@book{2014fc,
editor = {Rainer B\"ohme and Michael Brenner and Tyler Moore and Matthew Smith},
title = {Financial Cryptography and Data Security -- 18th International Conference, FC 2014, Revised Selected Papers},
booktitle = {Financial Cryptography and Data Security},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {8438},
year = {2014},
isbn = {978-3-662-44774-1}
}
@incollection{MooreA12oxford,
author = {Tyler Moore and
Ross Anderson},
title = {Internet Security},
editor = {Martin Peitz and Joel Waldfogel},
booktitle = {The Oxford Handbook of the Digital Economy},
pages = {572-599},
year = 2012,
publisher = {Oxford University Press},
puburl = {http://www.oxfordhandbooks.com/10.1093/oxfordhb/9780195397840.001.0001/oxfordhb-9780195397840-e-21},
url = {https://tylermoore.utulsa.edu/oxford12.pdf}
}
@incollection{Moore10nas,
author = {Tyler Moore},
title = {The economics of cybersecurity: Principles and policy options},
booktitle = {Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy},
isbn = {9780309160353},
puburl = {http://books.nap.edu/openbook.php?record_id=12997&page=3},
year = {2010},
pages = {3--23},
publisher = {The National Academies Press}
}
@book{2010weis,
editor = {Tyler Moore and David Pym and Christos Ioannidis},
title = {Economics of Information Security and Privacy},
publisher = {Springer},
location = {New York},
year = {2010}
}
@book{DBLP:conf/ifip11-10/2010,
editor = {Tyler Moore and
Sujeet Shenoi},
title = {Critical Infrastructure Protection {IV} - Fourth Annual {IFIP} {WG}
11.10 International Conference on Critical Infrastructure Protection,
{ICCIP} 2010, Washington, DC, USA, March 15-17, 2010, Revised Selected
Papers},
series = {{IFIP} Advances in Information and Communication Technology},
year = {2010},
volume = {342},
publisher = {Springer},
url = {http://dx.doi.org/10.1007/978-3-642-16806-2},
doi = {10.1007/978-3-642-16806-2},
isbn = {978-3-642-16805-5}
}
@incollection{AndersonMNO07,
author = {Ross Anderson and Tyler Moore and Shishir Nagaraja and Andy Ozment},
title = {Incentives and Information Security},
editor = {Nisan, Noam and Roughgarden, Tim and Tardos, Eva and Vazirani, Vijay V.},
pages = {633-649},
booktitle = {Algorithmic Game Theory},
year = {2007},
isbn = {0521872820},
publisher = {Cambridge University Press},
address = {New York, NY, USA}
}
@book{DBLP:conf/esas/2007,
editor = {Frank Stajano and
Catherine Meadows and
Srdjan Capkun and
Tyler Moore},
title = {Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop,
{ESAS} 2007, Cambridge, UK, July 2-3, 2007, Proceedings},
series = {Lecture Notes in Computer Science},
year = {2007},
volume = {4572},
publisher = {Springer},
isbn = {978-3-540-73274-7}
}
@incollection{MooreMMS05ifip,
year = {2005},
isbn = {978-0-387-30012-2},
booktitle = {Advances in Digital Forensics},
volume = {194},
series = {IFIP -- The International Federation for Information Processing},
editor = {Pollitt, Mark and Shenoi, Sujeet},
doi = {10.1007/0-387-31163-7_15},
title = {Using Signaling Information in Telecom Network Forensics},
puburl = {http://dx.doi.org/10.1007/0-387-31163-7_15},
publisher = {Springer},
keywords = {Telecommunications networks; signaling messages; call detail records},
author = {Tyler Moore and Anthony Meehan and Gavin Manes and Sujeet Shenoi},
pages = {177-188}
}
@incollection{SwensonMS06ifip11-9,
year = {2006},
isbn = {978-0-387-36890-0},
booktitle = {Advances in Digital Forensics II},
volume = {222},
series = {IFIP Advances in Information and Communication},
editor = {Olivier, Martin and Shenoi, Sujeet},
doi = {10.1007/978-0-387-36891-7_21},
title = {{GSM} Cell Site Forensics},
puburl = {http://dx.doi.org/10.1007/978-0-387-36891-7_21},
publisher = {Springer},
keywords = {GSM networks; cell site forensics; subscriber location estimation},
author = {Swenson, Christopher and Moore, Tyler and Shenoi, Sujeet},
pages = {259-272},
language = {English}
}
This file was generated by bibtex2html 1.98.