MooreTylerSecon.bib

@inproceedings{WadleighDM15www,
  author = {John Wadleigh and Jake Drew and Tyler Moore},
  title = {The E-Commerce Market for ``Lemons'': Identification and nalysis of Websites Selling Counterfeit Goods},
  booktitle = {International World Wide Web Conference (Security and Privacy Track)},
  year = {2015},
  month = {May},
  publisher = {ACM}
}
@inproceedings{VasekM15fc,
  author = {Marie Vasek and Tyler Moore},
  title = {There's no free lunch, even using {B}itcoin: Tracking the Popularity and Profits of Virtual Currency Scams},
  booktitle = {Financial Cryptography and Data Security},
  year = {2015},
  month = {January},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {(to appear)},
  url = {http://lyle.smu.edu/~tylerm/fc15.pdf}
}
@inproceedings{LeontiadisMC14,
  author = {Leontiadis, Nektarios and Moore, Tyler and Christin, Nicolas},
  title = {A Nearly Four-Year Longitudinal Study of Search-Engine Poisoning},
  booktitle = {Proceedings of the 2014 ACM Conference on Computer and Communications Security},
  series = {CCS '14},
  year = {2014},
  isbn = {978-1-4503-2957-6},
  location = {Scottsdale, Arizona, USA},
  pages = {930--941},
  numpages = {12},
  puburl = {http://doi.acm.org/10.1145/2660267.2660332},
  url = {http://lyle.smu.edu/~tylerm/ccs14.pdf},
  doi = {10.1145/2660267.2660332},
  acmid = {2660332},
  publisher = {ACM},
  address = {New York, NY, USA},
  keywords = {online crime, search engines, web security}
}
@article{DrewMEURASIP14,
  author = {Jake Drew and Tyler Moore},
  title = {Optimized Combined Clustering Methods for Finding Replicated Criminal Websites},
  journal = {{EURASIP} Journal on Information Security},
  year = 2014,
  volume = {2014},
  number = {14},
  url = {http://jis.eurasipjournals.com/content/2014/1/14/abstract}
}
@inproceedings{RiekBM14weis,
  author = {Markus Riek and
               Rainer B{\"o}hme and
               Tyler Moore},
  title = {Understanding the Influence of Cybercrime Risk on the E-Service Adoption of {E}uropean {I}nternet Users},
  booktitle = {WEIS},
  year = {2014},
  url = {http://lyle.smu.edu/~tylerm/weis14.pdf},
  crossref = {2014weis}
}
@proceedings{2014weis,
  title = {13th Annual Workshop on the Economics of Information Security,
               WEIS 2014, State College, Pennsylvania, 23-24 June, 2014},
  booktitle = {WEIS},
  year = {2014}
}
@inproceedings{MooreC14fc,
  author = {Tyler Moore and Richard Clayton},
  title = {The Ghosts of Banking Past: {E}mpirical Analysis of Closed Bank Websites},
  booktitle = {Financial Cryptography and Data Security},
  year = {2014},
  month = {March},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {8437},
  dataurl = {http://dx.doi.org/10.7910/DVN/26011},
  url = {http://lyle.smu.edu/~tylerm/fc14ghosts.pdf},
  presurl = {http://lyle.smu.edu/~tylerm/fc14banks-pres.pdf},
  puburl = {http://dx.doi.org/10.1007/978-3-662-45472-5_3},
  pages = {33--48}
}
@inproceedings{VasekM14fc,
  author = {Marie Vasek and Tyler Moore},
  title = {Identifying Risk Factors for Webserver Compromise},
  booktitle = {Financial Cryptography and Data Security},
  year = {2014},
  month = {March},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {8437},
  dataurl = {http://dx.doi.org/10.7910/DVN/25608},
  url = {http://lyle.smu.edu/~tylerm/fc14rf.pdf},
  puburl = {http://dx.doi.org/10.1007/978-3-662-45472-5_22},
  pages = {326--345}
}
@inproceedings{VasekTM14bitcoin,
  author = {Marie Vasek and Micah Thornton and Tyler Moore},
  title = {Empirical Analysis of Denial-of-Service Attacks in the {B}itcoin Ecosystem},
  booktitle = {1st Workshop on Bitcoin Research},
