@inproceedings{WadleighDM15www, author = {John Wadleigh and Jake Drew and Tyler Moore}, title = {The E-Commerce Market for ``Lemons'': Identification and nalysis of Websites Selling Counterfeit Goods}, booktitle = {International World Wide Web Conference (Security and Privacy Track)}, year = {2015}, month = {May}, publisher = {ACM} }
@inproceedings{VasekM15fc, author = {Marie Vasek and Tyler Moore}, title = {There's no free lunch, even using {B}itcoin: Tracking the Popularity and Profits of Virtual Currency Scams}, booktitle = {Financial Cryptography and Data Security}, year = {2015}, month = {January}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {(to appear)}, url = {http://lyle.smu.edu/~tylerm/fc15.pdf} }
@inproceedings{LeontiadisMC14, author = {Leontiadis, Nektarios and Moore, Tyler and Christin, Nicolas}, title = {A Nearly Four-Year Longitudinal Study of Search-Engine Poisoning}, booktitle = {Proceedings of the 2014 ACM Conference on Computer and Communications Security}, series = {CCS '14}, year = {2014}, isbn = {978-1-4503-2957-6}, location = {Scottsdale, Arizona, USA}, pages = {930--941}, numpages = {12}, puburl = {http://doi.acm.org/10.1145/2660267.2660332}, url = {http://lyle.smu.edu/~tylerm/ccs14.pdf}, doi = {10.1145/2660267.2660332}, acmid = {2660332}, publisher = {ACM}, address = {New York, NY, USA}, keywords = {online crime, search engines, web security} }
@article{DrewMEURASIP14, author = {Jake Drew and Tyler Moore}, title = {Optimized Combined Clustering Methods for Finding Replicated Criminal Websites}, journal = {{EURASIP} Journal on Information Security}, year = 2014, volume = {2014}, number = {14}, url = {http://jis.eurasipjournals.com/content/2014/1/14/abstract} }
@inproceedings{RiekBM14weis, author = {Markus Riek and Rainer B{\"o}hme and Tyler Moore}, title = {Understanding the Influence of Cybercrime Risk on the E-Service Adoption of {E}uropean {I}nternet Users}, booktitle = {WEIS}, year = {2014}, url = {http://lyle.smu.edu/~tylerm/weis14.pdf}, crossref = {2014weis} }
@proceedings{2014weis, title = {13th Annual Workshop on the Economics of Information Security, WEIS 2014, State College, Pennsylvania, 23-24 June, 2014}, booktitle = {WEIS}, year = {2014} }
@inproceedings{MooreC14fc, author = {Tyler Moore and Richard Clayton}, title = {The Ghosts of Banking Past: {E}mpirical Analysis of Closed Bank Websites}, booktitle = {Financial Cryptography and Data Security}, year = {2014}, month = {March}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {8437}, dataurl = {http://dx.doi.org/10.7910/DVN/26011}, url = {http://lyle.smu.edu/~tylerm/fc14ghosts.pdf}, presurl = {http://lyle.smu.edu/~tylerm/fc14banks-pres.pdf}, puburl = {http://dx.doi.org/10.1007/978-3-662-45472-5_3}, pages = {33--48} }
@inproceedings{VasekM14fc, author = {Marie Vasek and Tyler Moore}, title = {Identifying Risk Factors for Webserver Compromise}, booktitle = {Financial Cryptography and Data Security}, year = {2014}, month = {March}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {8437}, dataurl = {http://dx.doi.org/10.7910/DVN/25608}, url = {http://lyle.smu.edu/~tylerm/fc14rf.pdf}, puburl = {http://dx.doi.org/10.1007/978-3-662-45472-5_22}, pages = {326--345} }
