confrefs.bib

@inproceedings{MooreRCPAH08secon,
  author = {Tyler Moore and
               Maxim Raya and
               Jolyon Clulow and
               Panagiotis Papadimitratos and
               Ross Anderson and
               Jean-Pierre Hubaux},
  title = {Fast Exclusion of Errant Devices from Vehicular Networks},
  booktitle = {Proceedings of the Fifth Annual IEEE Communications Society
               Conference on Sensor, Mesh and Ad Hoc Communications and
               Networks (SECON)},
  year = {2008},
  pages = {135-143},
  puburl = {http://dx.doi.org/10.1109/SAHCN.2008.26},
  url = {https://tylermoore.utulsa.edu/secon08.pdf}
}
@inproceedings{MooreCNA07esas,
  author = {Tyler Moore and
               Jolyon Clulow and
               Shishir Nagaraja and
               Ross Anderson},
  title = {New Strategies for Revocation in Ad-Hoc Networks},
  booktitle = {4th European Workshop on Security and Privacy in Ad-hoc and Sensor Networks (ESAS)},
  year = {2007},
  pages = {232-246},
  puburl = {http://dx.doi.org/10.1007/978-3-540-73275-4_17},
  url = {https://tylermoore.utulsa.edu/esas07.pdf},
  presurl = {https://tylermoore.utulsa.edu/esas07-pres.pdf},
  editor = {Frank Stajano and
               Catherine Meadows and
               Srdjan Capkun and
               Tyler Moore},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {4572}
}
@inproceedings{MooreC07sec,
  author = {Tyler Moore and
               Jolyon Clulow},
  title = {Secure Path-Key Revocation for Symmetric Key Pre-distribution
               Schemes in Sensor Networks},
  booktitle = {Proceedings of the IFIP TC-11 22nd International
               Information Security Conference (IFIP SEC)},
  year = {2007},
  pages = {157-168},
  puburl = {http://dx.doi.org/10.1007/978-0-387-72367-9_14},
  url = {https://tylermoore.utulsa.edu/ifipsec2007-path.pdf},
  presurl = {https://tylermoore.utulsa.edu/ifipsec-pres.pdf},
  editor = {Hein S. Venter and
               Mariki M. Eloff and
               Les Labuschagne and
               Jan H. P. Eloff and
               Rossouw von Solms},
  publisher = {Springer},
  series = {IFIP},
  volume = {232}
}
@inproceedings{ClulowHKM06esas,
  author = {Jolyon Clulow and
               Gerhard P. Hancke and
               Markus G. Kuhn and
               Tyler Moore},
  booktitle = {3rd European Workshop on Security and Privacy in Ad-hoc and Sensor Networks (ESAS)},
  title = {So Near and Yet So Far: Distance-Bounding Attacks in Wireless
               Networks},
  year = {2006},
  pages = {83-97},
  puburl = {http://dx.doi.org/10.1007/11964254_9},
  url = {https://tylermoore.utulsa.edu/esas2006-distance.pdf},
  presurl = {https://tylermoore.utulsa.edu/esas-pres.pdf},
  editor = {Levente Butty{\'a}n and
               Virgil D. Gligor and
               Dirk Westhoff},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {4357}
}
@inproceedings{Moore06percom,
  author = {Tyler Moore},
  title = {A Collusion Attack on Pairwise Key Predistribution Schemes
               for Distributed Sensor Networks},
  booktitle = {4th IEEE Conference on Pervasive Computing and Communications Security (PerSec)},
  year = {2006},
  pages = {251-255},
  puburl = {http://doi.ieeecomputersociety.org/10.1109/PERCOMW.2006.3},
  url = {https://tylermoore.utulsa.edu/persec06-moore.pdf},
  presurl = {https://tylermoore.utulsa.edu/persec06-moore-pres.pdf},
  publisher = {IEEE Computer Society}
}
@inproceedings{RiekBM14weis,
  author = {Markus Riek and
               Rainer B{\"o}hme and
               Tyler Moore},
  title = {Understanding the Influence of Cybercrime Risk on the E-Service Adoption of {E}uropean {I}nternet Users},
  booktitle = {13th Workshop on the Economics of Information Security (WEIS)},
  year = {2014},
  url = {https://tylermoore.utulsa.edu/weis14.pdf}
}
@inproceedings{DrewM14iwcc,
  author = {Jake Drew and Tyler Moore},
  title = {Automatic Identification of Replicated Criminal
Websites Using Combined Clustering},
  booktitle = {International Workshop on Cyber Crime (IWCC), IEEE Security and Privacy Workshops},
  year = {2014},
  publisher = {IEEE},
  url = {https://tylermoore.utulsa.edu/iwcc14.pdf}
}
@inproceedings{VasekTM14bitcoin,
  author = {Marie Vasek and Micah Thornton and Tyler Moore},
  title = {Empirical Analysis of Denial-of-Service Attacks in the {B}itcoin Ecosystem},
  booktitle = {1st Workshop on Bitcoin Research},
  year = {2014},
  month = {March},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {8438},
  pages = {57--71},
  dataurl = {https://dx.doi.org/10.7910/DVN/25541},
  url = {https://tylermoore.utulsa.edu/bitcoin14ddos.pdf},
  puburl = {https://dx.doi.org/10.1007/978-3-662-44774-1_5},
  presurl = {http://secon.utulsa.edu/vasek/thorntonbtc14pres.pdf}
}
@inproceedings{JohnsonLGVM14bitcoin,