  year = {2014},
  month = {March},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {8438},
  pages = {57--71},
  puburl = {http://dx.doi.org/10.1007/978-3-662-44774-1_5},
  dataurl = {http://dx.doi.org/10.7910/DVN/25541},
  url = {http://lyle.smu.edu/~tylerm/bitcoin14ddos.pdf}
}
@inproceedings{JohnsonLGVM14bitcoin,
  author = {Benjamin Johnson and Aron Laszka and Jens Grossklags and Marie Vasek and Tyler Moore},
  title = {Game-Theoretic Analysis of {DDoS} Attacks Against {B}itcoin Mining Pools},
  booktitle = {1st Workshop on Bitcoin Research},
  year = {2014},
  month = {March},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {8438},
  pages = {72--86},
  url = {http://lyle.smu.edu/~tylerm/bitcoin14gt.pdf},
  puburl = {http://dx.doi.org/10.1007/978-3-662-44774-1_6}
}
@inproceedings{DrewM14iwcc,
  author = {Jake Drew and Tyler Moore},
  title = {Automatic Identification of Replicated Criminal
Websites Using Combined Clustering},
  booktitle = {International Workshop on Cyber Crime (IWCC), IEEE Security and Privacy Workshops},
  year = {2014},
  publisher = {IEEE},
  url = {http://lyle.smu.edu/~tylerm/iwcc14.pdf}
}
@inproceedings{VasekM13ecrime,
  author = {Marie Vasek and Tyler Moore},
  title = {Empirical Analysis of Factors Affecting Malware {URL} Detection},
  booktitle = {8th APWG eCrime Researchers Summit (eCrime)},
  year = {2013},
  month = {September},
  url = {http://lyle.smu.edu/~tylerm/ecrime13.pdf}
}
@inproceedings{LeontiadisMC13ec,
  author = {Nektarios Leontiadis and Tyler Moore and Nicolas Christin},
  title = {Pick Your Poison: {P}ricing and Inventories at Unlicensed Online Pharmacies},
  booktitle = {ACM Conference on Electronic Commerce (EC)},
  url = {http://lyle.smu.edu/~tylerm/ec13.pdf},
  puburl = {http://dl.acm.org/citation.cfm?id=2482610‎},
  publisher = {ACM},
  year = {2013},
  month = {June},
  pages = {621-638}
}
@inproceedings{MooreC13fc,
  author = {Tyler Moore and Nicolas Christin},
  title = {Beware the Middleman: Empirical Analysis of {B}itcoin-Exchange Risk},
  booktitle = {Financial Cryptography and Data Security},
  year = {2013},
  month = {April},
  url = {http://lyle.smu.edu/~tylerm/fc13.pdf},
  presurl = {http://lyle.smu.edu/~tylerm/fc13pres.pdf},
  puburl = {http://dx.doi.org/10.1007/978-3-642-39884-1_3},
  dataurl = {http://dx.doi.org/10.7910/DVN/25545},
  pages = {25-33},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {7859}
}
@article{PapaCM13ifip,
  author = {Steve Papa and William Casper and Tyler Moore},
  title = {Securing wastewater facilities from accidental and intentional harm: a cost-benefit analysis},
  journal = {International Journal of Critical Infrastructure Protection},
  year = {2013},
  volume = 6,
  number = 2,
  pages = {96-106},
  url = {http://lyle.smu.edu/~tylerm/ijcip13.pdf},
  puburl = {http://dx.doi.org/10.1016/j.ijcip.2013.05.002}
}
@inproceedings{MooreC12ecrime,
  author = {Tyler Moore and Richard Clayton},
  title = {Discovering Phishing Dropboxes Using Email Metadata},
  booktitle = {7th APWG eCrime Researchers Summit (eCrime)},
  year = {2012},
  month = {October},
  pages = {},
  url = {http://lyle.smu.edu/~tylerm/ecrime12dropbox.pdf},
  presurl = {http://lyle.smu.edu/~tylerm/ecrime12dropboxpres.pdf}
}
@inproceedings{BoehmeM12ecrime,
  author = {Rainer B{\"o}hme and Tyler Moore},
  title = {How Do Consumers React to Cybercrime?},
  booktitle = {APWG eCrime Researchers Summit (eCrime)},
  year = {2012},
  month = {October},
  pages = {},
  url = {http://lyle.smu.edu/~tylerm/ecrime12eurobar.pdf},
  presurl = {http://lyle.smu.edu/~tylerm/ecrime12eurobarpres.pdf}
}
@article{LandauM12firstmonday,
