Tristan Caulfield
Tristan Caulfield
Senior Research Fellow, University College London
Verified email at - Homepage
Cited by
Cited by
The web centipede: understanding how web communities influence each other through the lens of mainstream and alternative news sources
S Zannettou, T Caulfield, E De Cristofaro, N Kourtelris, I Leontiadis, ...
Proceedings of the 2017 Internet Measurement Conference, 405-417, 2017
On the origins of memes by means of fringe web communities
S Zannettou, T Caulfield, J Blackburn, E De Cristofaro, M Sirivianos, ...
Proceedings of the Internet Measurement Conference 2018, 188-202, 2018
Disinformation warfare: Understanding state-sponsored trolls on Twitter and their influence on the web
S Zannettou, T Caulfield, E De Cristofaro, M Sirivianos, G Stringhini, ...
Companion Proceedings of The 2019 World Wide Web Conference, 218-226, 2019
Who let the trolls out? towards understanding state-sponsored trolls
S Zannettou, T Caulfield, W Setzer, M Sirivianos, G Stringhini, J Blackburn
Proceedings of the 10th acm conference on web science, 353-362, 2019
Improved inference in the evaluation of mutual fund performance using panel bootstrap methods
D Blake, T Caulfield, C Ioannidis, I Tonks
Journal of econometrics 183 (2), 202-210, 2014
New evidence on mutual fund performance: A comparison of alternative bootstrap methods
D Blake, T Caulfield, C Ioannidis, I Tonks
Journal of Financial and Quantitative Analysis 52 (3), 1279-1299, 2017
Improving security policy decisions with models
T Caulfield, D Pym
IEEE Security & Privacy 13 (5), 34-41, 2015
Modelling and simulating systems security policy
T Caulfield, D Pym
SIMUTOOLS 2015-8th EAI International Conference on Simulation Tools and …, 2015
Integrating life-like action selection into cycle-based agent simulation environments
JJ Bryson, TJ Caulfield, J Drugowitsch
Proceedings of agent, 67-81, 2005
Compositional security modelling
T Caulfield, D Pym, J Williams
International Conference on Human Aspects of Information Security, Privacy …, 2014
The Xanadu of surveillance: Report on security perceptions in the British online media
J Hronesova, T Caulfield, P Guasti
Prague SECONOMICS Discussion Papers 2014/3, 2014
The US vulnerabilities equities process: an economic perspective
T Caulfield, C Ioannidis, D Pym
International Conference on Decision and Game Theory for Security, 131-150, 2017
Characterizing the Use of Images by State-Sponsored Troll Accounts on Twitter
S Zannettou, B Bradlyn, E De Cristofaro, G Stringhini, J Blackburn
arXiv preprint arXiv:1901.05997, 2019
Optimizing time allocation for network defence
T Caulfield, A Fielder
Journal of Cybersecurity 1 (1), 37-51, 2015
Why Jenny can't figure out which of these messages is a covert information operation
T Caulfield, JM Spring, MA Sasse
Proceedings of the New Security Paradigms Workshop, 118-128, 2019
Case study: predicting the impact of a physical access control intervention
T Caulfield, S Parkin
Proceedings of the 6th Workshop on Socio-Technical Aspects in Security and …, 2016
On the adoption of privacy-enhancing technologies
T Caulfield, C Ioannidis, D Pym
International Conference on Decision and Game Theory for Security, 175-194, 2016
Discrete Choice, Social Interaction, and Policy in Encryption Technology Adoption (Short Paper)
T Caulfield, C Ioannidis, D Pym
International Conference on Financial Cryptography and Data Security, 271-279, 2016
Dynamic pricing for ransomware
T Caulfield, C Ioannidis, D Pym
See http://www0. cs. ucl. ac. uk/staff/D. Pym/ransomware-dynamic. pdf …, 2018
2 Fast 2 Secure: A Case Study of Post-Breach Security Changes
A Demjaha, T Caulfield, MA Sasse, D Pym
2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2019
The system can't perform the operation now. Try again later.
Articles 1–20