  author = {Benjamin Johnson and Aron Laszka and Jens Grossklags and Marie Vasek and Tyler Moore},
  title = {Game-Theoretic Analysis of {DDoS} Attacks Against {B}itcoin Mining Pools},
  booktitle = {1st Workshop on Bitcoin Research},
  year = {2014},
  month = {March},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {8438},
  pages = {72--86},
  url = {https://tylermoore.utulsa.edu/bitcoin14gt.pdf},
  puburl = {https://dx.doi.org/10.1007/978-3-662-44774-1_6}
}
@inproceedings{MooreC14fc,
  author = {Tyler Moore and Richard Clayton},
  title = {The Ghosts of Banking Past: {E}mpirical Analysis of Closed Bank Websites},
  booktitle = {Financial Cryptography and Data Security},
  year = {2014},
  month = {March},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {8437},
  dataurl = {https://dx.doi.org/10.7910/DVN/26011},
  url = {https://tylermoore.utulsa.edu/fc14ghosts.pdf},
  presurl = {https://tylermoore.utulsa.edu/fc14banks-pres.pdf},
  puburl = {https://dx.doi.org/10.1007/978-3-662-45472-5_3},
  pages = {33--48}
}
@inproceedings{VasekM14fc,
  author = {Marie Vasek and Tyler Moore},
  title = {Identifying Risk Factors for Webserver Compromise},
  booktitle = {Financial Cryptography and Data Security},
  year = {2014},
  month = {March},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {8437},
  dataurl = {https://dx.doi.org/10.7910/DVN/25608},
  url = {https://tylermoore.utulsa.edu/fc14rf.pdf},
  puburl = {https://dx.doi.org/10.1007/978-3-662-45472-5_22},
  pages = {326--345},
  presurl = {http://secon.utulsa.edu/vasek/vasekfc14pres.pdf}
}
@inproceedings{VasekM13ecrime,
  author = {Marie Vasek and Tyler Moore},
  title = {Empirical Analysis of Factors Affecting Malware {URL} Detection},
  booktitle = {8th APWG eCrime Researchers Summit (eCrime)},
  year = {2013},
  month = {September},
  url = {https://tylermoore.utulsa.edu/ecrime13.pdf},
  presurl = {http://secon.utulsa.edu/vasek/vasekecrime13pres.pdf}
}
@inproceedings{LeontiadisMC13ec,
  author = {Nektarios Leontiadis and Tyler Moore and Nicolas Christin},
  title = {Pick Your Poison: {P}ricing and Inventories at Unlicensed Online Pharmacies},
  booktitle = {ACM Conference on Electronic Commerce (EC)},
  url = {https://tylermoore.utulsa.edu/ec13.pdf},
  puburl = {http://dl.acm.org/citation.cfm?id=2482610‎},
  publisher = {ACM},
  year = {2013},
  month = {June},
  pages = {621-638}
}
@inproceedings{MooreC13fc,
  author = {Tyler Moore and Nicolas Christin},
  title = {Beware the Middleman: Empirical Analysis of {B}itcoin-Exchange Risk},
  booktitle = {Financial Cryptography and Data Security},
  year = {2013},
  month = {April},
  url = {https://tylermoore.utulsa.edu/fc13.pdf},
  presurl = {https://tylermoore.utulsa.edu/fc13pres.pdf},
  puburl = {https://dx.doi.org/10.1007/978-3-642-39884-1_3},
  dataurl = {https://dx.doi.org/10.7910/DVN/25545},
  pages = {25-33},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {7859}
}
@inproceedings{MooreC12ecrime,
  author = {Tyler Moore and Richard Clayton},
  title = {Discovering Phishing Dropboxes Using Email Metadata},
  booktitle = {7th APWG eCrime Researchers Summit (eCrime)},
  year = {2012},
  month = {October},
  pages = {},
  url = {https://tylermoore.utulsa.edu/ecrime12dropbox.pdf},
  presurl = {https://tylermoore.utulsa.edu/ecrime12dropboxpres.pdf}
}
@inproceedings{BoehmeM12ecrime,
  author = {Rainer B{\"o}hme and Tyler Moore},
  title = {How Do Consumers React to Cybercrime?},
  booktitle = {APWG eCrime Researchers Summit (eCrime)},
  year = {2012},
  month = {October},
  pages = {},
  url = {https://tylermoore.utulsa.edu/ecrime12eurobar.pdf},
  presurl = {https://tylermoore.utulsa.edu/ecrime12eurobarpres.pdf}
}
@inproceedings{EdwardsMSHF12nspw,
  author = {Benjamin Edwards and
               Tyler Moore and
               George Stelle and
               Steven A. Hofmeyr and
               Stephanie Forrest},
  title = {Beyond the Blacklist: Modeling Malware Spread and the Effect
               of Interventions},
  booktitle = {Proceedings of the New Security Paradigms Workshop,
               Bertinoro, Italy, September 19-21, 2012},
  year = {2012},
  publisher = {ACM},
  url = {https://tylermoore.utulsa.edu/nspw12.pdf}
}
@inproceedings{VasekM12cset,
  author = {Vasek, Marie and Moore, Tyler},
  title = {Do malware reports expedite cleanup? {A}n experimental study},
  booktitle = {Proceedings of the 5th USENIX Workshop on Cyber Security Experimentation and Test},
  series = {CSET'12},
  year = {2012},
  location = {Bellevue, WA},
  puburl = {https://www.usenix.org/system/files/conference/cset12/cset12-final20.pdf},
  url = {https://tylermoore.utulsa.edu/cset12.pdf},
  presurl = {https://www.usenix.org/sites/default/files/conference/protected-files/vasek_cset12_slides.pdf},