  author = {Susan Landau and
               Tyler Moore},
  title = {Economic tussles in federated identity management},
  journal = {First Monday},
  volume = {17},
  number = {10},
  year = {2012},
  puburl = {http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/4254},
  presurl = {http://lyle.smu.edu/~tylerm/nist12pres.pdf}
}
@inproceedings{EdwardsMSHF12nspw,
  author = {Benjamin Edwards and
               Tyler Moore and
               George Stelle and
               Steven A. Hofmeyr and
               Stephanie Forrest},
  title = {Beyond the Blacklist: Modeling Malware Spread and the Effect
               of Interventions},
  booktitle = {Proceedings of the New Security Paradigms Workshop,
               Bertinoro, Italy, September 19-21, 2012},
  year = {2012},
  publisher = {ACM},
  url = {http://lyle.smu.edu/~tylerm/nspw12.pdf}
}
@inproceedings{VasekM12cset,
  author = {Vasek, Marie and Moore, Tyler},
  title = {Do malware reports expedite cleanup? {A}n experimental study},
  booktitle = {Proceedings of the 5th USENIX conference on Cyber Security Experimentation and Test},
  series = {CSET'12},
  year = {2012},
  location = {Bellevue, WA},
  puburl = {https://www.usenix.org/system/files/conference/cset12/cset12-final20.pdf},
  url = {http://lyle.smu.edu/~tylerm/cset12.pdf},
  presurl = {https://www.usenix.org/sites/default/files/conference/protected-files/vasek_cset12_slides.pdf},
  dataurl = {http://dx.doi.org/10.7910/DVN/25571},
  publisher = {USENIX Association},
  address = {Berkeley, CA, USA}
}
@inproceedings{AndersonBBCELMS12weis,
  author = {Ross Anderson and
               Chris Barton and
               Rainer B{\"o}hme and
               Richard Clayton and
               Michael van Eeten and
               Michael Levi and
               Tyler Moore and
               Stefan Savage},
  title = {Measuring the Cost of Cybercrime},
  booktitle = {WEIS},
  year = {2012},
  url = {http://lyle.smu.edu/~tylerm/weis12.pdf},
  crossref = {2012weis},
  presurl = {http://lyle.smu.edu/~tylerm/weis12pres.pdf}
}
@proceedings{2012weis,
  title = {11th Annual Workshop on the Economics of Information Security,
               WEIS 2012, Berlin, Germany, 25-26 June, 2012},
  booktitle = {WEIS},
  year = {2012}
}
@incollection{MooreA12oxford,
  author = {Tyler Moore and
               Ross Anderson},
  title = {Internet Security},
  editor = {Martin Peitz and Joel Waldfogel},
  booktitle = {The Oxford Handbook of the Digital Economy},
  pages = {572-599},
  year = 2012,
  publisher = {Oxford University Press},
  puburl = {http://www.oxfordhandbooks.com/10.1093/oxfordhb/9780195397840.001.0001/oxfordhb-9780195397840-e-21},
  url = {http://lyle.smu.edu/~tylerm/oxford12.pdf}
}
@inproceedings{MooreHC12fc,
  author = {Tyler Moore and
               Jie Han and
               Richard Clayton},
  title = {The Postmodern {P}onzi Scheme: Empirical Analysis of High-Yield
               Investment Programs},
  booktitle = {Financial Cryptography and Data Security},
  year = {2012},
  pages = {41-56},
  puburl = {http://dx.doi.org/10.1007/978-3-642-32946-3_4},
  url = {http://lyle.smu.edu/~tylerm/fc12.pdf},
  presurl = {http://lyle.smu.edu/~tylerm/fc12pres.pdf},
  crossref = {2012fc}
}
@proceedings{2012fc,
  editor = {Angelos D. Keromytis},
  title = {Financial Cryptography and Data Security - 16th International
               Conference, FC 2012, Kralendijk, Bonaire, Februray 27-March
               2, 2012, Revised Selected Papers},
  booktitle = {Financial Cryptography and Data Security},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {7397},
  year = {2012},
