@inproceedings{MooreRCPAH08secon, author = {Tyler Moore and Maxim Raya and Jolyon Clulow and Panagiotis Papadimitratos and Ross Anderson and Jean-Pierre Hubaux}, title = {Fast Exclusion of Errant Devices from Vehicular Networks}, booktitle = {Proceedings of the Fifth Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON)}, year = {2008}, pages = {135-143}, puburl = {http://dx.doi.org/10.1109/SAHCN.2008.26}, url = {https://tylermoore.utulsa.edu/secon08.pdf} }
@inproceedings{MooreCNA07esas, author = {Tyler Moore and Jolyon Clulow and Shishir Nagaraja and Ross Anderson}, title = {New Strategies for Revocation in Ad-Hoc Networks}, booktitle = {4th European Workshop on Security and Privacy in Ad-hoc and Sensor Networks (ESAS)}, year = {2007}, pages = {232-246}, puburl = {http://dx.doi.org/10.1007/978-3-540-73275-4_17}, url = {https://tylermoore.utulsa.edu/esas07.pdf}, presurl = {https://tylermoore.utulsa.edu/esas07-pres.pdf}, editor = {Frank Stajano and Catherine Meadows and Srdjan Capkun and Tyler Moore}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {4572} }
@inproceedings{MooreC07sec, author = {Tyler Moore and Jolyon Clulow}, title = {Secure Path-Key Revocation for Symmetric Key Pre-distribution Schemes in Sensor Networks}, booktitle = {Proceedings of the IFIP TC-11 22nd International Information Security Conference (IFIP SEC)}, year = {2007}, pages = {157-168}, puburl = {http://dx.doi.org/10.1007/978-0-387-72367-9_14}, url = {https://tylermoore.utulsa.edu/ifipsec2007-path.pdf}, presurl = {https://tylermoore.utulsa.edu/ifipsec-pres.pdf}, editor = {Hein S. Venter and Mariki M. Eloff and Les Labuschagne and Jan H. P. Eloff and Rossouw von Solms}, publisher = {Springer}, series = {IFIP}, volume = {232} }
@inproceedings{ClulowHKM06esas, author = {Jolyon Clulow and Gerhard P. Hancke and Markus G. Kuhn and Tyler Moore}, booktitle = {3rd European Workshop on Security and Privacy in Ad-hoc and Sensor Networks (ESAS)}, title = {So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks}, year = {2006}, pages = {83-97}, puburl = {http://dx.doi.org/10.1007/11964254_9}, url = {https://tylermoore.utulsa.edu/esas2006-distance.pdf}, presurl = {https://tylermoore.utulsa.edu/esas-pres.pdf}, editor = {Levente Butty{\'a}n and Virgil D. Gligor and Dirk Westhoff}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {4357} }
@inproceedings{Moore06percom, author = {Tyler Moore}, title = {A Collusion Attack on Pairwise Key Predistribution Schemes for Distributed Sensor Networks}, booktitle = {4th IEEE Conference on Pervasive Computing and Communications Security (PerSec)}, year = {2006}, pages = {251-255}, puburl = {http://doi.ieeecomputersociety.org/10.1109/PERCOMW.2006.3}, url = {https://tylermoore.utulsa.edu/persec06-moore.pdf}, presurl = {https://tylermoore.utulsa.edu/persec06-moore-pres.pdf}, publisher = {IEEE Computer Society} }
@inproceedings{RiekBM14weis, author = {Markus Riek and Rainer B{\"o}hme and Tyler Moore}, title = {Understanding the Influence of Cybercrime Risk on the E-Service Adoption of {E}uropean {I}nternet Users}, booktitle = {13th Workshop on the Economics of Information Security (WEIS)}, year = {2014}, url = {https://tylermoore.utulsa.edu/weis14.pdf} }
@inproceedings{DrewM14iwcc, author = {Jake Drew and Tyler Moore}, title = {Automatic Identification of Replicated Criminal Websites Using Combined Clustering}, booktitle = {International Workshop on Cyber Crime (IWCC), IEEE Security and Privacy Workshops}, year = {2014}, publisher = {IEEE}, url = {https://tylermoore.utulsa.edu/iwcc14.pdf} }