  dataurl = {https://dx.doi.org/10.7910/DVN/25571},
  publisher = {USENIX Association},
  address = {Berkeley, CA, USA}
}
@inproceedings{AndersonBBCELMS12weis,
  author = {Ross Anderson and
               Chris Barton and
               Rainer B{\"o}hme and
               Richard Clayton and
               Michael van Eeten and
               Michael Levi and
               Tyler Moore and
               Stefan Savage},
  title = {Measuring the Cost of Cybercrime},
  booktitle = {11th Workshop on the Economics of Information Security (WEIS)},
  year = {2012},
  url = {https://tylermoore.utulsa.edu/weis12.pdf},
  presurl = {https://tylermoore.utulsa.edu/weis12pres.pdf}
}
@inproceedings{MooreHC12fc,
  author = {Tyler Moore and
               Jie Han and
               Richard Clayton},
  title = {The Postmodern {P}onzi Scheme: Empirical Analysis of High-Yield
               Investment Programs},
  booktitle = {Financial Cryptography and Data Security},
  year = {2012},
  pages = {41-56},
  puburl = {https://dx.doi.org/10.1007/978-3-642-32946-3_4},
  url = {https://tylermoore.utulsa.edu/fc12.pdf},
  presurl = {https://tylermoore.utulsa.edu/fc12pres.pdf},
  editor = {Angelos D. Keromytis},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {7397},
  puburl = {https://dx.doi.org/10.1007/978-3-642-32946-3}
}
@inproceedings{MooreLC11ccs,
  author = {Tyler Moore and
               Nektarios Leontiadis and
               Nicolas Christin},
  title = {Fashion crimes: trending-term exploitation on the web},
  booktitle = {ACM Conference on Computer and Communications Security (CCS)},
  year = {2011},
  pages = {455-466},
  url = {https://tylermoore.utulsa.edu/ccs11.pdf},
  puburl = {http://doi.acm.org/10.1145/2046707.2046761},
  presurl = {https://tylermoore.utulsa.edu/ccs11pres.pdf},
  editor = {Yan Chen and
               George Danezis and
               Vitaly Shmatikov},
  publisher = {ACM}
}
@inproceedings{LeontiadisMC11uss,
  author = {Nektarios Leontiadis and
               Tyler Moore and
               Nicolas Christin},
  title = {Measuring and Analyzing Search-Redirection Attacks in the
               Illicit Online Prescription Drug Trade},
  booktitle = {USENIX Security Symposium},
  year = {2011},
  url = {https://tylermoore.utulsa.edu/usenix11.pdf},
  puburl = {http://static.usenix.org/events/sec11/tech/full_papers/Leontiadis.pdf},
  publisher = {USENIX Association}
}
@inproceedings{HofmeyrMFES11weis,
  author = {Steven A. Hofmeyr and
               Tyler Moore and
               Stephanie Forrest and
               Benjamin Edwards and
               George Stelle},
  title = {Modeling Internet-Scale Policies for Cleaning up Malware},
  year = {2011},
  url = {https://tylermoore.utulsa.edu/weis11model.pdf},
  puburl = {http://weis2011.econinfosec.org/papers/Modeling\%20Internet-Scale\%20Policies\%20for\%20Cleaning\%20up\%20Malware.pdf},
  booktitle = {10th Workshop on the Economics of Information Security (WEIS)}
}
@inproceedings{LandauM11weis,
  author = {Susan Landau and
               Tyler Moore},
  title = {Economic Tussles in Federated Identity Management},
  booktitle = {10th Workshop on the Economics of Information Security (WEIS)},
  year = {2011},
  puburl = {http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/4254},
  presurl = {https://tylermoore.utulsa.edu/nist12pres.pdf}
}
@inproceedings{MooreC11fc,
  author = {Tyler Moore and
               Richard Clayton},
  title = {Ethical Dilemmas in Take-Down Research},
  booktitle = {Workshop on the Ethics of Computer Security Research (Financial Cryptography Workshops)},
  year = {2011},
  pages = {154-168},
  url = {https://tylermoore.utulsa.edu/wecsr11.pdf},
  presurl = {https://tylermoore.utulsa.edu/wecsr11pres.pdf},
  puburl = {https://dx.doi.org/10.1007/978-3-642-29889-9_14},
  editor = {George Danezis and
               Sven Dietrich and
               Kazue Sako},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {7126}
}
@inproceedings{MooreFP10nspw,
  author = {Tyler Moore and
               Allan Friedman and
               Ariel D. Procaccia},
  title = {Would a 'cyber warrior' protect us: exploring trade-offs
               between attack and defense of information systems},
  booktitle = {New Security Paradigms Workshop (NSPW)},
  year = {2010},
  pages = {85-94},
  url = {https://tylermoore.utulsa.edu/nspw10.pdf},
  puburl = {http://doi.acm.org/10.1145/1900546.1900559},
  editor = {Angelos D. Keromytis and
               Sean Peisert and
               Richard Ford and
               Carrie Gates},
  publisher = {ACM}
}
@inproceedings{MoranM10fc,
  author = {Tal Moran and
               Tyler Moore},
  title = {The Phish-Market Protocol: Securely Sharing Attack Data
               between Competitors},
  booktitle = {Financial Cryptography and Data Security},