  isbn = {978-3-642-32945-6},
  puburl = {http://dx.doi.org/10.1007/978-3-642-32946-3}
}
@inproceedings{MooreLC11ccs,
  author = {Tyler Moore and
               Nektarios Leontiadis and
               Nicolas Christin},
  title = {Fashion crimes: trending-term exploitation on the web},
  booktitle = {ACM Conference on Computer and Communications Security},
  year = {2011},
  pages = {455-466},
  url = {http://lyle.smu.edu/~tylerm/ccs11.pdf},
  puburl = {http://doi.acm.org/10.1145/2046707.2046761},
  presurl = {http://lyle.smu.edu/~tylerm/ccs11pres.pdf},
  crossref = {2011ccs}
}
@proceedings{2011ccs,
  editor = {Yan Chen and
               George Danezis and
               Vitaly Shmatikov},
  title = {Proceedings of the 18th ACM Conference on Computer and Communications
               Security, CCS 2011, Chicago, Illinois, USA, October 17-21,
               2011},
  booktitle = {ACM Conference on Computer and Communications Security},
  publisher = {ACM},
  year = {2011},
  isbn = {978-1-4503-0948-6}
}
@inproceedings{LeontiadisMC11uss,
  author = {Nektarios Leontiadis and
               Tyler Moore and
               Nicolas Christin},
  title = {Measuring and Analyzing Search-Redirection Attacks in the
               Illicit Online Prescription Drug Trade},
  booktitle = {USENIX Security Symposium},
  year = {2011},
  url = {http://lyle.smu.edu/~tylerm/usenix11.pdf},
  puburl = {http://static.usenix.org/events/sec11/tech/full_papers/Leontiadis.pdf},
  crossref = {2011uss}
}
@proceedings{2011uss,
  title = {20th USENIX Security Symposium, San Francisco, CA, USA,
               August 8-12, 2011, Proceedings},
  booktitle = {USENIX Security Symposium},
  publisher = {USENIX Association},
  year = {2011}
}
@inproceedings{HofmeyrMFES11weis,
  author = {Steven A. Hofmeyr and
               Tyler Moore and
               Stephanie Forrest and
               Benjamin Edwards and
               George Stelle},
  title = {Modeling Internet-Scale Policies for Cleaning up Malware},
  booktitle = {WEIS},
  year = {2011},
  url = {http://lyle.smu.edu/~tylerm/weis11model.pdf},
  puburl = {http://weis2011.econinfosec.org/papers/Modeling\%20Internet-Scale\%20Policies\%20for\%20Cleaning\%20up\%20Malware.pdf},
  crossref = {2011weis}
}
@proceedings{2011weis,
  title = {10th Annual Workshop on the Economics of Information Security,
               WEIS 2011, George Mason University, Fairfax, VA, USA, June
               14-15, 2011},
  booktitle = {WEIS},
  year = {2011}
}
@inproceedings{LandauM11weis,
  author = {Susan Landau and
               Tyler Moore},
  title = {Economic Tussles in Federated Identity Management},
  booktitle = {WEIS},
  year = {2011},
  puburl = {http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/4254},
  presurl = {http://lyle.smu.edu/~tylerm/nist12pres.pdf},
  crossref = {2011weis}
}
@inproceedings{MooreC11fc,
  author = {Tyler Moore and
               Richard Clayton},
  title = {Ethical Dilemmas in Take-Down Research},
  booktitle = {Financial Cryptography Workshops},
  year = {2011},
  pages = {154-168},
  url = {http://lyle.smu.edu/~tylerm/wecsr11.pdf},
  presurl = {http://lyle.smu.edu/~tylerm/wecsr11pres.pdf},
  puburl = {http://dx.doi.org/10.1007/978-3-642-29889-9_14},
  crossref = {2011wfc}
}
@proceedings{2011wfc,
  editor = {George Danezis and
               Sven Dietrich and
               Kazue Sako},
  title = {Financial Cryptography and Data Security - FC 2011 Workshops,
               RLCPS and WECSR 2011, Rodney Bay, St. Lucia, February 28
               - March 4, 2011, Revised Selected Papers},
  booktitle = {Financial Cryptography Workshops},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {7126},
