Tristan Caulfield
Tristan Caulfield
Senior Research Fellow, University College London
Verified email at ucl.ac.uk - Homepage
Title
Cited by
Cited by
Year
On the origins of memes by means of fringe web communities
S Zannettou, T Caulfield, J Blackburn, E De Cristofaro, M Sirivianos, ...
Proceedings of the Internet Measurement Conference 2018, 188-202, 2018
1482018
Disinformation warfare: Understanding state-sponsored trolls on Twitter and their influence on the web
S Zannettou, T Caulfield, E De Cristofaro, M Sirivianos, G Stringhini, ...
Companion proceedings of the 2019 world wide web conference, 218-226, 2019
1412019
The web centipede: understanding how web communities influence each other through the lens of mainstream and alternative news sources
S Zannettou, T Caulfield, E De Cristofaro, N Kourtelris, I Leontiadis, ...
Proceedings of the 2017 internet measurement conference, 405-417, 2017
1392017
Who let the trolls out? towards understanding state-sponsored trolls
S Zannettou, T Caulfield, W Setzer, M Sirivianos, G Stringhini, J Blackburn
Proceedings of the 10th acm conference on web science, 353-362, 2019
842019
The mental health of staff working in intensive care during COVID-19
N Greenberg, D Weston, C Hall, T Caulfield, V Williamson, K Fong
medRxiv, 2020
652020
Characterizing the use of images in state-sponsored information warfare operations by russian trolls on twitter
S Zannettou, T Caulfield, B Bradlyn, E De Cristofaro, G Stringhini, ...
Proceedings of the International AAAI Conference on Web and Social Media 14 …, 2020
31*2020
New evidence on mutual fund performance: A comparison of alternative bootstrap methods
D Blake, T Caulfield, C Ioannidis, I Tonks
Journal of Financial and Quantitative Analysis 52 (3), 1279-1299, 2017
282017
Improved inference in the evaluation of mutual fund performance using panel bootstrap methods
D Blake, T Caulfield, C Ioannidis, I Tonks
Journal of econometrics 183 (2), 202-210, 2014
282014
Improving security policy decisions with models
T Caulfield, D Pym
IEEE Security & Privacy 13 (5), 34-41, 2015
192015
Modelling and simulating systems security policy
T Caulfield, D Pym
EAI Endorsed Transactions on Security and Safety 3 (8), e3, 2015
192015
Integrating life-like action selection into cycle-based agent simulation environments
JJ Bryson, TJ Caulfield, J Drugowitsch
Proceedings of agent, 67-81, 2005
152005
Compositional security modelling
T Caulfield, D Pym, J Williams
International Conference on Human Aspects of Information Security, Privacy …, 2014
112014
The US vulnerabilities equities process: An economic perspective
T Caulfield, C Ioannidis, D Pym
International Conference on Decision and Game Theory for Security, 131-150, 2017
92017
Optimizing time allocation for network defence
T Caulfield, A Fielder
Journal of Cybersecurity 1 (1), 37-51, 2015
92015
The Xanadu of surveillance: Report on security perceptions in the British online media
J Hronesova, T Caulfield, P Guasti
Prague SECONOMICS Discussion Papers 2014/3, 2014
72014
Why Jenny can't figure out which of these messages is a covert information operation
T Caulfield, JM Spring, MA Sasse
Proceedings of the New Security Paradigms Workshop, 118-128, 2019
52019
On the adoption of privacy-enhancing technologies
T Caulfield, C Ioannidis, D Pym
International Conference on Decision and Game Theory for Security, 175-194, 2016
52016
June: open-source individual-based epidemiology simulation
J Aylett-Bullock, C Cuesta-Lazaro, A Quera-Bofarull, M Icaza-Lizaola, ...
Royal Society open science 8 (7), 210506, 2021
4*2021
2 Fast 2 Secure: A Case Study of Post-Breach Security Changes
A Demjaha, T Caulfield, MA Sasse, D Pym
2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2019
42019
Case study: predicting the impact of a physical access control intervention
T Caulfield, S Parkin
Proceedings of the 6th Workshop on Socio-Technical Aspects in Security and …, 2016
42016
The system can't perform the operation now. Try again later.
Articles 1–20