  year = {2010},
  pages = {222-237},
  puburl = {https://dx.doi.org/10.1007/978-3-642-14577-3_18},
  url = {https://tylermoore.utulsa.edu/fc10phishmarket.pdf},
  presurl = {https://tylermoore.utulsa.edu/fc10phishmarketpres.pdf},
  editor = {Radu Sion},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {6052}
}
@inproceedings{MooreE10fc,
  author = {Tyler Moore and
               Benjamin Edelman},
  title = {Measuring the Perpetrators and Funders of Typosquatting},
  booktitle = {Financial Cryptography and Data Security},
  year = {2010},
  pages = {175-191},
  puburl = {https://dx.doi.org/10.1007/978-3-642-14577-3_15},
  url = {https://tylermoore.utulsa.edu/fc10typo.pdf},
  presurl = {https://tylermoore.utulsa.edu/fc10typopres.pdf},
  dataurl = {http://www.benedelman.org/typosquatting/},
  editor = {Radu Sion},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {6052}
}
@inproceedings{BohmeM09weis,
  author = {Rainer B{\"o}hme and
               Tyler Moore},
  title = {The Iterated Weakest Link - A Model of Adaptive Security
               Investment},
  booktitle = {8th Workshop on the Economics of Information Security (WEIS)},
  year = {2009},
  url = {https://tylermoore.utulsa.edu/weis09.pdf},
  presurl = {https://tylermoore.utulsa.edu/weis09pres.pdf},
  puburl = {http://weis09.infosecon.net/files/152/index.html}
}
@inproceedings{MooreCS09leet,
  author = {Moore, Tyler and Clayton, Richard and Stern, Henry},
  title = {Temporal correlations between spam and phishing websites},
  booktitle = {Proceedings of the 2nd USENIX conference on Large-scale exploits and emergent threats: botnets, spyware, worms, and more},
  series = {LEET'09},
  year = {2009},
  location = {Boston, MA},
  puburl = {https://www.usenix.org/conference/leet-09/temporal-correlations-between-spam-and-phishing-websites},
  url = {https://tylermoore.utulsa.edu/leet09.pdf},
  presurl = {https://tylermoore.utulsa.edu/leet09pres.pdf},
  publisher = {USENIX Association},
  address = {Berkeley, CA, USA}
}
@inproceedings{MooreC09fc,
  author = {Tyler Moore and
               Richard Clayton},
  title = {Evil Searching: Compromise and Recompromise of Internet
               Hosts for Phishing},
  booktitle = {Financial Cryptography and Data Security},
  year = {2009},
  pages = {256-272},
  puburl = {https://dx.doi.org/10.1007/978-3-642-03549-4_16},
  url = {https://tylermoore.utulsa.edu/fc09.pdf},
  presurl = {https://tylermoore.utulsa.edu/fc09pres.pdf},
  editor = {Roger Dingledine and
               Philippe Golle},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {5628}
}
@inproceedings{MooreC08ecrime,
  author = {Tyler Moore and
               Richard Clayton},
  title = {The Consequence of Non-Cooperation in the Fight Against Phishing},
  booktitle = {APWG eCrime Researchers Summit},
  year = {2008},
  pages = {1-14},
  puburl = {https://dx.doi.org/10.1109/ECRIME.2008.4696968},
  url = {https://tylermoore.utulsa.edu/ecrime08.pdf},
  presurl = {https://tylermoore.utulsa.edu/ecrime08pres.pdf},
  publisher = {IEEE}
}
@inproceedings{MooreC08fc,
  author = {Tyler Moore and
               Richard Clayton},
  title = {Evaluating the Wisdom of Crowds in Assessing Phishing Websites},
  booktitle = {Financial Cryptography and Data Security},
  year = {2008},
  pages = {16-30},
  puburl = {https://dx.doi.org/10.1007/978-3-540-85230-8_2},
  url = {https://tylermoore.utulsa.edu/fc08.pdf},
  presurl = {https://tylermoore.utulsa.edu/fc08pres.pdf},
  editor = {Gene Tsudik},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {5143}
}
@inproceedings{MooreC07ecrime,
  author = {Tyler Moore and
               Richard Clayton},
  title = {Examining the impact of website take-down on phishing},
  booktitle = {APWG eCrime Researchers Summit},
  year = {2007},
  pages = {1-13},
  puburl = {http://doi.acm.org/10.1145/1299015.1299016},
  url = {https://tylermoore.utulsa.edu/ecrime07.pdf},
  presurl = {https://tylermoore.utulsa.edu/ecrime07pres.pdf},
  editor = {Lorrie Faith Cranor},
  publisher = {ACM},
  series = {ACM International Conference Proceeding Series},
  volume = {269}
}
@inproceedings{MooreC07weis,
  author = {Tyler Moore and
               Richard Clayton},
  title = {An Empirical Analysis of the Current State of Phishing Attack
               and Defence},
  booktitle = {6th Workshop on the Economics of Information Security (WEIS)},
  year = {2007},
  puburl = {http://weis2007.econinfosec.org/papers/51.pdf},
  url = {https://tylermoore.utulsa.edu/weis07.pdf},
  presurl = {https://tylermoore.utulsa.edu/weis07pres.pdf}
}
@inproceedings{Moore06weis,
  author = {Tyler Moore},
  title = {The Economics of Digital Forensics},
  booktitle = {5th Workshop on the Economics of Information Security (WEIS)},
  year = {2006},