  year = {2012},
  isbn = {978-3-642-29888-2},
  puburl = {http://dx.doi.org/10.1007/978-3-642-29889-9}
}
@article{RePEc:idt:journl:cs8102,
  author = {Tyler Moore and Richard Clayton},
  title = {The Impact of Public Information on Phishing Attack and Defense},
  journal = {Communications \& Strategies},
  year = 2011,
  volume = {1},
  number = {81},
  pages = {45-68},
  month = {1st quart},
  keywords = {security economics; online crime; phishing; transparency},
  puburl = {http://ideas.repec.org/a/idt/journl/cs8102.html},
  url = {http://lyle.smu.edu/~tylerm/cs81.pdf}
}
@article{Moore10ijcip,
  author = {Tyler Moore},
  title = {The economics of cybersecurity: Principles and policy options},
  journal = {International Journal of Critical Infrastructure Protection},
  volume = {3},
  number = {3–4},
  pages = {103 - 117},
  year = {2010},
  issn = {1874-5482},
  doi = {10.1016/j.ijcip.2010.10.002},
  puburl = {http://www.sciencedirect.com/science/article/pii/S1874548210000429},
  url = {http://lyle.smu.edu/~tylerm/ijcip10.pdf}
}
@incollection{Moore10nas,
  author = {Tyler Moore},
  title = {The economics of cybersecurity: Principles and policy options},
  booktitle = {Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy},
  isbn = {9780309160353},
  puburl = {http://books.nap.edu/openbook.php?record_id=12997&page=3},
  year = {2010},
  publisher = {The National Academies Press}
}
@inproceedings{MooreFP10nspw,
  author = {Tyler Moore and
               Allan Friedman and
               Ariel D. Procaccia},
  title = {Would a 'cyber warrior' protect us: exploring trade-offs
               between attack and defense of information systems},
  booktitle = {NSPW},
  year = {2010},
  pages = {85-94},
  url = {http://lyle.smu.edu/~tylerm/nspw10.pdf},
  puburl = {http://doi.acm.org/10.1145/1900546.1900559},
  crossref = {2010nspw}
}
@proceedings{2010nspw,
  editor = {Angelos D. Keromytis and
               Sean Peisert and
               Richard Ford and
               Carrie Gates},
  title = {Proceedings of the New Security Paradigms Workshop,
               Concord, MA, USA, September 21-23, 2010},
  booktitle = {NSPW},
  publisher = {ACM},
  year = {2010},
  isbn = {978-1-4503-0415-3}
}
@article{BohmeM10ieeesp,
  author = {Rainer B{\"o}hme and
               Tyler Moore},
  title = {The Iterated Weakest Link},
  journal = {IEEE Security {\&} Privacy},
  volume = {8},
  number = {1},
  year = {2010},
  pages = {53-55},
  puburl = {http://doi.ieeecomputersociety.org/10.1109/MSP.2010.51},
  url = {http://lyle.smu.edu/~tylerm/iwl-gordon.pdf}
}
@article{MoranM10ieeesp,
  author = {Tal Moran and
               Tyler Moore},
  title = {The Phish-Market Protocol: Secure Sharing Between Competitors},
  journal = {IEEE Security {\&} Privacy},
  volume = {8},
  number = {4},
  year = {2010},
  pages = {40-45},
  puburl = {http://doi.ieeecomputersociety.org/10.1109/MSP.2010.138},
  url = {http://lyle.smu.edu/~tylerm/sp10phishmarket.pdf}
}
@inproceedings{MoranM10fc,
  author = {Tal Moran and
               Tyler Moore},
  title = {The Phish-Market Protocol: Securely Sharing Attack Data
               between Competitors},
  booktitle = {Financial Cryptography and Data Security},
  year = {2010},
  pages = {222-237},
  puburl = {http://dx.doi.org/10.1007/978-3-642-14577-3_18},
  url = {http://lyle.smu.edu/~tylerm/fc10phishmarket.pdf},
  presurl = {http://lyle.smu.edu/~tylerm/fc10phishmarketpres.pdf},
  crossref = {2010fc}
}
@inproceedings{MooreE10fc,
  author = {Tyler Moore and
               Benjamin Edelman},