@inproceedings{VasekTM14bitcoin, author = {Marie Vasek and Micah Thornton and Tyler Moore}, title = {Empirical Analysis of Denial-of-Service Attacks in the {B}itcoin Ecosystem}, booktitle = {1st Workshop on Bitcoin Research}, year = {2014}, month = {March}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {8438}, pages = {57--71}, dataurl = {https://dx.doi.org/10.7910/DVN/25541}, url = {https://tylermoore.utulsa.edu/bitcoin14ddos.pdf}, puburl = {https://dx.doi.org/10.1007/978-3-662-44774-1_5}, presurl = {http://secon.utulsa.edu/vasek/thorntonbtc14pres.pdf} }
@inproceedings{JohnsonLGVM14bitcoin, author = {Benjamin Johnson and Aron Laszka and Jens Grossklags and Marie Vasek and Tyler Moore}, title = {Game-Theoretic Analysis of {DDoS} Attacks Against {B}itcoin Mining Pools}, booktitle = {1st Workshop on Bitcoin Research}, year = {2014}, month = {March}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {8438}, pages = {72--86}, url = {https://tylermoore.utulsa.edu/bitcoin14gt.pdf}, puburl = {https://dx.doi.org/10.1007/978-3-662-44774-1_6} }
@inproceedings{MooreC14fc, author = {Tyler Moore and Richard Clayton}, title = {The Ghosts of Banking Past: {E}mpirical Analysis of Closed Bank Websites}, booktitle = {Financial Cryptography and Data Security}, year = {2014}, month = {March}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {8437}, dataurl = {https://dx.doi.org/10.7910/DVN/26011}, url = {https://tylermoore.utulsa.edu/fc14ghosts.pdf}, presurl = {https://tylermoore.utulsa.edu/fc14banks-pres.pdf}, puburl = {https://dx.doi.org/10.1007/978-3-662-45472-5_3}, pages = {33--48} }
@inproceedings{VasekM14fc, author = {Marie Vasek and Tyler Moore}, title = {Identifying Risk Factors for Webserver Compromise}, booktitle = {Financial Cryptography and Data Security}, year = {2014}, month = {March}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {8437}, dataurl = {https://dx.doi.org/10.7910/DVN/25608}, url = {https://tylermoore.utulsa.edu/fc14rf.pdf}, puburl = {https://dx.doi.org/10.1007/978-3-662-45472-5_22}, pages = {326--345}, presurl = {http://secon.utulsa.edu/vasek/vasekfc14pres.pdf} }
@inproceedings{VasekM13ecrime, author = {Marie Vasek and Tyler Moore}, title = {Empirical Analysis of Factors Affecting Malware {URL} Detection}, booktitle = {8th APWG eCrime Researchers Summit (eCrime)}, year = {2013}, month = {September}, url = {https://tylermoore.utulsa.edu/ecrime13.pdf}, presurl = {http://secon.utulsa.edu/vasek/vasekecrime13pres.pdf} }
@inproceedings{LeontiadisMC13ec, author = {Nektarios Leontiadis and Tyler Moore and Nicolas Christin}, title = {Pick Your Poison: {P}ricing and Inventories at Unlicensed Online Pharmacies}, booktitle = {ACM Conference on Electronic Commerce (EC)}, url = {https://tylermoore.utulsa.edu/ec13.pdf}, puburl = {http://dl.acm.org/citation.cfm?id=2482610‎}, publisher = {ACM}, year = {2013}, month = {June}, pages = {621-638} }
@inproceedings{MooreC13fc, author = {Tyler Moore and Nicolas Christin}, title = {Beware the Middleman: Empirical Analysis of {B}itcoin-Exchange Risk}, booktitle = {Financial Cryptography and Data Security}, year = {2013}, month = {April}, url = {https://tylermoore.utulsa.edu/fc13.pdf}, presurl = {https://tylermoore.utulsa.edu/fc13pres.pdf}, puburl = {https://dx.doi.org/10.1007/978-3-642-39884-1_3}, dataurl = {https://dx.doi.org/10.7910/DVN/25545}, pages = {25-33}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {7859} }
@inproceedings{MooreC12ecrime, author = {Tyler Moore and Richard Clayton}, title = {Discovering Phishing Dropboxes Using Email Metadata}, booktitle = {7th APWG eCrime Researchers Summit (eCrime)}, year = {2012}, month = {October}, pages = {}, url = {https://tylermoore.utulsa.edu/ecrime12dropbox.pdf}, presurl = {https://tylermoore.utulsa.edu/ecrime12dropboxpres.pdf} }