@inproceedings{VasekTM14bitcoin, author = {Marie Vasek and Micah Thornton and Tyler Moore}, title = {Empirical Analysis of Denial-of-Service Attacks in the {B}itcoin Ecosystem}, booktitle = {1st Workshop on Bitcoin Research}, year = {2014}, month = {March}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {8438}, pages = {57--71}, puburl = {http://dx.doi.org/10.1007/978-3-662-44774-1_5}, dataurl = {http://dx.doi.org/10.7910/DVN/25541}, url = {http://lyle.smu.edu/~tylerm/bitcoin14ddos.pdf} }
@inproceedings{JohnsonLGVM14bitcoin, author = {Benjamin Johnson and Aron Laszka and Jens Grossklags and Marie Vasek and Tyler Moore}, title = {Game-Theoretic Analysis of {DDoS} Attacks Against {B}itcoin Mining Pools}, booktitle = {1st Workshop on Bitcoin Research}, year = {2014}, month = {March}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {8438}, pages = {72--86}, url = {http://lyle.smu.edu/~tylerm/bitcoin14gt.pdf}, puburl = {http://dx.doi.org/10.1007/978-3-662-44774-1_6} }
@inproceedings{DrewM14iwcc, author = {Jake Drew and Tyler Moore}, title = {Automatic Identification of Replicated Criminal Websites Using Combined Clustering}, booktitle = {International Workshop on Cyber Crime (IWCC), IEEE Security and Privacy Workshops}, year = {2014}, publisher = {IEEE}, url = {http://lyle.smu.edu/~tylerm/iwcc14.pdf} }
@inproceedings{VasekM13ecrime, author = {Marie Vasek and Tyler Moore}, title = {Empirical Analysis of Factors Affecting Malware {URL} Detection}, booktitle = {8th APWG eCrime Researchers Summit (eCrime)}, year = {2013}, month = {September}, url = {http://lyle.smu.edu/~tylerm/ecrime13.pdf} }
@inproceedings{LeontiadisMC13ec, author = {Nektarios Leontiadis and Tyler Moore and Nicolas Christin}, title = {Pick Your Poison: {P}ricing and Inventories at Unlicensed Online Pharmacies}, booktitle = {ACM Conference on Electronic Commerce (EC)}, url = {http://lyle.smu.edu/~tylerm/ec13.pdf}, puburl = {http://dl.acm.org/citation.cfm?id=2482610}, publisher = {ACM}, year = {2013}, month = {June}, pages = {621-638} }
@inproceedings{MooreC13fc, author = {Tyler Moore and Nicolas Christin}, title = {Beware the Middleman: Empirical Analysis of {B}itcoin-Exchange Risk}, booktitle = {Financial Cryptography and Data Security}, year = {2013}, month = {April}, url = {http://lyle.smu.edu/~tylerm/fc13.pdf}, presurl = {http://lyle.smu.edu/~tylerm/fc13pres.pdf}, puburl = {http://dx.doi.org/10.1007/978-3-642-39884-1_3}, dataurl = {http://dx.doi.org/10.7910/DVN/25545}, pages = {25-33}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {7859} }
@article{PapaCM13ifip, author = {Steve Papa and William Casper and Tyler Moore}, title = {Securing wastewater facilities from accidental and intentional harm: a cost-benefit analysis}, journal = {International Journal of Critical Infrastructure Protection}, year = {2013}, volume = 6, number = 2, pages = {96-106}, url = {http://lyle.smu.edu/~tylerm/ijcip13.pdf}, puburl = {http://dx.doi.org/10.1016/j.ijcip.2013.05.002} }
@inproceedings{MooreC12ecrime, author = {Tyler Moore and Richard Clayton}, title = {Discovering Phishing Dropboxes Using Email Metadata}, booktitle = {7th APWG eCrime Researchers Summit (eCrime)}, year = {2012}, month = {October}, pages = {}, url = {http://lyle.smu.edu/~tylerm/ecrime12dropbox.pdf}, presurl = {http://lyle.smu.edu/~tylerm/ecrime12dropboxpres.pdf} }
