journalrefs.bib

@article{ClulowM06sigops,
  author = {Jolyon Clulow and
               Tyler Moore},
  title = {Suicide for the common good: a new strategy for credential
               revocation in self-organizing systems},
  journal = {Operating Systems Review},
  volume = {40},
  number = {3},
  year = {2006},
  pages = {18-21},
  puburl = {http://doi.acm.org/10.1145/1151374.1151381}
}
@article{PapaCM13ifip,
  author = {Steve Papa and William Casper and Tyler Moore},
  title = {Securing wastewater facilities from accidental and intentional harm: a cost-benefit analysis},
  journal = {International Journal of Critical Infrastructure Protection},
  year = {2013},
  volume = 6,
  number = 2,
  pages = {96-106},
  url = {http://tylermoore.ens.utulsa.edu/ijcip13.pdf},
  puburl = {http://dx.doi.org/10.1016/j.ijcip.2013.05.002}
}
@article{LandauM12firstmonday,
  author = {Susan Landau and
               Tyler Moore},
  title = {Economic tussles in federated identity management},
  journal = {First Monday},
  volume = {17},
  number = {10},
  year = {2012},
  puburl = {http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/4254},
  presurl = {http://tylermoore.ens.utulsa.edu/nist12pres.pdf}
}
@article{RePEc:idt:journl:cs8102,
  author = {Tyler Moore and Richard Clayton},
  title = {The Impact of Public Information on Phishing Attack and Defense},
  journal = {Communications \& Strategies},
  year = 2011,
  volume = {1},
  number = {81},
  pages = {45-68},
  month = {1st quart},
  keywords = {security economics; online crime; phishing; transparency},
  puburl = {http://ideas.repec.org/a/idt/journl/cs8102.html},
  url = {http://tylermoore.ens.utulsa.edu/cs81.pdf}
}
@article{Moore10ijcip,
  author = {Tyler Moore},
  title = {The economics of cybersecurity: Principles and policy options},
  journal = {International Journal of Critical Infrastructure Protection},
  volume = {3},
  number = {3--4},
  pages = {103 - 117},
  year = {2010},
  issn = {1874-5482},
  doi = {10.1016/j.ijcip.2010.10.002},
  puburl = {http://www.sciencedirect.com/science/article/pii/S1874548210000429},
  url = {http://tylermoore.ens.utulsa.edu/ijcip10.pdf}
}
@article{BohmeM10ieeesp,
  author = {Rainer B{\"o}hme and
               Tyler Moore},
  title = {The Iterated Weakest Link},
  journal = {IEEE Security {\&} Privacy},
  volume = {8},
  number = {1},
  year = {2010},
  pages = {53-55},
  puburl = {http://doi.ieeecomputersociety.org/10.1109/MSP.2010.51},
  url = {http://tylermoore.ens.utulsa.edu/iwl-gordon.pdf}
}
@article{MoranM10ieeesp,
  author = {Tal Moran and
               Tyler Moore},
  title = {The Phish-Market Protocol: Secure Sharing Between Competitors},
  journal = {IEEE Security {\&} Privacy},
  volume = {8},
  number = {4},
  year = {2010},
  pages = {40-45},
  puburl = {http://doi.ieeecomputersociety.org/10.1109/MSP.2010.138},
  url = {http://tylermoore.ens.utulsa.edu/sp10phishmarket.pdf}
}
@article{Moore09JEP,
  author = {Tyler Moore and Richard Clayton and  Ross Anderson},
  title = {The Economics of Online Crime},
  journal = {Journal of Economic Perspectives},
  volume = 23,
  number = 3,
  month = {Summer},
  year = 2009,
  pages = {3--20},
  puburl = {http://www.aeaweb.org/articles.php?doi=10.1257/jep.23.3.3},
  url = {http://tylermoore.ens.utulsa.edu/jep09.pdf}
}
@article{DrewMEURASIP14,
