Shrestha, and Katie Cohen. In Proc. 4th International Conference on Cybercrime and Computer Forensics, IEEE, 2016. (DOI).
Semantic technologies for detecting names of new drugs on darknets. Lisa Kaati, Fredrik Johansson, and Elinor Forsman. In Proc. 4th International Conference on Cybercrime and Computer Forensics, IEEE, 2016. (DOI).
Countering lone actor terrorism: Weak signals and online activities. Lisa Kaati and Fredrik Johansson. In Understanding Lone Actor Terrorism: Past experience, future outlook, and response strategies, pp 266-279, Routledge, Abingdon, UK, 2016. (DOI).
Internet of Things and Future Threats Towards our Society. Torbjörn Fängström and Lisa Kaati. In Proc. National Symposium on Technology and Methodology for Security and Crisis Management: TAMSEC 2015, 2015.
Are You Really a Child?: A Machine Learning Approach To Protect Children from Online Grooming. Michael Ashcroft, Lisa Kaati, and Maxime Meyer. In Proc. National Symposium on Technology and Methodology for Security and Crisis Management: TAMSEC 2015, 2015.
Detecting multipliers of jihadism on twitter. Lisa Kaati, Enghin Omer, Nico Prucha, and Amendra Shrestha. In Proc. 15th ICDM Workshops, pp 954-960, IEEE Computer Society, 2015. (DOI).
Timeprints for identifying social media users with multiple aliases. Fredrik Johansson, Lisa Kaati, and Amendra Shrestha. In Security Informatics, volume 4, pp 7:1-11, 2015. (DOI, Fulltext).
Detecting jihadist messages on twitter. Michael Ashcroft, Ali Fisher, Lisa Kaati, Enghin Omer, and Nico Prucha. In Proc. 5th European Intelligence and Security Informatics Conference, pp 161-164, IEEE Computer Society, 2015. (DOI).
A step towards detecting online grooming: Identifying adults pretending to be children. Michael Ashcroft, Lisa Kaati, and Maxime Meyer. In Proc. 5th European Intelligence and Security Informatics Conference, pp 98-104, IEEE Computer Society, 2015. (DOI).
Time profiles for identifying users in online environments. Fredrik Johansson, Lisa Kaati, and Amendra Shrestha. In Proc. 1st Joint Intelligence and Security Informatics Conference, pp 83-90, IEEE Computer Society, 2014. (DOI).
Analysis and mining of tags, (micro)blogs, and virtual communities. Lisa Kaati. In Encyclopedia of Social Network Analysis and Mining, pp 19-25, Springer, 2014. (DOI).
Activity profiles in online social media. Mohamed Faouzi Atig, Sofia Cassel, Lisa Kaati, and Amendra Shrestha. In Proc. 6th International Conference on Advances in Social Networks Analysis and Mining, pp 850-855, IEEE Computer Society, 2014. (DOI).
Author recognition in discussion boards. Amendra Shrestha, Lisa Kaati, Sofia Cassel, and Mohamed Faouzi Atig. In National Symposium on Technology and Methodology for Security and Crisis Management, 2013.
Detecting multiple aliases in social media. Fredrik Johansson, Lisa Kaati, and Amendra Shrestha. In Proc. 5th International Conference on Advances in Social Networks Analysis and Mining, pp 1004-1011, ACM Press, New York, 2013. (DOI).
A tool for visualizing and analyzing users on discussion boards. Amendra Shrestha. In European Intelligence and Security Informatics Conference: 2013, pp 229-229, IEEE Computer Society, 2013. (DOI, Fulltext).

Updated  2017-05-20 16:31:35 by Lisa Kaati.