Lisa Kaati
Visiting researcher at Department of Information Technology; Division of Computer Systems
- Mobile phone:
- +46 70 482 25 73
- E-mail:
- lisa.kaati@it.uu.se
- Visiting address:
- Hus 10, Regementsvägen 10
- Postal address:
- Box 337
751 05 UPPSALA
Short presentation
My research interests are in the area of terrorism and the Internet, and in particular how computer science, psychology, and statistics can be used to study different behaviors. My research is interdisciplinary and includes studies on digital hate and violent extremism in online environments.
Keywords
- data science
- violent extremism
- digital hate
- author profiling
- intelligence
- social media analysis
Biography
Dr. Lisa Kaati achieved a PhD in computer science from Uppsala University in 2008. Her principal research interests are in the area of terrorism and the Internet, and in particular how computer science, psychology and statistics can be used to study different behaviors. She is the author of over 40 academic articles and chapters and several reports.
Dr. Kaati has presented her findings before the Swedish Government, The Finish Government, The Commission of the European Union, and elsewhere. She is a member of the Academic Advisory Board of Europol’s Counter-terrorism Center and the Radicalisation Awareness Network (RAN) Advisory Board of Researchers. She is an associate editor of the journal Social Network Analysis and Mining.
Between 2008-2022 Dr. Kaati was working at the Swedish Defence Research Agency (FOI) where she was the head of the interdisciplinary Data science group. For 6 years, Dr. Kaati was working on a commission from the Swedish government to study violent extremist propaganda and hate speech online.
Publications
Selection of publications
Detecting multipliers of jihadism on twitter
Part of Proc. 15th ICDM Workshops, p. 954-960, 2015
Timeprints for identifying social media users with multiple aliases
Part of Security Informatics, 2015
A step towards detecting online grooming: Identifying adults pretending to be children
Part of Proc. 5th European Intelligence and Security Informatics Conference, p. 98-104, 2015
Detecting jihadist messages on twitter
Part of Proc. 5th European Intelligence and Security Informatics Conference, p. 161-164, 2015
Analysis and mining of tags, (micro)blogs, and virtual communities
Part of Encyclopedia of Social Network Analysis and Mining, p. 19-25, Springer, 2014
Time profiles for identifying users in online environments
Part of Proc. 1st Joint Intelligence and Security Informatics Conference, p. 83-90, 2014
Activity profiles in online social media
Part of Proc. 6th International Conference on Advances in Social Networks Analysis and Mining, p. 850-855, 2014
Detecting multiple aliases in social media
Part of Proc. 5th International Conference on Advances in Social Networks Analysis and Mining, p. 1004-1011, 2013
Author recognition in discussion boards
Part of National Symposium on Technology and Methodology for Security and Crisis Management, 2013
Analyzing the security in the GSM radio network using attack jungles
Part of Leveraging Applications of Formal Methods, Verification, and Validation, p. 60-74, 2010
A uniform (bi-)simulation-based framework for reducing tree automata
Part of Electronic Notes in Theoretical Computer Science, p. 27-48, 2009
Composed bisimulation for tree automata
Part of International Journal of Foundations of Computer Science, p. 685-700, 2009
Reduction Techniques for Finite (Tree) Automata
2008
Computing Simulations over Tree Automata: Efficient Techniques for Reducing Tree Automata
Part of Tools and Algorithms for the Construction and Analysis of Systems, p. 93-108, 2008
Composed Bisimulation for Tree Automata
Part of Implementation and Application of Automata, p. 212-222, 2008
Bisimulation minimization of tree automata
Part of International Journal of Foundations of Computer Science, p. 699-713, 2007
Minimization of Non-deterministic Automata with Large Alphabets
Part of Implementation and Application of Automata, p. 31-42, 2006
Recent publications
Words of Suicide: Identifying Suicidal Risk in Written Communications
Part of 2021 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), p. 2144-2150, 2021
Extreme adopters in digital communities.
Part of Journal of threat assessment and management, p. 72-84, 2020
Introducing Digital-7 Threat Assessment of Individuals in Digital Environments
Part of 2020 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), p. 720-726, 2020
PRAT: a Tool for Assessing Risk in Written Communication
Part of 2019 IEEE International Conference on Big Data (Big Data), p. 4755-4762, 2019
Assessment of risk in written communication: Introducing the Profile Risk Assessment Tool (PRAT)
2018
All publications
Articles in journal
Extreme adopters in digital communities.