@inproceedings{BoehmeM12ecrime, author = {Rainer B{\"o}hme and Tyler Moore}, title = {How Do Consumers React to Cybercrime?}, booktitle = {APWG eCrime Researchers Summit (eCrime)}, year = {2012}, month = {October}, pages = {}, url = {https://tylermoore.utulsa.edu/ecrime12eurobar.pdf}, presurl = {https://tylermoore.utulsa.edu/ecrime12eurobarpres.pdf} }
@inproceedings{EdwardsMSHF12nspw, author = {Benjamin Edwards and Tyler Moore and George Stelle and Steven A. Hofmeyr and Stephanie Forrest}, title = {Beyond the Blacklist: Modeling Malware Spread and the Effect of Interventions}, booktitle = {Proceedings of the New Security Paradigms Workshop, Bertinoro, Italy, September 19-21, 2012}, year = {2012}, publisher = {ACM}, url = {https://tylermoore.utulsa.edu/nspw12.pdf} }
@inproceedings{VasekM12cset, author = {Vasek, Marie and Moore, Tyler}, title = {Do malware reports expedite cleanup? {A}n experimental study}, booktitle = {Proceedings of the 5th USENIX Workshop on Cyber Security Experimentation and Test}, series = {CSET'12}, year = {2012}, location = {Bellevue, WA}, puburl = {https://www.usenix.org/system/files/conference/cset12/cset12-final20.pdf}, url = {https://tylermoore.utulsa.edu/cset12.pdf}, presurl = {https://www.usenix.org/sites/default/files/conference/protected-files/vasek_cset12_slides.pdf}, dataurl = {https://dx.doi.org/10.7910/DVN/25571}, publisher = {USENIX Association}, address = {Berkeley, CA, USA} }
@inproceedings{AndersonBBCELMS12weis, author = {Ross Anderson and Chris Barton and Rainer B{\"o}hme and Richard Clayton and Michael van Eeten and Michael Levi and Tyler Moore and Stefan Savage}, title = {Measuring the Cost of Cybercrime}, booktitle = {11th Workshop on the Economics of Information Security (WEIS)}, year = {2012}, url = {https://tylermoore.utulsa.edu/weis12.pdf}, presurl = {https://tylermoore.utulsa.edu/weis12pres.pdf} }
@inproceedings{MooreHC12fc, author = {Tyler Moore and Jie Han and Richard Clayton}, title = {The Postmodern {P}onzi Scheme: Empirical Analysis of High-Yield Investment Programs}, booktitle = {Financial Cryptography and Data Security}, year = {2012}, pages = {41-56}, puburl = {https://dx.doi.org/10.1007/978-3-642-32946-3_4}, url = {https://tylermoore.utulsa.edu/fc12.pdf}, presurl = {https://tylermoore.utulsa.edu/fc12pres.pdf}, editor = {Angelos D. Keromytis}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {7397}, puburl = {https://dx.doi.org/10.1007/978-3-642-32946-3} }
@inproceedings{MooreLC11ccs, author = {Tyler Moore and Nektarios Leontiadis and Nicolas Christin}, title = {Fashion crimes: trending-term exploitation on the web}, booktitle = {ACM Conference on Computer and Communications Security (CCS)}, year = {2011}, pages = {455-466}, url = {https://tylermoore.utulsa.edu/ccs11.pdf}, puburl = {http://doi.acm.org/10.1145/2046707.2046761}, presurl = {https://tylermoore.utulsa.edu/ccs11pres.pdf}, editor = {Yan Chen and George Danezis and Vitaly Shmatikov}, publisher = {ACM} }
@inproceedings{LeontiadisMC11uss, author = {Nektarios Leontiadis and Tyler Moore and Nicolas Christin}, title = {Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade}, booktitle = {USENIX Security Symposium}, year = {2011}, url = {https://tylermoore.utulsa.edu/usenix11.pdf}, puburl = {http://static.usenix.org/events/sec11/tech/full_papers/Leontiadis.pdf}, publisher = {USENIX Association} }
@inproceedings{HofmeyrMFES11weis, author = {Steven A. Hofmeyr and Tyler Moore and Stephanie Forrest and Benjamin Edwards and George Stelle}, title = {Modeling Internet-Scale Policies for Cleaning up Malware}, year = {2011}, url = {https://tylermoore.utulsa.edu/weis11model.pdf}, puburl = {http://weis2011.econinfosec.org/papers/Modeling\%20Internet-Scale\%20Policies\%20for\%20Cleaning\%20up\%20Malware.pdf}, booktitle = {10th Workshop on the Economics of Information Security (WEIS)} }
