confrefs.bib

@inproceedings{MooreRCPAH08secon,
  author = {Tyler Moore and
               Maxim Raya and
               Jolyon Clulow and
               Panagiotis Papadimitratos and
               Ross Anderson and
               Jean-Pierre Hubaux},
  title = {Fast Exclusion of Errant Devices from Vehicular Networks},
  booktitle = {Proceedings of the Fifth Annual IEEE Communications Society
               Conference on Sensor, Mesh and Ad Hoc Communications and
               Networks (SECON)},
  year = {2008},
  pages = {135-143},
  puburl = {http://dx.doi.org/10.1109/SAHCN.2008.26},
  url = {https://tylermoore.utulsa.edu/secon.pdf}
}
@inproceedings{MooreCNA07esas,
  author = {Tyler Moore and
               Jolyon Clulow and
               Shishir Nagaraja and
               Ross Anderson},
  title = {New Strategies for Revocation in Ad-Hoc Networks},
  booktitle = {4th European Workshop on Security and Privacy in Ad-hoc and Sensor Networks (ESAS)},
  year = {2007},
  pages = {232-246},
  puburl = {http://dx.doi.org/10.1007/978-3-540-73275-4_17},
  url = {https://tylermoore.utulsa.edu/esas07.pdf},
  presurl = {https://tylermoore.utulsa.edu/esas07-pres.pdf},
  editor = {Frank Stajano and
               Catherine Meadows and
               Srdjan Capkun and
               Tyler Moore},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {4572}
}
@inproceedings{MooreC07sec,
  author = {Tyler Moore and
               Jolyon Clulow},
  title = {Secure Path-Key Revocation for Symmetric Key Pre-distribution
               Schemes in Sensor Networks},
  booktitle = {Proceedings of the IFIP TC-11 22nd International
               Information Security Conference (IFIP SEC)},
  year = {2007},
  pages = {157-168},
  puburl = {http://dx.doi.org/10.1007/978-0-387-72367-9_14},
  url = {https://tylermoore.utulsa.edu/ifipsec2007-path.pdf},
  presurl = {https://tylermoore.utulsa.edu/ifipsec-pres.pdf},
  editor = {Hein S. Venter and
               Mariki M. Eloff and
               Les Labuschagne and
               Jan H. P. Eloff and
               Rossouw von Solms},
  publisher = {Springer},
  series = {IFIP},
  volume = {232}
}
@inproceedings{ClulowHKM06esas,
  author = {Jolyon Clulow and
               Gerhard P. Hancke and
               Markus G. Kuhn and
               Tyler Moore},
  booktitle = {3rd European Workshop on Security and Privacy in Ad-hoc and Sensor Networks (ESAS)},
  title = {So Near and Yet So Far: Distance-Bounding Attacks in Wireless
               Networks},
  year = {2006},
  pages = {83-97},
  puburl = {http://dx.doi.org/10.1007/11964254_9},
  url = {https://tylermoore.utulsa.edu/esas2006-distance.pdf},
  presurl = {https://tylermoore.utulsa.edu/esas-pres.pdf},
  editor = {Levente Butty{\'a}n and
               Virgil D. Gligor and
               Dirk Westhoff},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {4357}
}
@inproceedings{Moore06percom,
  author = {Tyler Moore},
  title = {A Collusion Attack on Pairwise Key Predistribution Schemes
               for Distributed Sensor Networks},
  booktitle = {4th IEEE Conference on Pervasive Computing and Communications Security (PerSec)},
  year = {2006},
  pages = {251-255},
  puburl = {http://doi.ieeecomputersociety.org/10.1109/PERCOMW.2006.3},
  url = {https://tylermoore.utulsa.edu/persec06-moore.pdf},
  presurl = {https://tylermoore.utulsa.edu/persec06-moore-pres.pdf},
  publisher = {IEEE Computer Society}
}
@inproceedings{RiekBM14weis,
  author = {Markus Riek and
               Rainer B{\"o}hme and
