[1] Tyler Moore and Richard Clayton. Discovering phishing dropboxes using email metadata. In 7th APWG eCrime Researchers Summit (eCrime), Las Croabas, PR, October 2012. [ bib | paper | presentation ]
[2] Rainer Böhme and Tyler Moore. How do consumers react to cybercrime? In APWG eCrime Researchers Summit (eCrime), Las Croabas, PR, October 2012. [ bib | paper | presentation ]
[3] Susan Landau and Tyler Moore. Economic tussles in federated identity management. First Monday, 17(10), 2012. [ bib | publisher | presentation ]
[4] Benjamin Edwards, Tyler Moore, George Stelle, Steven A. Hofmeyr, and Stephanie Forrest. Beyond the blacklist: Modeling malware spread and the effect of interventions. In Proceedings of the New Security Paradigms Workshop, Bertinoro, Italy, September 19-21, 2012. ACM, 2012. [ bib | paper ]
[5] Marie Vasek and Tyler Moore. Do malware reports expedite cleanup? An experimental study. In Proceedings of the 5th USENIX conference on Cyber Security Experimentation and Test, CSET'12, Berkeley, CA, USA, 2012. USENIX Association. [ bib | paper | publisher | presentation ]
[6] Ross Anderson, Chris Barton, Rainer Böhme, Richard Clayton, Michael van Eeten, Michael Levi, Tyler Moore, and Stefan Savage. Measuring the cost of cybercrime. In WEIS, 2012. [ bib | paper | presentation ]
[7] Tyler Moore and Ross Anderson. Internet security. In Martin Peitz and Joel Waldfogel, editors, The Oxford Handbook of the Digital Economy, pages 572-599. Oxford University Press, 2012. [ bib | paper | publisher ]
[8] Tyler Moore, Jie Han, and Richard Clayton. The postmodern Ponzi scheme: Empirical analysis of high-yield investment programs. In Angelos D. Keromytis, editor, Financial Cryptography, volume 7397 of Lecture Notes in Computer Science, pages 41-56. Springer, 2012. [ bib | paper | publisher | presentation ]
[9] Tyler Moore, Nektarios Leontiadis, and Nicolas Christin. Fashion crimes: trending-term exploitation on the web. In Yan Chen, George Danezis, and Vitaly Shmatikov, editors, ACM Conference on Computer and Communications Security, pages 455-466. ACM, 2011. [ bib | paper | publisher | presentation ]
[10] Nektarios Leontiadis, Tyler Moore, and Nicolas Christin. Measuring and analyzing search-redirection attacks in the illicit online prescription drug trade. In USENIX Security Symposium. USENIX Association, 2011. [ bib | paper | publisher ]
[11] Steven A. Hofmeyr, Tyler Moore, Stephanie Forrest, Benjamin Edwards, and George Stelle. Modeling internet-scale policies for cleaning up malware. In WEIS, 2011. [ bib | paper | publisher ]
[12] Susan Landau and Tyler Moore. Economic tussles in federated identity management. In WEIS, 2011. [ bib | publisher | presentation ]
[13] Tyler Moore and Richard Clayton. Ethical dilemmas in take-down research. In George Danezis, Sven Dietrich, and Kazue Sako, editors, Financial Cryptography Workshops, volume 7126 of Lecture Notes in Computer Science, pages 154-168. Springer, 2011. [ bib | paper | publisher | presentation ]
[14] Tyler Moore and Richard Clayton. The impact of public information on phishing attack and defense. Communications & Strategies, 1(81):45-68, 1st quart 2011. [ bib | paper | publisher ]
[15] Tyler Moore. The economics of cybersecurity: Principles and policy options. International Journal of Critical Infrastructure Protection, 3(3–4):103 - 117, 2010. [ bib | DOI | paper | publisher ]
[16] Tyler Moore. The economics of cybersecurity: Principles and policy options. In Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy. The National Academies Press, 2010. [ bib | publisher ]
[17] Tyler Moore, Allan Friedman, and Ariel D. Procaccia. Would a 'cyber warrior' protect us: exploring trade-offs between attack and defense of information systems. In Angelos D. Keromytis, Sean Peisert, Richard Ford, and Carrie Gates, editors, NSPW, pages 85-94. ACM, 2010. [ bib | paper | publisher ]
[18] Rainer Böhme and Tyler Moore. The iterated weakest link. IEEE Security & Privacy, 8(1):53-55, 2010. [ bib | paper | publisher ]