@inproceedings{BoehmeM12ecrime, author = {Rainer B{\"o}hme and Tyler Moore}, title = {How Do Consumers React to Cybercrime?}, booktitle = {APWG eCrime Researchers Summit (eCrime)}, year = {2012}, month = {October}, pages = {}, url = {http://lyle.smu.edu/~tylerm/ecrime12eurobar.pdf}, presurl = {http://lyle.smu.edu/~tylerm/ecrime12eurobarpres.pdf} }
@article{LandauM12firstmonday, author = {Susan Landau and Tyler Moore}, title = {Economic tussles in federated identity management}, journal = {First Monday}, volume = {17}, number = {10}, year = {2012}, puburl = {http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/4254}, presurl = {http://lyle.smu.edu/~tylerm/nist12pres.pdf} }
@inproceedings{EdwardsMSHF12nspw, author = {Benjamin Edwards and Tyler Moore and George Stelle and Steven A. Hofmeyr and Stephanie Forrest}, title = {Beyond the Blacklist: Modeling Malware Spread and the Effect of Interventions}, booktitle = {Proceedings of the New Security Paradigms Workshop, Bertinoro, Italy, September 19-21, 2012}, year = {2012}, publisher = {ACM}, url = {http://lyle.smu.edu/~tylerm/nspw12.pdf} }
@inproceedings{VasekM12cset, author = {Vasek, Marie and Moore, Tyler}, title = {Do malware reports expedite cleanup? {A}n experimental study}, booktitle = {Proceedings of the 5th USENIX conference on Cyber Security Experimentation and Test}, series = {CSET'12}, year = {2012}, location = {Bellevue, WA}, puburl = {https://www.usenix.org/system/files/conference/cset12/cset12-final20.pdf}, url = {http://lyle.smu.edu/~tylerm/cset12.pdf}, presurl = {https://www.usenix.org/sites/default/files/conference/protected-files/vasek_cset12_slides.pdf}, dataurl = {http://dx.doi.org/10.7910/DVN/25571}, publisher = {USENIX Association}, address = {Berkeley, CA, USA} }
@inproceedings{AndersonBBCELMS12weis, author = {Ross Anderson and Chris Barton and Rainer B{\"o}hme and Richard Clayton and Michael van Eeten and Michael Levi and Tyler Moore and Stefan Savage}, title = {Measuring the Cost of Cybercrime}, booktitle = {WEIS}, year = {2012}, url = {http://lyle.smu.edu/~tylerm/weis12.pdf}, crossref = {2012weis}, presurl = {http://lyle.smu.edu/~tylerm/weis12pres.pdf} }
@proceedings{2012weis, title = {11th Annual Workshop on the Economics of Information Security, WEIS 2012, Berlin, Germany, 25-26 June, 2012}, booktitle = {WEIS}, year = {2012} }
@incollection{MooreA12oxford, author = {Tyler Moore and Ross Anderson}, title = {Internet Security}, editor = {Martin Peitz and Joel Waldfogel}, booktitle = {The Oxford Handbook of the Digital Economy}, pages = {572-599}, year = 2012, publisher = {Oxford University Press}, puburl = {http://www.oxfordhandbooks.com/10.1093/oxfordhb/9780195397840.001.0001/oxfordhb-9780195397840-e-21}, url = {http://lyle.smu.edu/~tylerm/oxford12.pdf} }
@inproceedings{MooreHC12fc, author = {Tyler Moore and Jie Han and Richard Clayton}, title = {The Postmodern {P}onzi Scheme: Empirical Analysis of High-Yield Investment Programs}, booktitle = {Financial Cryptography and Data Security}, year = {2012}, pages = {41-56}, puburl = {http://dx.doi.org/10.1007/978-3-642-32946-3_4}, url = {http://lyle.smu.edu/~tylerm/fc12.pdf}, presurl = {http://lyle.smu.edu/~tylerm/fc12pres.pdf}, crossref = {2012fc} }