@inproceedings{LandauM11weis, author = {Susan Landau and Tyler Moore}, title = {Economic Tussles in Federated Identity Management}, booktitle = {10th Workshop on the Economics of Information Security (WEIS)}, year = {2011}, puburl = {http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/4254}, presurl = {https://tylermoore.utulsa.edu/nist12pres.pdf} }
@inproceedings{MooreC11fc, author = {Tyler Moore and Richard Clayton}, title = {Ethical Dilemmas in Take-Down Research}, booktitle = {Workshop on the Ethics of Computer Security Research (Financial Cryptography Workshops)}, year = {2011}, pages = {154-168}, url = {https://tylermoore.utulsa.edu/wecsr11.pdf}, presurl = {https://tylermoore.utulsa.edu/wecsr11pres.pdf}, puburl = {https://dx.doi.org/10.1007/978-3-642-29889-9_14}, editor = {George Danezis and Sven Dietrich and Kazue Sako}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {7126} }
@inproceedings{MooreFP10nspw, author = {Tyler Moore and Allan Friedman and Ariel D. Procaccia}, title = {Would a 'cyber warrior' protect us: exploring trade-offs between attack and defense of information systems}, booktitle = {New Security Paradigms Workshop (NSPW)}, year = {2010}, pages = {85-94}, url = {https://tylermoore.utulsa.edu/nspw10.pdf}, puburl = {http://doi.acm.org/10.1145/1900546.1900559}, editor = {Angelos D. Keromytis and Sean Peisert and Richard Ford and Carrie Gates}, publisher = {ACM} }
@inproceedings{MoranM10fc, author = {Tal Moran and Tyler Moore}, title = {The Phish-Market Protocol: Securely Sharing Attack Data between Competitors}, booktitle = {Financial Cryptography and Data Security}, year = {2010}, pages = {222-237}, puburl = {https://dx.doi.org/10.1007/978-3-642-14577-3_18}, url = {https://tylermoore.utulsa.edu/fc10phishmarket.pdf}, presurl = {https://tylermoore.utulsa.edu/fc10phishmarketpres.pdf}, editor = {Radu Sion}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {6052} }
@inproceedings{MooreE10fc, author = {Tyler Moore and Benjamin Edelman}, title = {Measuring the Perpetrators and Funders of Typosquatting}, booktitle = {Financial Cryptography and Data Security}, year = {2010}, pages = {175-191}, puburl = {https://dx.doi.org/10.1007/978-3-642-14577-3_15}, url = {https://tylermoore.utulsa.edu/fc10typo.pdf}, presurl = {https://tylermoore.utulsa.edu/fc10typopres.pdf}, dataurl = {http://www.benedelman.org/typosquatting/}, editor = {Radu Sion}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {6052} }
@inproceedings{BohmeM09weis, author = {Rainer B{\"o}hme and Tyler Moore}, title = {The Iterated Weakest Link - A Model of Adaptive Security Investment}, booktitle = {8th Workshop on the Economics of Information Security (WEIS)}, year = {2009}, url = {https://tylermoore.utulsa.edu/weis09.pdf}, presurl = {https://tylermoore.utulsa.edu/weis09pres.pdf}, puburl = {http://weis09.infosecon.net/files/152/index.html} }
@inproceedings{MooreCS09leet, author = {Moore, Tyler and Clayton, Richard and Stern, Henry}, title = {Temporal correlations between spam and phishing websites}, booktitle = {Proceedings of the 2nd USENIX conference on Large-scale exploits and emergent threats: botnets, spyware, worms, and more}, series = {LEET'09}, year = {2009}, location = {Boston, MA}, puburl = {https://www.usenix.org/conference/leet-09/temporal-correlations-between-spam-and-phishing-websites}, url = {https://tylermoore.utulsa.edu/leet09.pdf}, presurl = {https://tylermoore.utulsa.edu/leet09pres.pdf}, publisher = {USENIX Association}, address = {Berkeley, CA, USA} }