  puburl = {http://weis2006.econinfosec.org/docs/14.pdf},
  url = {https://tylermoore.utulsa.edu/weis06.pdf}
}
@inproceedings{Moore05weis,
  author = {Tyler Moore},
  title = {Countering Hidden-Action Attacks on Networked Systems},
  booktitle = {4th Workshop on the Economics of Information Security (WEIS)},
  year = {2005},
  puburl = {http://infosecon.net/workshop/pdf/18.pdf},
  url = {https://tylermoore.utulsa.edu/weis05.pdf},
  presurl = {https://tylermoore.utulsa.edu/weis05pres.pdf}
}
@inproceedings{LorenzMMHS01,
  author = {Gary Lorenz and Tyler Moore and Gavin Manes and John Hale and Sujeet Shenoi},
  title = {Securing {SS7} Telecommunications Networks},
  booktitle = {Second IEEE Systems, Man and Cybernetics Information Assurance Workshop},
  year = {2001},
  month = {June},
  day = {5-6}
}
@inproceedings{LeontiadisMC14,
  author = {Leontiadis, Nektarios and Moore, Tyler and Christin, Nicolas},
  title = {A Nearly Four-Year Longitudinal Study of Search-Engine Poisoning},
  booktitle = {Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security},
  series = {CCS '14},
  year = {2014},
  isbn = {978-1-4503-2957-6},
  location = {Scottsdale, Arizona, USA},
  pages = {930--941},
  numpages = {12},
  url = {https://tylermoore.utulsa.edu/ccs14.pdf},
  puburl = {http://doi.acm.org/10.1145/2660267.2660332},
  doi = {10.1145/2660267.2660332},
  acmid = {2660332},
  publisher = {ACM},
  keywords = {online crime, search engines, web security}
}
@inproceedings{ClaytonMC15weis,
  author = {Richard Clayton and Tyler Moore and Nicolas Christin},
  title = {Concentrating Correctly on Cybercrime Concentration},
  booktitle = {14th Workshop on the Economics of Information Security},
  year = 2015,
  url = {http://www.econinfosec.org/archive/weis2015/papers/WEIS_2015_clayton.pdf},
  puburl = {https://tylermoore.utulsa.edu/weis15pres.pdf}
}
@inproceedings{CetinJGMV15weis,
  title = {Understanding the Role of Sender Reputation in Abuse Reporting and Cleanup},
  author = {Orcun Cetin and Mohammad Hanif Jhaveri and Carlos Ga{\~n}{\'a}n and Michel van Eeten and Tyler Moore},
  booktitle = {14th Workshop on the Economics of Information Security},
  year = 2015,
  url = {http://www.econinfosec.org/archive/weis2015/papers/WEIS_2015_cetin.pdf}
}
@inproceedings{WadleighDM15www,
  author = {John Wadleigh and Jake Drew and Tyler Moore},
  title = {The E-Commerce Market for ``Lemons'': Identification and Analysis of Websites Selling Counterfeit Goods},
  booktitle = {International World Wide Web Conference (Security and Privacy Track)},
  year = {2015},
  month = {May},
  publisher = {ACM},
  pages = {1188-1197},
  url = {https://tylermoore.utulsa.edu/www15.pdf},
  puburl = {http://www.www2015.it/documents/proceedings/proceedings/p1188.pdf}
}
@inproceedings{MooreC15apwg,
  author = {Tyler Moore and Richard Clayton},
  title = {Which Malware Lures Work Best? Measurements
from a Large Instant Messaging Worm},
  booktitle = {{APWG} Symposium on Electronic Crime Research (eCrime)},
  year = 2015,
  doi = {10.1109/ECRIME.2015.7120801},
  pages = {69--78},
  publisher = {IEEE},
  url = {https://tylermoore.utulsa.edu/ecrime15.pdf}
}
@inproceedings{VasekM15fc,
  author = {Marie Vasek and Tyler Moore},
  title = {There's no free lunch, even using {B}itcoin: Tracking the Popularity and Profits of Virtual Currency Scams},
  booktitle = {Financial Cryptography and Data Security},
  year = {2015},
  volume = {8975},
  editor = {B\"ohme, Rainer and Okamoto, Tatsuaki},
  doi = {10.1007/978-3-662-47854-7_4},
  pages = {44-61},
  puburl = {https://dx.doi.org/10.1007/978-3-662-47854-7_4},
  month = {January},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  url = {https://tylermoore.utulsa.edu/fc15.pdf},
  presurl = {http://secon.utulsa.edu/vasek/vasekfc15pres.pdf}
}
@inproceedings{VasekBCKM16fc,
  author = {Marie Vasek and Joseph Bonneau and Ryan Castellucci and Cameron Keith and Tyler Moore},
  title = {The {B}itcoin brain drain: Examining the Use and Abuse of {B}itcoin Brain Wallets},
  booktitle = {Financial Cryptography and Data Security},
  year = {2016},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {9603},
  pages = {609--618},
  editor = {Jens Grossklags and Bart Preneel},
  url = {https://tylermoore.utulsa.edu/fc16.pdf},
  puburl = {https://dx.doi.org/10.1007/978-3-662-54970-4_36},
  presurl = {https://tylermoore.utulsa.edu/fc16pres.pdf}
}
@inproceedings{DrewHM16star,
  author = {Jake Drew and Michael Hahsler and Tyler Moore},
  title = {Polymorphic Malware Detection Using Sequence Classification Methods},
  booktitle = {Workshop on Bio-inspired Security, Trust, Assurance and Resilience (BioStar), IEEE Security and Privacy Workshops (SPW)},
  year = 2016,
  publisher = {IEEE},
  doi = {10.1109/SPW.2016.30},
  month = {May},
  pages = {81--87},