@proceedings{2012fc, editor = {Angelos D. Keromytis}, title = {Financial Cryptography and Data Security - 16th International Conference, FC 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised Selected Papers}, booktitle = {Financial Cryptography and Data Security}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {7397}, year = {2012}, isbn = {978-3-642-32945-6}, puburl = {http://dx.doi.org/10.1007/978-3-642-32946-3} }
@inproceedings{MooreLC11ccs, author = {Tyler Moore and Nektarios Leontiadis and Nicolas Christin}, title = {Fashion crimes: trending-term exploitation on the web}, booktitle = {ACM Conference on Computer and Communications Security}, year = {2011}, pages = {455-466}, url = {http://lyle.smu.edu/~tylerm/ccs11.pdf}, puburl = {http://doi.acm.org/10.1145/2046707.2046761}, presurl = {http://lyle.smu.edu/~tylerm/ccs11pres.pdf}, crossref = {2011ccs} }
@proceedings{2011ccs, editor = {Yan Chen and George Danezis and Vitaly Shmatikov}, title = {Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS 2011, Chicago, Illinois, USA, October 17-21, 2011}, booktitle = {ACM Conference on Computer and Communications Security}, publisher = {ACM}, year = {2011}, isbn = {978-1-4503-0948-6} }
@inproceedings{LeontiadisMC11uss, author = {Nektarios Leontiadis and Tyler Moore and Nicolas Christin}, title = {Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade}, booktitle = {USENIX Security Symposium}, year = {2011}, url = {http://lyle.smu.edu/~tylerm/usenix11.pdf}, puburl = {http://static.usenix.org/events/sec11/tech/full_papers/Leontiadis.pdf}, crossref = {2011uss} }
@proceedings{2011uss, title = {20th USENIX Security Symposium, San Francisco, CA, USA, August 8-12, 2011, Proceedings}, booktitle = {USENIX Security Symposium}, publisher = {USENIX Association}, year = {2011} }
@inproceedings{HofmeyrMFES11weis, author = {Steven A. Hofmeyr and Tyler Moore and Stephanie Forrest and Benjamin Edwards and George Stelle}, title = {Modeling Internet-Scale Policies for Cleaning up Malware}, booktitle = {WEIS}, year = {2011}, url = {http://lyle.smu.edu/~tylerm/weis11model.pdf}, puburl = {http://weis2011.econinfosec.org/papers/Modeling\%20Internet-Scale\%20Policies\%20for\%20Cleaning\%20up\%20Malware.pdf}, crossref = {2011weis} }
@proceedings{2011weis, title = {10th Annual Workshop on the Economics of Information Security, WEIS 2011, George Mason University, Fairfax, VA, USA, June 14-15, 2011}, booktitle = {WEIS}, year = {2011} }
@inproceedings{LandauM11weis, author = {Susan Landau and Tyler Moore}, title = {Economic Tussles in Federated Identity Management}, booktitle = {WEIS}, year = {2011}, puburl = {http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/4254}, presurl = {http://lyle.smu.edu/~tylerm/nist12pres.pdf}, crossref = {2011weis} }
@inproceedings{MooreC11fc, author = {Tyler Moore and Richard Clayton}, title = {Ethical Dilemmas in Take-Down Research}, booktitle = {Financial Cryptography Workshops}, year = {2011}, pages = {154-168}, url = {http://lyle.smu.edu/~tylerm/wecsr11.pdf}, presurl = {http://lyle.smu.edu/~tylerm/wecsr11pres.pdf}, puburl = {http://dx.doi.org/10.1007/978-3-642-29889-9_14}, crossref = {2011wfc} }
@proceedings{2011wfc, editor = {George Danezis and Sven Dietrich and Kazue Sako}, title = {Financial Cryptography and Data Security - FC 2011 Workshops, RLCPS and WECSR 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers}, booktitle = {Financial Cryptography Workshops}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {7126}, year = {2012}, isbn = {978-3-642-29888-2}, puburl = {http://dx.doi.org/10.1007/978-3-642-29889-9} }
