The Science Behind

Dechefr is based on more than 10 years of research on intelligence analysis, terrorism research, risk assessment and threat assessment in digital environments. Below is a list of research related to the developement of Dechefr.

  • Kaati, L., Shrestha, A and Akrami. N, (2023) General Risk Index: A Measure for Predicting Violent Behavior Through Written Communication. 2023 IEEE International Conference on Big Data (BigData).
  • Kaati, L., Shrestha, A and Akrami. N, (2024) Linguistic Alignments: Detecting Similarities in Language Use in Written Communication. In Proceedings of the 2023 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM '23). Association for Computing Machinery, New York, NY, USA, 619–623.
  • Kaati, L., Shrestha, A and Akrami. N, (2022) Predicting Targeted Violence from Social Media Communication. In Proceedings of the 2022 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM '22).
  • Kaati, L., Shrestha, A and Akrami. N, (2022) A Machine Learning Approach to Identify Toxic Language in the Online Space. In Proceedings of the 2022 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM '22).
  • Shrestha, A., Akrami, N., Kaati, L. (2020). Introducing Digital-7: Threat Assessment of Individuals in Digital Environments IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)
  • Kaati, L., Cohen, K., Pelzer, B. (2021) Heroes and Scapegoats. Right-wing extremism in digital environments. European Commission, Directorate-General for Justice and Consumers. Publications Office.
  • Pelzer, B., Kaati, L., Cohen, K. Fernquist, J. (2021) Toxic language in online incel communities. Journal SN Social Sciences, 1, 213.
  • Shrestha, A., Akrami, N., Kaati, L., Kupper, J., & Schumacher, M. R. (2021) Words of Suicide: Identifying Suicidal Risk in Written Communications. In 2021 IEEE International Conference on Big Data (Big Data) (pp. 2144-2150). IEEE.
  • Shrestha, A., Kaati, L., Cohen, K. (2020) Extreme Adopters in Digital Communities. Journal of Threat Assessment and Management. (1-2), 72.
  • Shrestha, A., Kaati, L., Akrami, N. (2019) PRAT - a Tool for Assessing Risk in Written Communication. 2019 IEEE International Conference on Big Data (Big Data), Los Angeles, CA, USA, pp. 4755-4762.
  • Akrami, N., Fernquist, J., Isbister, T., Kaati, L., Pelzer, B., (2019) Automatic Extraction of Personality from Text: Challenges and Opportunities. 2019 IEEE International Conference on Big Data (Big Data), Los Angeles, CA, USA, pp. 3156-3164.
  • Akrami, N., Shrestha, A., Berggren, M., Kaati, L., Obaidi, M., Cohen, K. (2018). Assessment of risk in written communication. Introducing the Profile Risk Assessment Tool (PRAT). The Hague: European Police Office.
  • Kaati, L. Lundeqvist, E., Shrestha, A and Svensson, M. (2017) Author Profiling in the Wild, 2017 European Intelligence and Security Informatics Conference (EISIC), Athens, 2017, pp. 155-158.
  • Johansson, F., Kaati, L., (2016) Countering Lone Wolf Terrorism: Weak Signals and Online Activities Chapter in Understanding Lone Actor Terrorism. Past Experience, Future Outlook, and Response Strategies. Routledge.
  • Kaati, L., Shrestha, A., Cohen, K., (2016) Linguistic Analysis of Lone Offenders Manifestos. 2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF), Vancouver, BC, Canada, 2016, pp. 1-8.
  • Figea, L., Kaati, L., Scrivens, R. (2016) Measuring Online Affects in a White Supremacy Forum In proceedings of the IEEE Intelligence and Security Informatics conference (IEEE-ISI). Authors listed in alphabetical order.
  • Johansson, F., Kaati, L., Sahlgren, M. (2015) Detecting Linguistic Markers of Violent Extremism in Online Environments Chapter in Combating Violent Extremism and Radicalization in the Digital Era, IGI Global.
  • Kaati, L., Omer, E., Prucha, P., Shrestha, A. (2015) Detecting Multipliers of Jihadism on Twitter IEEE International Conference on Data Mining Workshop (ICDMW), Atlantic City, NJ, USA, 2015, pp. 954-960.
  • Cohen, K., Johansson, F., Kaati, L., Mork, C.M. (2014) Detecting Linguistic Markers for Radical Violence in Social Media Journal of Terrorism and Political Violence, special issue on lone wolves and autonomous cells in terrorism 26:1:246-256.
  • Brynielsson, J., Horndahl, H., Johansson, F., Kaati, L., Mårtenson, C., Svenson, P. (2013) Harvesting and analysis of weak signals for detecting lone wolf terrorists Security Informatics Journal 2:11 Authors listed in alphabetical order.
  • Dahlin, J., Johansson,F., Kaati,L., Mårtensson, C., Svenson, P. (2012) Combining Entity Matching Techniques for Detecting Extremist Behavior on Discussion Boards. In Proceedings of International Symposium on Foundation of Open Source Intelligence and Security Informatics.
  • Kaati, L., Svenson, P. (2011) Analysis of Competing Hypotheses for Investigating Lone Wolf Terrorists. 2011 European Intelligence and Security Informatics Conference, Athens, Greece, 2011, pp. 295-299.