  author = {Jake Drew and Tyler Moore},
  title = {Optimized Combined Clustering Methods for Finding Replicated Criminal Websites},
  journal = {{EURASIP} Journal on Information Security},
  year = 2014,
  volume = {2014},
  number = {14},
  url = {http://jis.eurasipjournals.com/content/2014/1/14/abstract}
}
@article{AndersonM06science,
  author = {Anderson, Ross and Moore, Tyler},
  title = {The Economics of Information Security},
  journal = {Science},
  volume = {314},
  number = {5799},
  pages = {610-613},
  year = {2006},
  doi = {10.1126/science.1130992},
  puburl = {http://www.sciencemag.org/content/314/5799/610.full.pdf},
  url = {http://tylermoore.ens.utulsa.edu/science-econ.pdf}
}
@article{VasekWM16tdsc,
  author = {Vasek, Marie and Wadleigh, John and Moore, Tyler},
  title = {Hacking is not random: a case-control study of webserver-compromise risk},
  journal = {IEEE Transactions on Dependable and Secure Computing},
  volume = {13},
  number = 2,
  year = 2016,
  pages = {206--219},
  url = {http://tylermoore.ens.utulsa.edu/tdsc15vasek.pdf},
  puburl = {http://dx.doi.org/10.1109/TDSC.2015.2427847}
}
@article{RiekBM16tdsc,
  author = {Riek, Markus and B\"ohme, Rainer and Moore, Tyler},
  title = {Measuring the Influence of Perceived Cybercrime Risk on Online Service Avoidance},
  journal = {IEEE Transactions on Dependable and Secure Computing},
  volume = {13},
  number = 2,
  year = 2016,
  pages = {261--273},
  url = {http://tylermoore.ens.utulsa.edu/tdsc15riek.pdf},
  puburl = {http://dx.doi.org/10.1109/TDSC.2015.2410795}
}
@article{BoehmeCEM15jep,
  author = {B\"ohme, Rainer and Christin, Nicolas and Edelman, Benjamin and Moore, Tyler},
  title = {Bitcoin: Economics, Technology, and Governance},
  journal = {Journal of Economic Perspectives},
  volume = {29},
  number = {2},
  year = {2015},
  pages = {213-38},
  doi = {10.1257/jep.29.2.213},
  puburl = {http://www.aeaweb.org/articles.php?doi=10.1257/jep.29.2.213}
}
@article{BohmeM16JIS,
  author = {Rainer B{\"o}hme and
               Tyler Moore},
  title = {The ``Iterated Weakest Link'' Model of Adaptive Security
               Investment},
  journal = {Journal of Information Security},
  volume = 7,
  number = 2,
  pages = {81--102},
  year = {2016},
  puburl = {http://dx.doi.org/10.4236/jis.2016.72006},
  url = {http://tylermoore.ens.utulsa.edu/jis16.pdf}
}
@article{CetinJGVM2016jcs,
  title = {Understanding the role of sender reputation in abuse reporting and cleanup},
  author = {Cetin, Orcun and Jhaveri, Mohammad Hanif and Ga{\~n}{\'a}n, Carlos and van Eeten, Michel and Moore, Tyler},
  journal = {Journal of Cybersecurity},
  volume = {2},
  number = {1},
  pages = {83--98},
  year = {2016},
  publisher = {Oxford University Press},
  puburl = {https://cybersecurity.oxfordjournals.org/content/2/1/83}
}
@article{JhaveriCGMV16csur,
  title = {Abuse Reporting and the Fight Against Cybercrime},
  author = {Jhaveri, Mohammad Hanif and Cetin, Orcun and Ga{\~n}{\'a}n, Carlos and Moore, Tyler and Eeten, Michel Van},
  journal = {ACM Computing Surveys (CSUR)},
  volume = {49},
  number = {4},
  pages = {68},
  year = {2017},
  publisher = {ACM},
  puburl = {http://dl.acm.org/citation.cfm?id=3003147},
  url = {http://tylermoore.ens.utulsa.edu/csur17.pdf}
}

This file was generated by bibtex2html 1.98.