@article{RePEc:idt:journl:cs8102, author = {Tyler Moore and Richard Clayton}, title = {The Impact of Public Information on Phishing Attack and Defense}, journal = {Communications \& Strategies}, year = 2011, volume = {1}, number = {81}, pages = {45-68}, month = {1st quart}, keywords = {security economics; online crime; phishing; transparency}, puburl = {http://ideas.repec.org/a/idt/journl/cs8102.html}, url = {http://lyle.smu.edu/~tylerm/cs81.pdf} }
@article{Moore10ijcip, author = {Tyler Moore}, title = {The economics of cybersecurity: Principles and policy options}, journal = {International Journal of Critical Infrastructure Protection}, volume = {3}, number = {3–4}, pages = {103 - 117}, year = {2010}, issn = {1874-5482}, doi = {10.1016/j.ijcip.2010.10.002}, puburl = {http://www.sciencedirect.com/science/article/pii/S1874548210000429}, url = {http://lyle.smu.edu/~tylerm/ijcip10.pdf} }
@incollection{Moore10nas, author = {Tyler Moore}, title = {The economics of cybersecurity: Principles and policy options}, booktitle = {Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy}, isbn = {9780309160353}, puburl = {http://books.nap.edu/openbook.php?record_id=12997&page=3}, year = {2010}, publisher = {The National Academies Press} }
@inproceedings{MooreFP10nspw, author = {Tyler Moore and Allan Friedman and Ariel D. Procaccia}, title = {Would a 'cyber warrior' protect us: exploring trade-offs between attack and defense of information systems}, booktitle = {NSPW}, year = {2010}, pages = {85-94}, url = {http://lyle.smu.edu/~tylerm/nspw10.pdf}, puburl = {http://doi.acm.org/10.1145/1900546.1900559}, crossref = {2010nspw} }
@proceedings{2010nspw, editor = {Angelos D. Keromytis and Sean Peisert and Richard Ford and Carrie Gates}, title = {Proceedings of the New Security Paradigms Workshop, Concord, MA, USA, September 21-23, 2010}, booktitle = {NSPW}, publisher = {ACM}, year = {2010}, isbn = {978-1-4503-0415-3} }
@article{BohmeM10ieeesp, author = {Rainer B{\"o}hme and Tyler Moore}, title = {The Iterated Weakest Link}, journal = {IEEE Security {\&} Privacy}, volume = {8}, number = {1}, year = {2010}, pages = {53-55}, puburl = {http://doi.ieeecomputersociety.org/10.1109/MSP.2010.51}, url = {http://lyle.smu.edu/~tylerm/iwl-gordon.pdf} }
@article{MoranM10ieeesp, author = {Tal Moran and Tyler Moore}, title = {The Phish-Market Protocol: Secure Sharing Between Competitors}, journal = {IEEE Security {\&} Privacy}, volume = {8}, number = {4}, year = {2010}, pages = {40-45}, puburl = {http://doi.ieeecomputersociety.org/10.1109/MSP.2010.138}, url = {http://lyle.smu.edu/~tylerm/sp10phishmarket.pdf} }
@inproceedings{MoranM10fc, author = {Tal Moran and Tyler Moore}, title = {The Phish-Market Protocol: Securely Sharing Attack Data between Competitors}, booktitle = {Financial Cryptography and Data Security}, year = {2010}, pages = {222-237}, puburl = {http://dx.doi.org/10.1007/978-3-642-14577-3_18}, url = {http://lyle.smu.edu/~tylerm/fc10phishmarket.pdf}, presurl = {http://lyle.smu.edu/~tylerm/fc10phishmarketpres.pdf}, crossref = {2010fc} }