  title = {Measuring the Perpetrators and Funders of Typosquatting},
  booktitle = {Financial Cryptography and Data Security},
  year = {2010},
  pages = {175-191},
  puburl = {http://dx.doi.org/10.1007/978-3-642-14577-3_15},
  url = {http://lyle.smu.edu/~tylerm/fc10typo.pdf},
  presurl = {http://lyle.smu.edu/~tylerm/fc10typopres.pdf},
  dataurl = {http://www.benedelman.org/typosquatting/},
  crossref = {2010fc}
}
@proceedings{2010fc,
  editor = {Radu Sion},
  title = {Financial Cryptography and Data Security, 14th International
               Conference, FC 2010, Tenerife, Canary Islands, January 25-28,
               2010, Revised Selected Papers},
  booktitle = {Financial Cryptography and Data Security},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {6052},
  year = {2010},
  isbn = {978-3-642-14576-6},
  puburl = {http://dx.doi.org/10.1007/978-3-642-14577-3}
}
@article{Moore09JEP,
  author = {Tyler Moore and Richard Clayton and  Ross Anderson},
  title = {The Economics of Online Crime},
  journal = {Journal of Economic Perspectives},
  volume = 23,
  number = 3,
  month = {Summer},
  year = 2009,
  pages = {3--20},
  puburl = {http://www.aeaweb.org/articles.php?doi=10.1257/jep.23.3.3},
  url = {http://lyle.smu.edu/~tylerm/jep09.pdf}
}
@inproceedings{BohmeM09weis,
  author = {Rainer B{\"o}hme and
               Tyler Moore},
  title = {The Iterated Weakest Link - A Model of Adaptive Security
               Investment},
  booktitle = {WEIS},
  year = {2009},
  url = {http://lyle.smu.edu/~tylerm/weis09.pdf},
  presurl = {http://lyle.smu.edu/~tylerm/weis09pres.pdf},
  puburl = {http://weis09.infosecon.net/files/152/index.html},
  crossref = {2009weis}
}
@proceedings{2009weis,
  title = {8th Annual Workshop on the Economics of Information Security,
               WEIS 2009, University College London, England, UK, June
               24-25, 2009},
  booktitle = {WEIS},
  year = {2009}
}
@inproceedings{MooreCS09leet,
  author = {Moore, Tyler and Clayton, Richard and Stern, Henry},
  title = {Temporal correlations between spam and phishing websites},
  booktitle = {Proceedings of the 2nd USENIX conference on Large-scale exploits and emergent threats: botnets, spyware, worms, and more},
  series = {LEET'09},
  year = {2009},
  location = {Boston, MA},
  puburl = {https://www.usenix.org/conference/leet-09/temporal-correlations-between-spam-and-phishing-websites},
  url = {http://lyle.smu.edu/~tylerm/leet09.pdf},
  presurl = {http://lyle.smu.edu/~tylerm/leet09pres.pdf},
  publisher = {USENIX Association},
  address = {Berkeley, CA, USA}
}
@inproceedings{MooreC09fc,
  author = {Tyler Moore and
               Richard Clayton},
  title = {Evil Searching: Compromise and Recompromise of Internet
               Hosts for Phishing},
  booktitle = {Financial Cryptography and Data Security},
  year = {2009},
  pages = {256-272},
  puburl = {http://dx.doi.org/10.1007/978-3-642-03549-4_16},
  url = {http://lyle.smu.edu/~tylerm/fc09.pdf},
  presurl = {http://lyle.smu.edu/~tylerm/fc09pres.pdf},
  crossref = {2009fc}
}
@proceedings{2009fc,
  editor = {Roger Dingledine and
               Philippe Golle},
  title = {Financial Cryptography and Data Security, 13th International
               Conference, FC 2009, Accra Beach, Barbados, February 23-26,
               2009. Revised Selected Papers},
  booktitle = {Financial Cryptography and Data Security},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {5628},
  year = {2009},
  puburl = {http://dx.doi.org/10.1007/978-3-642-03549-4}
}
@inproceedings{MooreC08ecrime,
  author = {Tyler Moore and
               Richard Clayton},
  title = {The Consequence of Non-Cooperation in the Fight Against Phishing},