@inproceedings{MooreC09fc, author = {Tyler Moore and Richard Clayton}, title = {Evil Searching: Compromise and Recompromise of Internet Hosts for Phishing}, booktitle = {Financial Cryptography and Data Security}, year = {2009}, pages = {256-272}, puburl = {https://dx.doi.org/10.1007/978-3-642-03549-4_16}, url = {https://tylermoore.utulsa.edu/fc09.pdf}, presurl = {https://tylermoore.utulsa.edu/fc09pres.pdf}, editor = {Roger Dingledine and Philippe Golle}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {5628} }
@inproceedings{MooreC08ecrime, author = {Tyler Moore and Richard Clayton}, title = {The Consequence of Non-Cooperation in the Fight Against Phishing}, booktitle = {APWG eCrime Researchers Summit}, year = {2008}, pages = {1-14}, puburl = {https://dx.doi.org/10.1109/ECRIME.2008.4696968}, url = {https://tylermoore.utulsa.edu/ecrime08.pdf}, presurl = {https://tylermoore.utulsa.edu/ecrime08pres.pdf}, publisher = {IEEE} }
@inproceedings{MooreC08fc, author = {Tyler Moore and Richard Clayton}, title = {Evaluating the Wisdom of Crowds in Assessing Phishing Websites}, booktitle = {Financial Cryptography and Data Security}, year = {2008}, pages = {16-30}, puburl = {https://dx.doi.org/10.1007/978-3-540-85230-8_2}, url = {https://tylermoore.utulsa.edu/fc08.pdf}, presurl = {https://tylermoore.utulsa.edu/fc08pres.pdf}, editor = {Gene Tsudik}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {5143} }
@inproceedings{MooreC07ecrime, author = {Tyler Moore and Richard Clayton}, title = {Examining the impact of website take-down on phishing}, booktitle = {APWG eCrime Researchers Summit}, year = {2007}, pages = {1-13}, puburl = {http://doi.acm.org/10.1145/1299015.1299016}, url = {https://tylermoore.utulsa.edu/ecrime07.pdf}, presurl = {https://tylermoore.utulsa.edu/ecrime07pres.pdf}, editor = {Lorrie Faith Cranor}, publisher = {ACM}, series = {ACM International Conference Proceeding Series}, volume = {269} }
@inproceedings{MooreC07weis, author = {Tyler Moore and Richard Clayton}, title = {An Empirical Analysis of the Current State of Phishing Attack and Defence}, booktitle = {6th Workshop on the Economics of Information Security (WEIS)}, year = {2007}, puburl = {http://weis2007.econinfosec.org/papers/51.pdf}, url = {https://tylermoore.utulsa.edu/weis07.pdf}, presurl = {https://tylermoore.utulsa.edu/weis07pres.pdf} }
@inproceedings{Moore06weis, author = {Tyler Moore}, title = {The Economics of Digital Forensics}, booktitle = {5th Workshop on the Economics of Information Security (WEIS)}, year = {2006}, puburl = {http://weis2006.econinfosec.org/docs/14.pdf}, url = {https://tylermoore.utulsa.edu/weis06.pdf} }
@inproceedings{Moore05weis, author = {Tyler Moore}, title = {Countering Hidden-Action Attacks on Networked Systems}, booktitle = {4th Workshop on the Economics of Information Security (WEIS)}, year = {2005}, puburl = {http://infosecon.net/workshop/pdf/18.pdf}, url = {https://tylermoore.utulsa.edu/weis05.pdf}, presurl = {https://tylermoore.utulsa.edu/weis05pres.pdf} }
@inproceedings{LorenzMMHS01, author = {Gary Lorenz and Tyler Moore and Gavin Manes and John Hale and Sujeet Shenoi}, title = {Securing {SS7} Telecommunications Networks}, booktitle = {Second IEEE Systems, Man and Cybernetics Information Assurance Workshop}, year = {2001}, month = {June}, day = {5-6} }
@inproceedings{LeontiadisMC14, author = {Leontiadis, Nektarios and Moore, Tyler and Christin, Nicolas}, title = {A Nearly Four-Year Longitudinal Study of Search-Engine Poisoning}, booktitle = {Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security}, series = {CCS '14}, year = {2014}, isbn = {978-1-4503-2957-6}, location = {Scottsdale, Arizona, USA}, pages = {930--941}, numpages = {12}, url = {https://tylermoore.utulsa.edu/ccs14.pdf}, puburl = {http://doi.acm.org/10.1145/2660267.2660332}, doi = {10.1145/2660267.2660332}, acmid = {2660332}, publisher = {ACM}, keywords = {online crime, search engines, web security} }