Part of Journal of threat assessment and management, p. 72-84, 2020
Timeprints for identifying social media users with multiple aliases
Part of Security Informatics, 2015
A uniform (bi-)simulation-based framework for reducing tree automata
Part of Electronic Notes in Theoretical Computer Science, p. 27-48, 2009
Composed bisimulation for tree automata
Part of International Journal of Foundations of Computer Science, p. 685-700, 2009
Bisimulation minimization of tree automata
Part of International Journal of Foundations of Computer Science, p. 699-713, 2007
Chapters in book
Countering lone actor terrorism: Weak signals and online activities
Part of Understanding Lone Actor Terrorism, p. 266-279, Routledge, 2016
Analysis and mining of tags, (micro)blogs, and virtual communities
Part of Encyclopedia of Social Network Analysis and Mining, p. 19-25, Springer, 2014
Comprehensive doctoral thesis
Conference papers
Words of Suicide: Identifying Suicidal Risk in Written Communications
Part of 2021 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), p. 2144-2150, 2021
Introducing Digital-7 Threat Assessment of Individuals in Digital Environments
Part of 2020 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), p. 720-726, 2020
PRAT: a Tool for Assessing Risk in Written Communication
Part of 2019 IEEE International Conference on Big Data (Big Data), p. 4755-4762, 2019
Linguistic markers of a radicalized mind-set among extreme adopters
Part of Proc. 10th ACM International Conference on Web Search and Data Mining, p. 823-824, 2017
A Machine Learning Approach Towards Detecting Extreme Adopters in Digital Communities
Part of 2017 28th International Workshop on Database and Expert Systems Applications (DEXA), p. 1-5, 2017
Gender Classification with Data Independent Features in Multiple Languages
Part of 2017 European Intelligence and Security Informatics Conference (EISIC), p. 54-60, 2017
IoT Data Profiles: The Routines of Your Life Reveals Who You Are
Part of 2017 European Intelligence and Security Informatics Conference (EISIC), p. 61-67, 2017
Identifying warning behaviors of violent lone offenders in written communication
Part of Proc. 16th ICDM Workshops, p. 1053-1060, 2016
Linguistic analysis of lone offender manifestos
Part of Proc. 4th International Conference on Cybercrime and Computer Forensics, 2016
Multi-domain alias matching using machine learning
Part of Proc. 3rd European Network Intelligence Conference, p. 77-84, 2016
- DOI for Multi-domain alias matching using machine learning
- Download full text (pdf) of Multi-domain alias matching using machine learning
Automatic detection of xenophobic narratives: A case study on Swedish alternative media
Part of Proc. 14th International Conference on Intelligence and Security Informatics, p. 121-126, 2016
Identifying Warning Behaviors of Violent Lone Offenders in Written Communication
Part of 2016 IEEE 16Th International Conference On Data Mining Workshops (ICDMW), p. 1053-1060, 2016
Semantic technologies for detecting names of new drugs on darknets
Part of Proc. 4th International Conference on Cybercrime and Computer Forensics, 2016
Measuring online affects in a white supremacy forum
Part of Proc. 14th International Conference on Intelligence and Security Informatics, p. 85-90, 2016
Detecting multipliers of jihadism on twitter
Part of Proc. 15th ICDM Workshops, p. 954-960, 2015
Are You Really a Child?: A Machine Learning Approach To Protect Children from Online Grooming
Part of Proc. National Symposium on Technology and Methodology for Security and Crisis Management, 2015
Internet of Things and Future Threats Towards our Society
Part of Proc. National Symposium on Technology and Methodology for Security and Crisis Management, 2015
A step towards detecting online grooming: Identifying adults pretending to be children
Part of Proc. 5th European Intelligence and Security Informatics Conference, p. 98-104, 2015
Detecting jihadist messages on twitter
Part of Proc. 5th European Intelligence and Security Informatics Conference, p. 161-164, 2015
Time profiles for identifying users in online environments
Part of Proc. 1st Joint Intelligence and Security Informatics Conference, p. 83-90, 2014
Activity profiles in online social media
Part of Proc. 6th International Conference on Advances in Social Networks Analysis and Mining, p. 850-855, 2014
Detecting multiple aliases in social media
Part of Proc. 5th International Conference on Advances in Social Networks Analysis and Mining, p. 1004-1011, 2013
Author recognition in discussion boards
Part of National Symposium on Technology and Methodology for Security and Crisis Management, 2013
Analyzing the security in the GSM radio network using attack jungles
Part of Leveraging Applications of Formal Methods, Verification, and Validation, p. 60-74, 2010
Computing Simulations over Tree Automata: Efficient Techniques for Reducing Tree Automata
Part of Tools and Algorithms for the Construction and Analysis of Systems, p. 93-108, 2008
Composed Bisimulation for Tree Automata
Part of Implementation and Application of Automata, p. 212-222, 2008
Minimization of Non-deterministic Automata with Large Alphabets
Part of Implementation and Application of Automata, p. 31-42, 2006
Bisimulation Minimization of Tree Automata
Part of Implementation and Application of Automata, p. 173-185, 2006