  url = {https://tylermoore.utulsa.edu/biostar16.pdf}
}
@inproceedings{MooreDC16weis,
  author = {Tyler Moore and Scott Dynes and Frederick Chang},
  title = {Identifying how firms manage cybersecurity investment},
  booktitle = {15th Workshop on the Economics of Information Security (WEIS)},
  year = 2016,
  url = {https://tylermoore.utulsa.edu/weis16ciso.pdf},
  presurl = {https://tylermoore.utulsa.edu/weis16cisopres.pdf}
}
@inproceedings{FederGHM16weis,
  author = {Amir Feder and Neil Gandal and JT Hamrick and Tyler Moore},
  title = {The Impact of {DDoS} and Other Security Shocks on {Bitcoin} Currency Exchanges: Evidence from {Mt. Gox}},
  booktitle = {15th Workshop on the Economics of Information Security (WEIS)},
  year = 2016,
  url = {https://tylermoore.utulsa.edu/weis16gox.pdf},
  presurl = {https://tylermoore.utulsa.edu/weis16goxpres.pdf}
}
@inproceedings{VasekWM16wiscs,
  author = {Marie Vasek and Matthew Weeden and Tyler Moore},
  title = {Measuring the Impact of Sharing Abuse Data with Web Hosting Providers},
  booktitle = {ACM Workshop on Information Sharing and Collaborative Security},
  year = 2016,
  pages = {71--80},
  publisher = {{ACM}},
  url = {https://tylermoore.utulsa.edu/wiscs16.pdf},
  puburl = {http://dl.acm.org/citation.cfm?id=2994548},
  presurl = {https://tylermoore.utulsa.edu/vasekwiscs16pres.pdf}
}
@inproceedings{GandalHMO17weis,
  author = {Neil Gandal and JT Hamrick and Tyler Moore and Tali Oberman},
  title = {Price Manipulation in the {Bitcoin} Ecosystem},
  booktitle = {16th Workshop on the Economics of Information Security (WEIS)},
  year = 2017,
  url = {https://tylermoore.utulsa.edu/jme17.pdf},
  presurl = {https://tylermoore.utulsa.edu/weis17pres.pdf}
}
@inproceedings{Cats17ccs,
  title = {Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting},
  author = {Samaneh Tajalizadehkhoob and Tom van Goethem and Maciej Korczy\'nski and Arman Noroozian and Rainer B\"ohme and Tyler Moore and Wouter Joosen and Michel van Eeten},
  booktitle = {ACM SIGSAC Conference on Computer and Communications Security},
  series = {CCS '17},
  year = {2017},
  location = {Dallas, Texas, USA},
  publisher = {ACM},
  url = {https://tylermoore.utulsa.edu/ccs17.pdf}
}
@inproceedings{SpringMP17nspw,
  title = {Practicing a Science of Security: A Philosophy of Science Perspective},
  booktitle = {New Security Paradigms Workshop (NSPW)},
  author = {Jonathan M. Spring and Tyler Moore and David Pym},
  year = {2017},
  location = {Santa Cruz, California, USA},
  publisher = {ACM},
  url = {https://tylermoore.utulsa.edu/nspw17.pdf}
}
@inproceedings{VasekM18bitcoin,
  title = {Analyzing the {Bitcoin} {Ponzi} Scheme Ecosystem},
  author = {Marie Vasek and Tyler Moore},
  booktitle = {Fifth Workshop on Bitcoin and Blockchain Research},
  year = 2018,
  publisher = {Springer},
  series = {Lecture Notes in Computer Science}
}
@inproceedings{ZhengRCTM18cset,
  author = {Muwei Zheng and Hannah Robbins and Zimo Chai and Prakash Thapa and Tyler Moore},
  title = {Cybersecurity Research Datasets: Taxonomy and Empirical Analysis},
  booktitle = {11th {USENIX} Workshop on Cyber Security Experimentation and Test ({CSET} 18)},
  year = {2018},
  address = {Baltimore, MD},
  puburl = {https://www.usenix.org/conference/cset18/presentation/zheng},
  url = {https://tylermoore.utulsa.edu/cset18.pdf},
  dataurl = {https://dx.doi.org/10.7910/DVN/4EPUIA},
  presurl = {https://tylermoore.utulsa.edu/cset18pres.pdf},
  publisher = {{USENIX} Association}
}
@inproceedings{FederGHMV17weis,
  author = {Amir Feder and Neil Gandal and {JT} Hamrick and Tyler Moore and Marie Vasek},
  title = {The rise and fall of cryptocurrencies},
  booktitle = {17th Workshop on the Economics of Information Security (WEIS)},
  year = 2018,
  url = {https://tylermoore.utulsa.edu/weis18.pdf},
  presurl = {https://tylermoore.utulsa.edu/weis18pres.pdf}
}
@inproceedings{WoodsMSWEIS19,
  author = {Daniel W. Woods and Tyler Moore and Andrew C. Simpson},
  title = {The County Fair Cyber Loss Distribution:  Drawing Inferences from Insurance Prices},
  booktitle = {18th Workshop on the Economics of Information Security (WEIS)},
  url = {https://tylermoore.utulsa.edu/weis19loss.pdf},
  year = 2019
}
@inproceedings{HamrickWEIS19,
  author = {{JT} Hamrick and Farhang Rouhi and Arghya Mukherjee and Amir Feder and Neil Gandal and Tyler Moore and Marie Vasek and Neil Gandal and Marie Vasek},
  title = {The economics of cryptocurrency pump and dump schemes},
  booktitle = {18th Workshop on the Economics of Information Security (WEIS)},
  url = {https://tylermoore.utulsa.edu/weis19pump.pdf},
  year = 2019
}
@inproceedings{MooreKCTWEIS19,
  author = {Tyler Moore and Erin Kenneally and Michael Collett and Prakash Thapa},
  title = {Valuing cybersecurity research datasets},