@inproceedings{MooreE10fc, author = {Tyler Moore and Benjamin Edelman}, title = {Measuring the Perpetrators and Funders of Typosquatting}, booktitle = {Financial Cryptography and Data Security}, year = {2010}, pages = {175-191}, puburl = {http://dx.doi.org/10.1007/978-3-642-14577-3_15}, url = {http://lyle.smu.edu/~tylerm/fc10typo.pdf}, presurl = {http://lyle.smu.edu/~tylerm/fc10typopres.pdf}, dataurl = {http://www.benedelman.org/typosquatting/}, crossref = {2010fc} }
@proceedings{2010fc, editor = {Radu Sion}, title = {Financial Cryptography and Data Security, 14th International Conference, FC 2010, Tenerife, Canary Islands, January 25-28, 2010, Revised Selected Papers}, booktitle = {Financial Cryptography and Data Security}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {6052}, year = {2010}, isbn = {978-3-642-14576-6}, puburl = {http://dx.doi.org/10.1007/978-3-642-14577-3} }
@article{Moore09JEP, author = {Tyler Moore and Richard Clayton and Ross Anderson}, title = {The Economics of Online Crime}, journal = {Journal of Economic Perspectives}, volume = 23, number = 3, month = {Summer}, year = 2009, pages = {3--20}, puburl = {http://www.aeaweb.org/articles.php?doi=10.1257/jep.23.3.3}, url = {http://lyle.smu.edu/~tylerm/jep09.pdf} }
@inproceedings{BohmeM09weis, author = {Rainer B{\"o}hme and Tyler Moore}, title = {The Iterated Weakest Link - A Model of Adaptive Security Investment}, booktitle = {WEIS}, year = {2009}, url = {http://lyle.smu.edu/~tylerm/weis09.pdf}, presurl = {http://lyle.smu.edu/~tylerm/weis09pres.pdf}, puburl = {http://weis09.infosecon.net/files/152/index.html}, crossref = {2009weis} }
@proceedings{2009weis, title = {8th Annual Workshop on the Economics of Information Security, WEIS 2009, University College London, England, UK, June 24-25, 2009}, booktitle = {WEIS}, year = {2009} }
@inproceedings{MooreCS09leet, author = {Moore, Tyler and Clayton, Richard and Stern, Henry}, title = {Temporal correlations between spam and phishing websites}, booktitle = {Proceedings of the 2nd USENIX conference on Large-scale exploits and emergent threats: botnets, spyware, worms, and more}, series = {LEET'09}, year = {2009}, location = {Boston, MA}, puburl = {https://www.usenix.org/conference/leet-09/temporal-correlations-between-spam-and-phishing-websites}, url = {http://lyle.smu.edu/~tylerm/leet09.pdf}, presurl = {http://lyle.smu.edu/~tylerm/leet09pres.pdf}, publisher = {USENIX Association}, address = {Berkeley, CA, USA} }
@inproceedings{MooreC09fc, author = {Tyler Moore and Richard Clayton}, title = {Evil Searching: Compromise and Recompromise of Internet Hosts for Phishing}, booktitle = {Financial Cryptography and Data Security}, year = {2009}, pages = {256-272}, puburl = {http://dx.doi.org/10.1007/978-3-642-03549-4_16}, url = {http://lyle.smu.edu/~tylerm/fc09.pdf}, presurl = {http://lyle.smu.edu/~tylerm/fc09pres.pdf}, crossref = {2009fc} }
@proceedings{2009fc, editor = {Roger Dingledine and Philippe Golle}, title = {Financial Cryptography and Data Security, 13th International Conference, FC 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers}, booktitle = {Financial Cryptography and Data Security}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {5628}, year = {2009}, puburl = {http://dx.doi.org/10.1007/978-3-642-03549-4} }