[19] Tal Moran and Tyler Moore. The phish-market protocol: Secure sharing between competitors. IEEE Security & Privacy, 8(4):40-45, 2010. [ bib | paper | publisher ]
[20] Tal Moran and Tyler Moore. The phish-market protocol: Securely sharing attack data between competitors. In Radu Sion, editor, Financial Cryptography, volume 6052 of Lecture Notes in Computer Science, pages 222-237. Springer, 2010. [ bib | paper | publisher | presentation ]
[21] Tyler Moore and Benjamin Edelman. Measuring the perpetrators and funders of typosquatting. In Radu Sion, editor, Financial Cryptography, volume 6052 of Lecture Notes in Computer Science, pages 175-191. Springer, 2010. [ bib | paper | publisher | presentation ]
[22] Tyler Moore, Richard Clayton, and Ross Anderson. The economics of online crime. Journal of Economic Perspectives, 23(3):3-20, Summer 2009. [ bib | paper | publisher ]
[23] Rainer Böhme and Tyler Moore. The iterated weakest link - a model of adaptive security investment. In WEIS, 2009. [ bib | paper | publisher | presentation ]
[24] Tyler Moore, Richard Clayton, and Henry Stern. Temporal correlations between spam and phishing websites. In Proceedings of the 2nd USENIX conference on Large-scale exploits and emergent threats: botnets, spyware, worms, and more, LEET'09, Berkeley, CA, USA, 2009. USENIX Association. [ bib | paper | publisher | presentation ]
[25] Tyler Moore and Richard Clayton. Evil searching: Compromise and recompromise of internet hosts for phishing. In Roger Dingledine and Philippe Golle, editors, Financial Cryptography, volume 5628 of Lecture Notes in Computer Science, pages 256-272. Springer, 2009. [ bib | paper | publisher | presentation ]
[26] Tyler Moore and Richard Clayton. The impact of incentives on notice and take-down. In M.E. Johnson, editor, Managing Information Risk and the Economics of Security, pages 199-223. Springer, 2009. [ bib | paper | publisher | presentation ]
[27] Ross Anderson, Rainer Böhme, Richard Clayton, and Tyler Moore. Security economics and European policy. In M.E. Johnson, editor, Managing Information Risk and the Economics of Security, pages 55-80. Springer, 2009. [ bib | DOI | paper | publisher ]
[28] Ross Anderson, Rainer Böhme, Richard Clayton, and Tyler Moore. Security economics and European policy. In Norbert Pohlmann, Helmut Reimer, and Wolfgang Schneider, editors, ISSE, pages 57-76. Vieweg+Teubner, 2008. [ bib | publisher ]
[29] Tyler Moore and Richard Clayton. Evaluating the wisdom of crowds in assessing phishing websites. In Gene Tsudik, editor, Financial Cryptography, volume 5143 of Lecture Notes in Computer Science, pages 16-30. Springer, 2008. [ bib | paper | publisher | presentation ]
[30] Ross Anderson and Tyler Moore. Information security economics - and beyond. In Alfred Menezes, editor, CRYPTO, volume 4622 of Lecture Notes in Computer Science, pages 68-91. Springer, 2007. [ bib | paper | publisher ]
[31] Ross Anderson, Tyler Moore, Shishir Nagaraja, and Andy Ozment. Incentives and information security. In Noam Nisan, Tim Roughgarden, Eva Tardos, and Vijay V. Vazirani, editors, Algorithmic Game Theory, pages 633-649. Cambridge University Press, New York, NY, USA, 2007. [ bib ]
[32] Tyler Moore and Richard Clayton. Examining the impact of website take-down on phishing. In Lorrie Faith Cranor, editor, eCrime Researchers Summit, volume 269 of ACM International Conference Proceeding Series, pages 1-13. ACM, 2007. [ bib | paper | publisher | presentation ]
[33] Tyler Moore and Richard Clayton. An empirical analysis of the current state of phishing attack and defence. In WEIS, 2007. [ bib | paper | publisher | presentation ]
[34] Ross Anderson and Tyler Moore. The economics of information security. Science, 314(5799):610-613, 2006. [ bib | DOI | paper | publisher ]
[35] Tyler Moore. The economics of digital forensics. In WEIS, 2006. [ bib | paper | publisher ]
[36] Tyler Moore. Countering hidden-action attacks on networked systems. In WEIS, 2005. [ bib | paper | publisher | presentation ]

This file was generated by bibtex2html 1.96.