  booktitle = {18th Workshop on the Economics of Information Security (WEIS)},
  year = 2019,
  url = {https://tylermoore.utulsa.edu/weis19data.pdf},
  presurl = {https://tylermoore.utulsa.edu/weis19datapres.pdf}
}
@inproceedings{AndersonWEIS19,
  author = {Ross Anderson and Chris Barton and Rainer B\"ohme and Richard Clayton and Carlos Ga{\~n}{\'a}n and Tom Grasso and Michael Levi and Tyler Moore and Stefan Savage and Marie Vasek},
  title = {Measuring the Changing Cost of Cybercrime},
  booktitle = {18th Workshop on the Economics of Information Security (WEIS)},
  url = {https://tylermoore.utulsa.edu/weis19cost.pdf},
  year = 2019
}
@inproceedings{JohnsonBLOCKCHAIN18,
  author = {B. {Johnson} and A. {Laszka} and J. {Grossklags} and T. {Moore}},
  booktitle = {IEEE International Conference on Blockchain (BLOCKCHAIN)},
  title = {Economic Analyses of Security Investments on Cryptocurrency Exchanges},
  year = {2018},
  volume = {},
  number = {},
  pages = {1253-1262},
  doi = {10.1109/Cybermatics_2018.2018.00220},
  issn = {null},
  month = {July}
}
@inproceedings{SimpsonMC20apwg,
  author = {Geoffrey Simpson and Tyler Moore and Richard Clayton},
  title = {Ten years of attacks on companies using visual impersonation of domain names},
  booktitle = {{APWG} Symposium on Electronic Crime Research (eCrime)},
  year = 2020,
  publisher = {IEEE},
  url = {https://tylermoore.utulsa.edu/ecrime20vidn.pdf}
}
@inproceedings{SimpsonM20apwg,
  author = {Geoffrey Simpson and Tyler Moore},
  title = {Empirical analysis of losses from business-email compromise},
  booktitle = {{APWG} Symposium on Electronic Crime Research (eCrime)},
  year = 2020,
  publisher = {IEEE},
  url = {https://tylermoore.utulsa.edu/ecrime20bec.pdf}
}
@inproceedings{DBLP:conf/icbc2/MorinV021,
  author = {Andrew Morin and
               Marie Vasek and
               Tyler Moore},
  title = {Detecting Text Reuse in Cryptocurrency Whitepapers},
  booktitle = {{IEEE} International Conference on Blockchain and Cryptocurrency,
               {ICBC} 2021, Sydney, Australia, May 3-6, 2021},
  pages = {1--5},
  publisher = {{IEEE}},
  year = {2021},
  url = {https://tylermoore.utulsa.edu/icbc21.pdf},
  puburl = {https://doi.org/10.1109/ICBC51069.2021.9461147},
  doi = {10.1109/ICBC51069.2021.9461147},
  timestamp = {Wed, 30 Jun 2021 12:20:23 +0200},
  biburl = {https://dblp.org/rec/conf/icbc2/MorinV021.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{Vermeer:EuroSP21,
  author = {Matthew Vermeer and Jonathan West and Alejandro Cuevas and Shuonan Niu and Nicolas Christin and Michel {van Eeten} and Tobias Fiebig and Carlos Ga{\~n}{\'a}n and Tyler Moore},
  title = {{SoK}: A framework for asset discovery: Systematizing advances in network measurements for protecting organizations},
  booktitle = {Proceedings of the {6th IEEE European Symposium on Security and Privacy (Euro S\&P'21)}},
  year = 2021,
  month = sep,
  address = {Vienna, Austria (online)},
  url = {https://tylermoore.utulsa.edu/eurosp21.pdf}
}
@inproceedings{Hamrick:Defi21,
  author = {{JT} Hamrick and Farhang Rouhi and Arghya Mukherjee and Marie Vasek and Tyler Moore and Neil Gandal},
  title = {Analyzing Target-Based Cryptocurrency Pump and Dump Schemes},
  booktitle = {{ACM CCS} Workshop on Decentralized Finance and Security},
  year = 2021,
  url = {https://tylermoore.utulsa.edu/defi21.pdf}
}
@inproceedings{Mukherjee:eCrime22,
  author = {Mukherjee, Arghya and Moore, Tyler},
  title = {Cryptocurrency Exchange Closure Revisited (Again)},
  booktitle = {{APWG} Symposium on Electronic Crime Research {(eCrime)}},
  year = {2022},
  volume = {},
  number = {},
  pages = {1-8},
  doi = {10.1109/eCrime57793.2022.10142141},
  url = {https://tylermoore.utulsa.edu/ecrime22exchange.pdf}
}
@inproceedings{Siu:eCrime22,
  author = {Siu, Gilberto Atondo and Hutchings, Alice and Vasek, Marie and Moore, Tyler},
  title = {“Invest in crypto!”: An analysis of investment scam advertisements found in Bitcointalk},
  booktitle = {{APWG} Symposium on Electronic Crime Research {(eCrime)}},
  year = {2022},
  volume = {},
  number = {},
  pages = {1-12},
  url = {https://tylermoore.utulsa.edu/ecrime22scam.pdf},
  doi = {10.1109/eCrime57793.2022.10142100}
}
@inproceedings{Morin:CNS22,
  author = {Morin, Andrew and Moore, Tyler},
  booktitle = {IEEE Conference on Communications and Network Security (CNS) Cyber Resilience Workshop},
  title = {Towards Cost-Balanced Intrusion Detection in {OT} Environments},
  year = {2022},
  volume = {},
  number = {},
  pages = {1-6},
  doi = {10.1109/CNS56114.2022.10092920},
  url = {https://tylermoore.utulsa.edu/crw22.pdf}
}
@inproceedings{Morin:WEIS22,
  author = {Andrew Morin and Tyler Moore and Eric Olson},
  title = {Breaking the Stablecoin Buck: Measuring the Impact of Security Breach and Liquidation Shocks},