@inproceedings{MooreC08ecrime, author = {Tyler Moore and Richard Clayton}, title = {The Consequence of Non-Cooperation in the Fight Against Phishing}, booktitle = {APWG eCrime Researchers Summit}, year = {2008}, pages = {1-14}, puburl = {http://dx.doi.org/10.1109/ECRIME.2008.4696968}, url = {http://lyle.smu.edu/~tylerm/ecrime08.pdf}, presurl = {http://lyle.smu.edu/~tylerm/ecrime08pres.pdf}, publisher = {IEEE} }
@incollection{MooreC08weis, author = {Tyler Moore and Richard Clayton}, title = {The Impact of Incentives on Notice and Take-down}, editor = {M.E. Johnson}, booktitle = {Managing Information Risk and the Economics of Security}, pages = {199-223}, year = 2009, publisher = {Springer}, puburl = {http://dx.doi.org/10.1007/978-0-387-09762-6_10}, url = {http://lyle.smu.edu/~tylerm/weis08takedown.pdf}, presurl = {http://lyle.smu.edu/~tylerm/weis08takedownpres.pdf}, isbn = {978-0-387-09761-9} }
@incollection{AndersonBCM08weis, author = {Ross Anderson and Rainer B{\"o}hme and Richard Clayton and Tyler Moore}, title = {Security Economics and {E}uropean Policy}, editor = {M.E. Johnson}, booktitle = {Managing Information Risk and the Economics of Security}, doi = {10.1007/978-0-387-09762-6_3}, puburl = {http://dx.doi.org/10.1007/978-0-387-09762-6_3}, url = {http://lyle.smu.edu/~tylerm/weis08enisa.pdf}, publisher = {Springer}, pages = {55-80}, isbn = {978-0-387-09761-9}, year = 2009 }
@inproceedings{AndersonBCM08isse, author = {Ross Anderson and Rainer B{\"o}hme and Richard Clayton and Tyler Moore}, title = {Security Economics and {E}uropean Policy}, booktitle = {ISSE}, year = {2008}, pages = {57-76}, puburl = {http://dx.doi.org/10.1007/978-3-8348-9283-6_6}, crossref = {2008isse} }
@proceedings{2008isse, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, title = {ISSE 2008 - Securing Electronic Busines Processes, Highlights of the Information Security Solutions Europe 2008 Conference, 7-9 October 2008, Madrid, Spain}, booktitle = {ISSE}, publisher = {Vieweg+Teubner}, year = {2009}, isbn = {978-3-8348-0660-4}, puburl = {http://dx.doi.org/10.1007/978-3-8348-9283-6} }
@inproceedings{MooreC08fc, author = {Tyler Moore and Richard Clayton}, title = {Evaluating the Wisdom of Crowds in Assessing Phishing Websites}, booktitle = {Financial Cryptography and Data Security}, year = {2008}, pages = {16-30}, puburl = {http://dx.doi.org/10.1007/978-3-540-85230-8_2}, url = {http://lyle.smu.edu/~tylerm/fc08.pdf}, presurl = {http://lyle.smu.edu/~tylerm/fc08pres.pdf}, crossref = {2008fc} }
@proceedings{2008fc, editor = {Gene Tsudik}, title = {Financial Cryptography and Data Security, 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected Papers}, booktitle = {Financial Cryptography and Data Security}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {5143}, year = {2008}, isbn = {978-3-540-85229-2} }
@inproceedings{AndersonM07crypto, author = {Ross Anderson and Tyler Moore}, title = {Information Security Economics - and Beyond}, booktitle = {CRYPTO}, year = {2007}, pages = {68-91}, puburl = {http://dx.doi.org/10.1007/978-3-540-74143-5_5}, url = {http://lyle.smu.edu/~tylerm/crypto07.pdf}, crossref = {2007crypto} }
@proceedings{2007crypto, editor = {Alfred Menezes}, title = {Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings}, booktitle = {CRYPTO}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {4622}, year = {2007}, isbn = {978-3-540-74142-8} }