@inproceedings{ClaytonMC15weis, author = {Richard Clayton and Tyler Moore and Nicolas Christin}, title = {Concentrating Correctly on Cybercrime Concentration}, booktitle = {14th Workshop on the Economics of Information Security}, year = 2015, url = {http://www.econinfosec.org/archive/weis2015/papers/WEIS_2015_clayton.pdf}, puburl = {https://tylermoore.utulsa.edu/weis15pres.pdf} }
@inproceedings{CetinJGMV15weis, title = {Understanding the Role of Sender Reputation in Abuse Reporting and Cleanup}, author = {Orcun Cetin and Mohammad Hanif Jhaveri and Carlos Ga{\~n}{\'a}n and Michel van Eeten and Tyler Moore}, booktitle = {14th Workshop on the Economics of Information Security}, year = 2015, url = {http://www.econinfosec.org/archive/weis2015/papers/WEIS_2015_cetin.pdf} }
@inproceedings{WadleighDM15www, author = {John Wadleigh and Jake Drew and Tyler Moore}, title = {The E-Commerce Market for ``Lemons'': Identification and Analysis of Websites Selling Counterfeit Goods}, booktitle = {International World Wide Web Conference (Security and Privacy Track)}, year = {2015}, month = {May}, publisher = {ACM}, pages = {1188-1197}, url = {https://tylermoore.utulsa.edu/www15.pdf}, puburl = {http://www.www2015.it/documents/proceedings/proceedings/p1188.pdf} }
@inproceedings{MooreC15apwg, author = {Tyler Moore and Richard Clayton}, title = {Which Malware Lures Work Best? Measurements from a Large Instant Messaging Worm}, booktitle = {{APWG} Symposium on Electronic Crime Research (eCrime)}, year = 2015, doi = {10.1109/ECRIME.2015.7120801}, pages = {69--78}, publisher = {IEEE}, url = {https://tylermoore.utulsa.edu/ecrime15.pdf} }
@inproceedings{VasekM15fc, author = {Marie Vasek and Tyler Moore}, title = {There's no free lunch, even using {B}itcoin: Tracking the Popularity and Profits of Virtual Currency Scams}, booktitle = {Financial Cryptography and Data Security}, year = {2015}, volume = {8975}, editor = {B\"ohme, Rainer and Okamoto, Tatsuaki}, doi = {10.1007/978-3-662-47854-7_4}, pages = {44-61}, puburl = {https://dx.doi.org/10.1007/978-3-662-47854-7_4}, month = {January}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, url = {https://tylermoore.utulsa.edu/fc15.pdf}, presurl = {http://secon.utulsa.edu/vasek/vasekfc15pres.pdf} }
@inproceedings{VasekBCKM16fc, author = {Marie Vasek and Joseph Bonneau and Ryan Castellucci and Cameron Keith and Tyler Moore}, title = {The {B}itcoin brain drain: Examining the Use and Abuse of {B}itcoin Brain Wallets}, booktitle = {Financial Cryptography and Data Security}, year = {2016}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {9603}, pages = {609--618}, editor = {Jens Grossklags and Bart Preneel}, url = {https://tylermoore.utulsa.edu/fc16.pdf}, puburl = {https://dx.doi.org/10.1007/978-3-662-54970-4_36}, presurl = {https://tylermoore.utulsa.edu/fc16pres.pdf} }
@inproceedings{DrewHM16star, author = {Jake Drew and Michael Hahsler and Tyler Moore}, title = {Polymorphic Malware Detection Using Sequence Classification Methods}, booktitle = {Workshop on Bio-inspired Security, Trust, Assurance and Resilience (BioStar), IEEE Security and Privacy Workshops (SPW)}, year = 2016, publisher = {IEEE}, doi = {10.1109/SPW.2016.30}, month = {May}, pages = {81--87}, url = {https://tylermoore.utulsa.edu/biostar16.pdf} }
@inproceedings{MooreDC16weis, author = {Tyler Moore and Scott Dynes and Frederick Chang}, title = {Identifying how firms manage cybersecurity investment}, booktitle = {15th Workshop on the Economics of Information Security (WEIS)}, year = 2016, url = {https://tylermoore.utulsa.edu/weis16ciso.pdf}, presurl = {https://tylermoore.utulsa.edu/weis16cisopres.pdf} }