  booktitle = {APWG eCrime Researchers Summit},
  year = {2008},
  pages = {1-14},
  puburl = {http://dx.doi.org/10.1109/ECRIME.2008.4696968},
  url = {http://lyle.smu.edu/~tylerm/ecrime08.pdf},
  presurl = {http://lyle.smu.edu/~tylerm/ecrime08pres.pdf},
  publisher = {IEEE}
}
@incollection{MooreC08weis,
  author = {Tyler Moore and
               Richard Clayton},
  title = {The Impact of Incentives on Notice and Take-down},
  editor = {M.E. Johnson},
  booktitle = {Managing Information Risk and the Economics of Security},
  pages = {199-223},
  year = 2009,
  publisher = {Springer},
  puburl = {http://dx.doi.org/10.1007/978-0-387-09762-6_10},
  url = {http://lyle.smu.edu/~tylerm/weis08takedown.pdf},
  presurl = {http://lyle.smu.edu/~tylerm/weis08takedownpres.pdf},
  isbn = {978-0-387-09761-9}
}
@incollection{AndersonBCM08weis,
  author = {Ross Anderson and
               Rainer B{\"o}hme and
               Richard Clayton and
               Tyler Moore},
  title = {Security Economics and {E}uropean Policy},
  editor = {M.E. Johnson},
  booktitle = {Managing Information Risk and the Economics of Security},
  doi = {10.1007/978-0-387-09762-6_3},
  puburl = {http://dx.doi.org/10.1007/978-0-387-09762-6_3},
  url = {http://lyle.smu.edu/~tylerm/weis08enisa.pdf},
  publisher = {Springer},
  pages = {55-80},
  isbn = {978-0-387-09761-9},
  year = 2009
}
@inproceedings{AndersonBCM08isse,
  author = {Ross Anderson and
               Rainer B{\"o}hme and
               Richard Clayton and
               Tyler Moore},
  title = {Security Economics and {E}uropean Policy},
  booktitle = {ISSE},
  year = {2008},
  pages = {57-76},
  puburl = {http://dx.doi.org/10.1007/978-3-8348-9283-6_6},
  crossref = {2008isse}
}
@proceedings{2008isse,
  editor = {Norbert Pohlmann and
               Helmut Reimer and
               Wolfgang Schneider},
  title = {ISSE 2008 - Securing Electronic Busines Processes, Highlights
               of the Information Security Solutions Europe 2008 Conference,
               7-9 October 2008, Madrid, Spain},
  booktitle = {ISSE},
  publisher = {Vieweg+Teubner},
  year = {2009},
  isbn = {978-3-8348-0660-4},
  puburl = {http://dx.doi.org/10.1007/978-3-8348-9283-6}
}
@inproceedings{MooreC08fc,
  author = {Tyler Moore and
               Richard Clayton},
  title = {Evaluating the Wisdom of Crowds in Assessing Phishing Websites},
  booktitle = {Financial Cryptography and Data Security},
  year = {2008},
  pages = {16-30},
  puburl = {http://dx.doi.org/10.1007/978-3-540-85230-8_2},
  url = {http://lyle.smu.edu/~tylerm/fc08.pdf},
  presurl = {http://lyle.smu.edu/~tylerm/fc08pres.pdf},
  crossref = {2008fc}
}
@proceedings{2008fc,
  editor = {Gene Tsudik},
  title = {Financial Cryptography and Data Security, 12th International
               Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008,
               Revised Selected Papers},
  booktitle = {Financial Cryptography and Data Security},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {5143},
  year = {2008},
  isbn = {978-3-540-85229-2}
}
@inproceedings{AndersonM07crypto,
  author = {Ross Anderson and
               Tyler Moore},
  title = {Information Security Economics - and Beyond},
  booktitle = {CRYPTO},
  year = {2007},
  pages = {68-91},
  puburl = {http://dx.doi.org/10.1007/978-3-540-74143-5_5},
  url = {http://lyle.smu.edu/~tylerm/crypto07.pdf},
  crossref = {2007crypto}
}
@proceedings{2007crypto,
  editor = {Alfred Menezes},
  title = {Advances in Cryptology - CRYPTO 2007, 27th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 19-23,
               2007, Proceedings},