@incollection{AndersonMNO07, author = {Ross Anderson and Tyler Moore and Shishir Nagaraja and Andy Ozment}, title = {Incentives and Information Security}, editor = {Nisan, Noam and Roughgarden, Tim and Tardos, Eva and Vazirani, Vijay V.}, pages = {633-649}, booktitle = {Algorithmic Game Theory}, year = {2007}, isbn = {0521872820}, publisher = {Cambridge University Press}, address = {New York, NY, USA} }
@inproceedings{MooreC07ecrime, author = {Tyler Moore and Richard Clayton}, title = {Examining the impact of website take-down on phishing}, booktitle = {APWG eCrime Researchers Summit}, year = {2007}, pages = {1-13}, puburl = {http://doi.acm.org/10.1145/1299015.1299016}, url = {http://lyle.smu.edu/~tylerm/ecrime07.pdf}, presurl = {http://lyle.smu.edu/~tylerm/ecrime07pres.pdf}, crossref = {2007ecrime} }
@proceedings{2007ecrime, editor = {Lorrie Faith Cranor}, title = {Proceedings of the Anti-Phishing Working Groups 2nd Annual eCrime Researchers Summit 2007, Pittsburgh, Pennsylvania, USA, October 4-5, 2007}, booktitle = {eCrime Researchers Summit}, publisher = {ACM}, series = {ACM International Conference Proceeding Series}, volume = {269}, year = {2007} }
@inproceedings{MooreC07weis, author = {Tyler Moore and Richard Clayton}, title = {An Empirical Analysis of the Current State of Phishing Attack and Defence}, booktitle = {WEIS}, year = {2007}, puburl = {http://weis2007.econinfosec.org/papers/51.pdf}, url = {http://lyle.smu.edu/~tylerm/weis07.pdf}, presurl = {http://lyle.smu.edu/~tylerm/weis07pres.pdf}, crossref = {2007weis} }
@proceedings{2007weis, title = {6th Annual Workshop on the Economics of Information Security, WEIS 2007, The Heinz School and CyLab at Carnegie Mellon University, Pittsburgh, PA, USA, June 7-8, 2007}, booktitle = {WEIS}, year = {2007} }
@article{AndersonM06science, author = {Anderson, Ross and Moore, Tyler}, title = {The Economics of Information Security}, journal = {Science}, volume = {314}, number = {5799}, pages = {610-613}, year = {2006}, doi = {10.1126/science.1130992}, puburl = {http://www.sciencemag.org/content/314/5799/610.full.pdf}, url = {http://lyle.smu.edu/~tylerm/science-econ.pdf} }
@inproceedings{Moore06weis, author = {Tyler Moore}, title = {The Economics of Digital Forensics}, booktitle = {WEIS}, year = {2006}, puburl = {http://weis2006.econinfosec.org/docs/14.pdf}, url = {http://lyle.smu.edu/~tylerm/weis06.pdf}, crossref = {2006weis} }
@proceedings{2006weis, title = {5th Annual Workshop on the Economics of Information Security, WEIS 2006, Robinson College, University of Cambridge, England, UK, June 26-28, 2006}, booktitle = {WEIS}, year = {2006} }
@inproceedings{Moore05weis, author = {Tyler Moore}, title = {Countering Hidden-Action Attacks on Networked Systems}, booktitle = {WEIS}, year = {2005}, puburl = {http://infosecon.net/workshop/pdf/18.pdf}, url = {http://lyle.smu.edu/~tylerm/weis05.pdf}, presurl = {http://lyle.smu.edu/~tylerm/weis05pres.pdf}, crossref = {2005weis} }
@proceedings{2005weis, title = {4th Annual Workshop on the Economics of Information Security, WEIS 2005, Harvard University, Cambridge, MA, USA, June 1-3, 2005}, booktitle = {WEIS}, year = {2005} }
This file was generated by bibtex2html 1.97.