@inproceedings{FederGHM16weis, author = {Amir Feder and Neil Gandal and JT Hamrick and Tyler Moore}, title = {The Impact of {DDoS} and Other Security Shocks on {Bitcoin} Currency Exchanges: Evidence from {Mt. Gox}}, booktitle = {15th Workshop on the Economics of Information Security (WEIS)}, year = 2016, url = {https://tylermoore.utulsa.edu/weis16gox.pdf}, presurl = {https://tylermoore.utulsa.edu/weis16goxpres.pdf} }
@inproceedings{VasekWM16wiscs, author = {Marie Vasek and Matthew Weeden and Tyler Moore}, title = {Measuring the Impact of Sharing Abuse Data with Web Hosting Providers}, booktitle = {ACM Workshop on Information Sharing and Collaborative Security}, year = 2016, pages = {71--80}, publisher = {{ACM}}, url = {https://tylermoore.utulsa.edu/wiscs16.pdf}, puburl = {http://dl.acm.org/citation.cfm?id=2994548}, presurl = {https://tylermoore.utulsa.edu/vasekwiscs16pres.pdf} }
@inproceedings{GandalHMO17weis, author = {Neil Gandal and JT Hamrick and Tyler Moore and Tali Oberman}, title = {Price Manipulation in the {Bitcoin} Ecosystem}, booktitle = {16th Workshop on the Economics of Information Security (WEIS)}, year = 2017, url = {https://tylermoore.utulsa.edu/jme17.pdf}, presurl = {https://tylermoore.utulsa.edu/weis17pres.pdf} }
@inproceedings{Cats17ccs, title = {Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting}, author = {Samaneh Tajalizadehkhoob and Tom van Goethem and Maciej Korczy\'nski and Arman Noroozian and Rainer B\"ohme and Tyler Moore and Wouter Joosen and Michel van Eeten}, booktitle = {ACM SIGSAC Conference on Computer and Communications Security}, series = {CCS '17}, year = {2017}, location = {Dallas, Texas, USA}, publisher = {ACM}, url = {https://tylermoore.utulsa.edu/ccs17.pdf} }
@inproceedings{SpringMP17nspw, title = {Practicing a Science of Security: A Philosophy of Science Perspective}, booktitle = {New Security Paradigms Workshop (NSPW)}, author = {Jonathan M. Spring and Tyler Moore and David Pym}, year = {2017}, location = {Santa Cruz, California, USA}, publisher = {ACM}, url = {https://tylermoore.utulsa.edu/nspw17.pdf} }
@inproceedings{VasekM18bitcoin, title = {Analyzing the {Bitcoin} {Ponzi} Scheme Ecosystem}, author = {Marie Vasek and Tyler Moore}, booktitle = {Fifth Workshop on Bitcoin and Blockchain Research}, year = 2018, publisher = {Springer}, series = {Lecture Notes in Computer Science} }
@inproceedings{ZhengRCTM18cset, author = {Muwei Zheng and Hannah Robbins and Zimo Chai and Prakash Thapa and Tyler Moore}, title = {Cybersecurity Research Datasets: Taxonomy and Empirical Analysis}, booktitle = {11th {USENIX} Workshop on Cyber Security Experimentation and Test ({CSET} 18)}, year = {2018}, address = {Baltimore, MD}, puburl = {https://www.usenix.org/conference/cset18/presentation/zheng}, url = {https://tylermoore.utulsa.edu/cset18.pdf}, dataurl = {https://dx.doi.org/10.7910/DVN/4EPUIA}, presurl = {https://tylermoore.utulsa.edu/cset18pres.pdf}, publisher = {{USENIX} Association} }
@inproceedings{FederGHMV17weis, author = {Amir Feder and Neil Gandal and {JT} Hamrick and Tyler Moore and Marie Vasek}, title = {The rise and fall of cryptocurrencies}, booktitle = {17th Workshop on the Economics of Information Security (WEIS)}, year = 2018, url = {https://tylermoore.utulsa.edu/weis18.pdf}, presurl = {https://tylermoore.utulsa.edu/weis18pres.pdf} }
@inproceedings{WoodsMSWEIS19, author = {Daniel W. Woods and Tyler Moore and Andrew C. Simpson}, title = {The County Fair Cyber Loss Distribution: Drawing Inferences from Insurance Prices}, booktitle = {18th Workshop on the Economics of Information Security (WEIS)}, url = {https://tylermoore.utulsa.edu/weis19loss.pdf}, year = 2019 }