  booktitle = {21st Workshop on the Economics of Information Security (WEIS)},
  year = 2022,
  url = {https://tylermoore.utulsa.edu/weis22stablecoin.pdf}
}
@inproceedings{West:PAM22,
  author = {West, Jonathan Codi
and Moore, Tyler},
  editor = {Hohlfeld, Oliver
and Moura, Giovane
and Pelsser, Cristel},
  title = {Longitudinal Study of Internet-Facing {OpenSSH} Update Patterns},
  booktitle = {Passive and Active Measurement},
  year = {2022},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {13210},
  address = {Cham},
  pages = {675--689},
  abstract = {Keeping server software patched and up-to-date is a never-ending struggle for system administrators that is crucial for security. Nevertheless, we know little about how well or how consistently software updates are applied over time across the Internet. We shed light on software update behavior on publicly addressable networks by utilizing Internet-wide scans of OpenSSH banners. We primarily focus on OpenSSH banners which contain patch-level information in order to map accurate release dates. We augment this view by tracking which software security backports fix vulnerabilities in older OpenSSH versions. We find that the availability of backports, not CVE announcements or upstream software updates, trigger rapid updates. Unfortunately, we also determine that the lag in publishing backports (if they are published at all) combined with the steady cadence of new vulnerability reports ensures that most of the time, the vast majority of machines are vulnerable to at least one CVE. Additionally, we observe that major cloud hosting providers are consistently faster to apply patches.},
  isbn = {978-3-030-98785-5},
  url = {https://tylermoore.utulsa.edu/pam22.pdf}
}
@inproceedings{Morin:WACCO23,
  author = {Andrew Morin and Tyler Moore},
  title = {How Cryptocurrency Exchange Interruptions Create Arbitrage Opportunities},
  booktitle = {IEEE European Symposium on Security and Privacy Workshops (EuroS\&PW)},
  year = 2023,
  pages = {207--215},
  doi = {10.1109/EuroSPW59978.2023.00028},
  publisher = {{IEEE}},
  url = {https://tylermoore.utulsa.edu/wacco23arbitrage.pdf}
}
@inproceedings{Hajizada:WACCO23,
  author = {Hajizada, Abulfaz and Moore, Tyler},
  booktitle = {IEEE European Symposium on Security and Privacy Workshops (EuroS\&PW)},
  title = {On Gaps in Enterprise Cyber Attack Reporting},
  year = {2023},
  volume = {},
  number = {},
  pages = {227--231},
  doi = {10.1109/EuroSPW59978.2023.00030},
  publisher = {{IEEE}},
  url = {https://tylermoore.utulsa.edu/wacco23sec.pdf}
}
@inproceedings{Simpson:HICSS24,
  author = {Simpson, Geoffrey and Moore, Tyler},
  booktitle = {57th Hawaii International Conference on System Sciences (HICSS)},
  title = {Identifying Subdomain Doppelganger Attacks against Companies},
  year = {2024},
  volume = {},
  number = {},
  url = {https://tylermoore.utulsa.edu/hicss24doppel.pdf}
}
@inproceedings{Phillips:HICSS24,
  author = {Samantha Phillips and Sal Aurigemma and Bradley Brummel and Tyler Moore},
  booktitle = {57th Hawaii International Conference on System Sciences (HICSS)},
  title = {Leveraging Situational Judgment Tests to Measure
Behavioral Information Security},
  year = {2024},
  volume = {},
  number = {},
  url = {https://tylermoore.utulsa.edu/hicss24sjt.pdf}
}
@inproceedings{Phillips:ASC23,
  author = {Samantha Phillips and Bradley Brummel and Sal Aurigemma and Tyler Moore},
  booktitle = {22nd Annual Security Conference (ASC)},
  title = {Information Security Culture: A Look Ahead at Measurement Methods},
  year = {2023},
  volume = {},
  number = {},
  url = {https://tylermoore.utulsa.edu/asc23phillips.pdf}
}
@inproceedings{Hastings:ASC23,
  author = {Seth Hastings and Tyler Moore and Sal Aurigemma and Bradley Brummel},
  booktitle = {22nd Annual Security Conference (ASC)},
  title = {Predicting Authentication Performance with
Psychological Constructs},
  year = {2023},
  url = {https://tylermoore.utulsa.edu/asc23hastings.pdf}
}
@inproceedings{Bolger:ASC23,
  author = {Corey Bolger  and Bradley Brummel and Sal Aurigemma and Tyler Moore and Meagan Baskin},
  booktitle = {22nd Annual Security Conference (ASC)},
  title = {Information Security Awareness: Identifying
Gaps in Current Measurement Tools},
  year = {2023},
  url = {https://tylermoore.utulsa.edu/asc23bolger.pdf}
}
@inproceedings{Shumway:ASC23,
  author = {Philip Shumway and Bradley Brummel and Tyler Moore and Sal Aurigemma},
  booktitle = {22nd Annual Security Conference (ASC)},
  title = {Naturalistic observations of login attempts: Do security implementations and demands affect employee job behaviors and perceptions?},
  year = {2023},
  volume = {},
  number = {}
}

This file was generated by bibtex2html 1.99.