  booktitle = {CRYPTO},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {4622},
  year = {2007},
  isbn = {978-3-540-74142-8}
}
@incollection{AndersonMNO07,
  author = {Ross Anderson and Tyler Moore and Shishir Nagaraja and Andy Ozment},
  title = {Incentives and Information Security},
  editor = {Nisan, Noam and Roughgarden, Tim and Tardos, Eva and Vazirani, Vijay V.},
  pages = {633-649},
  booktitle = {Algorithmic Game Theory},
  year = {2007},
  isbn = {0521872820},
  publisher = {Cambridge University Press},
  address = {New York, NY, USA}
}
@inproceedings{MooreC07ecrime,
  author = {Tyler Moore and
               Richard Clayton},
  title = {Examining the impact of website take-down on phishing},
  booktitle = {APWG eCrime Researchers Summit},
  year = {2007},
  pages = {1-13},
  puburl = {http://doi.acm.org/10.1145/1299015.1299016},
  url = {http://lyle.smu.edu/~tylerm/ecrime07.pdf},
  presurl = {http://lyle.smu.edu/~tylerm/ecrime07pres.pdf},
  crossref = {2007ecrime}
}
@proceedings{2007ecrime,
  editor = {Lorrie Faith Cranor},
  title = {Proceedings of the Anti-Phishing Working Groups 2nd Annual
               eCrime Researchers Summit 2007,  Pittsburgh, Pennsylvania,
               USA, October 4-5, 2007},
  booktitle = {eCrime Researchers Summit},
  publisher = {ACM},
  series = {ACM International Conference Proceeding Series},
  volume = {269},
  year = {2007}
}
@inproceedings{MooreC07weis,
  author = {Tyler Moore and
               Richard Clayton},
  title = {An Empirical Analysis of the Current State of Phishing Attack
               and Defence},
  booktitle = {WEIS},
  year = {2007},
  puburl = {http://weis2007.econinfosec.org/papers/51.pdf},
  url = {http://lyle.smu.edu/~tylerm/weis07.pdf},
  presurl = {http://lyle.smu.edu/~tylerm/weis07pres.pdf},
  crossref = {2007weis}
}
@proceedings{2007weis,
  title = {6th Annual Workshop on the Economics of Information Security,
               WEIS 2007, The Heinz School and CyLab at Carnegie Mellon
               University, Pittsburgh, PA, USA, June 7-8, 2007},
  booktitle = {WEIS},
  year = {2007}
}
@article{AndersonM06science,
  author = {Anderson, Ross and Moore, Tyler},
  title = {The Economics of Information Security},
  journal = {Science},
  volume = {314},
  number = {5799},
  pages = {610-613},
  year = {2006},
  doi = {10.1126/science.1130992},
  puburl = {http://www.sciencemag.org/content/314/5799/610.full.pdf},
  url = {http://lyle.smu.edu/~tylerm/science-econ.pdf}
}
@inproceedings{Moore06weis,
  author = {Tyler Moore},
  title = {The Economics of Digital Forensics},
  booktitle = {WEIS},
  year = {2006},
  puburl = {http://weis2006.econinfosec.org/docs/14.pdf},
  url = {http://lyle.smu.edu/~tylerm/weis06.pdf},
  crossref = {2006weis}
}
@proceedings{2006weis,
  title = {5th Annual Workshop on the Economics of Information Security,
               WEIS 2006, Robinson College, University of Cambridge, England,
               UK, June 26-28, 2006},
  booktitle = {WEIS},
  year = {2006}
}
@inproceedings{Moore05weis,
  author = {Tyler Moore},
  title = {Countering Hidden-Action Attacks on Networked Systems},
  booktitle = {WEIS},
  year = {2005},
  puburl = {http://infosecon.net/workshop/pdf/18.pdf},
  url = {http://lyle.smu.edu/~tylerm/weis05.pdf},
  presurl = {http://lyle.smu.edu/~tylerm/weis05pres.pdf},
  crossref = {2005weis}
}
@proceedings{2005weis,
  title = {4th Annual Workshop on the Economics of Information Security,
               WEIS 2005, Harvard University, Cambridge, MA, USA, June
               1-3, 2005},
  booktitle = {WEIS},
  year = {2005}
}

This file was generated by bibtex2html 1.97.