@inproceedings{HamrickWEIS19, author = {{JT} Hamrick and Farhang Rouhi and Arghya Mukherjee and Amir Feder and Neil Gandal and Tyler Moore and Marie Vasek and Neil Gandal and Marie Vasek}, title = {The economics of cryptocurrency pump and dump schemes}, booktitle = {18th Workshop on the Economics of Information Security (WEIS)}, url = {https://tylermoore.utulsa.edu/weis19pump.pdf}, year = 2019 }
@inproceedings{MooreKCTWEIS19, author = {Tyler Moore and Erin Kenneally and Michael Collett and Prakash Thapa}, title = {Valuing cybersecurity research datasets}, booktitle = {18th Workshop on the Economics of Information Security (WEIS)}, year = 2019, url = {https://tylermoore.utulsa.edu/weis19data.pdf}, presurl = {https://tylermoore.utulsa.edu/weis19datapres.pdf} }
@inproceedings{AndersonWEIS19, author = {Ross Anderson and Chris Barton and Rainer B\"ohme and Richard Clayton and Carlos Ga{\~n}{\'a}n and Tom Grasso and Michael Levi and Tyler Moore and Stefan Savage and Marie Vasek}, title = {Measuring the Changing Cost of Cybercrime}, booktitle = {18th Workshop on the Economics of Information Security (WEIS)}, url = {https://tylermoore.utulsa.edu/weis19cost.pdf}, year = 2019 }
@inproceedings{JohnsonBLOCKCHAIN18, author = {B. {Johnson} and A. {Laszka} and J. {Grossklags} and T. {Moore}}, booktitle = {IEEE International Conference on Blockchain (BLOCKCHAIN)}, title = {Economic Analyses of Security Investments on Cryptocurrency Exchanges}, year = {2018}, volume = {}, number = {}, pages = {1253-1262}, doi = {10.1109/Cybermatics_2018.2018.00220}, issn = {null}, month = {July} }
@inproceedings{SimpsonMC20apwg, author = {Geoffrey Simpson and Tyler Moore and Richard Clayton}, title = {Ten years of attacks on companies using visual impersonation of domain names}, booktitle = {{APWG} Symposium on Electronic Crime Research (eCrime)}, year = 2020, publisher = {IEEE}, url = {https://tylermoore.utulsa.edu/ecrime20vidn.pdf} }
@inproceedings{SimpsonM20apwg, author = {Geoffrey Simpson and Tyler Moore}, title = {Empirical analysis of losses from business-email compromise}, booktitle = {{APWG} Symposium on Electronic Crime Research (eCrime)}, year = 2020, publisher = {IEEE}, url = {https://tylermoore.utulsa.edu/ecrime20bec.pdf} }
@inproceedings{DBLP:conf/icbc2/MorinV021, author = {Andrew Morin and Marie Vasek and Tyler Moore}, title = {Detecting Text Reuse in Cryptocurrency Whitepapers}, booktitle = {{IEEE} International Conference on Blockchain and Cryptocurrency, {ICBC} 2021, Sydney, Australia, May 3-6, 2021}, pages = {1--5}, publisher = {{IEEE}}, year = {2021}, url = {https://tylermoore.utulsa.edu/icbc21.pdf}, puburl = {https://doi.org/10.1109/ICBC51069.2021.9461147}, doi = {10.1109/ICBC51069.2021.9461147}, timestamp = {Wed, 30 Jun 2021 12:20:23 +0200}, biburl = {https://dblp.org/rec/conf/icbc2/MorinV021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{Vermeer:EuroSP21, author = {Matthew Vermeer and Jonathan West and Alejandro Cuevas and Shuonan Niu and Nicolas Christin and Michel {van Eeten} and Tobias Fiebig and Carlos Ga{\~n}{\'a}n and Tyler Moore}, title = {{SoK}: A framework for asset discovery: Systematizing advances in network measurements for protecting organizations}, booktitle = {Proceedings of the {6th IEEE European Symposium on Security and Privacy (Euro S\&P'21)}}, year = 2021, month = sep, address = {Vienna, Austria (online)}, url = {https://tylermoore.utulsa.edu/eurosp21.pdf} }
@inproceedings{Hamrick:Defi21, author = {{JT} Hamrick and Farhang Rouhi and Arghya Mukherjee and Marie Vasek and Tyler Moore and Neil Gandal}, title = {Analyzing Target-Based Cryptocurrency Pump and Dump Schemes}, booktitle = {{ACM CCS} Workshop on Decentralized Finance and Security}, year = 2021, url = {https://tylermoore.utulsa.edu/defi21.pdf} }
This file was generated by bibtex2html 1.99.