               Tyler Moore},
  title = {Understanding the Influence of Cybercrime Risk on the E-Service Adoption of {E}uropean {I}nternet Users},
  booktitle = {13th Workshop on the Economics of Information Security (WEIS)},
  year = {2014},
  url = {https://tylermoore.utulsa.edu/weis14.pdf}
}
@inproceedings{DrewM14iwcc,
  author = {Jake Drew and Tyler Moore},
  title = {Automatic Identification of Replicated Criminal
Websites Using Combined Clustering},
  booktitle = {International Workshop on Cyber Crime (IWCC), IEEE Security and Privacy Workshops},
  year = {2014},
  publisher = {IEEE},
  url = {https://tylermoore.utulsa.edu/iwcc14.pdf}
}
@inproceedings{VasekTM14bitcoin,
  author = {Marie Vasek and Micah Thornton and Tyler Moore},
  title = {Empirical Analysis of Denial-of-Service Attacks in the {B}itcoin Ecosystem},
  booktitle = {1st Workshop on Bitcoin Research},
  year = {2014},
  month = {March},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {8438},
  pages = {57--71},
  dataurl = {http://dx.doi.org/10.7910/DVN/25541},
  url = {https://tylermoore.utulsa.edu/bitcoin14ddos.pdf},
  puburl = {http://dx.doi.org/10.1007/978-3-662-44774-1_5},
  presurl = {http://secon.utulsa.edu/vasek/thorntonbtc14pres.pdf}
}
@inproceedings{JohnsonLGVM14bitcoin,
  author = {Benjamin Johnson and Aron Laszka and Jens Grossklags and Marie Vasek and Tyler Moore},
  title = {Game-Theoretic Analysis of {DDoS} Attacks Against {B}itcoin Mining Pools},
  booktitle = {1st Workshop on Bitcoin Research},
  year = {2014},
  month = {March},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {8438},
  pages = {72--86},
  url = {https://tylermoore.utulsa.edu/bitcoin14gt.pdf},
  puburl = {http://dx.doi.org/10.1007/978-3-662-44774-1_6}
}
@inproceedings{MooreC14fc,
  author = {Tyler Moore and Richard Clayton},
  title = {The Ghosts of Banking Past: {E}mpirical Analysis of Closed Bank Websites},
  booktitle = {Financial Cryptography and Data Security},
  year = {2014},
  month = {March},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {8437},
  dataurl = {http://dx.doi.org/10.7910/DVN/26011},
  url = {https://tylermoore.utulsa.edu/fc14ghosts.pdf},
  presurl = {https://tylermoore.utulsa.edu/fc14banks-pres.pdf},
  puburl = {http://dx.doi.org/10.1007/978-3-662-45472-5_3},
  pages = {33--48}
}
@inproceedings{VasekM14fc,
  author = {Marie Vasek and Tyler Moore},
  title = {Identifying Risk Factors for Webserver Compromise},
  booktitle = {Financial Cryptography and Data Security},
  year = {2014},
  month = {March},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {8437},
  dataurl = {http://dx.doi.org/10.7910/DVN/25608},
  url = {https://tylermoore.utulsa.edu/fc14rf.pdf},
  puburl = {http://dx.doi.org/10.1007/978-3-662-45472-5_22},
  pages = {326--345},
  presurl = {http://secon.utulsa.edu/vasek/vasekfc14pres.pdf}
}
@inproceedings{VasekM13ecrime,
  author = {Marie Vasek and Tyler Moore},
  title = {Empirical Analysis of Factors Affecting Malware {URL} Detection},
  booktitle = {8th APWG eCrime Researchers Summit (eCrime)},
  year = {2013},
  month = {September},
  url = {https://tylermoore.utulsa.edu/ecrime13.pdf},
  presurl = {http://secon.utulsa.edu/vasek/vasekecrime13pres.pdf}
}
@inproceedings{LeontiadisMC13ec,
  author = {Nektarios Leontiadis and Tyler Moore and Nicolas Christin},
  title = {Pick Your Poison: {P}ricing and Inventories at Unlicensed Online Pharmacies},
  booktitle = {ACM Conference on Electronic Commerce (EC)},
  url = {https://tylermoore.utulsa.edu/ec13.pdf},
  puburl = {http://dl.acm.org/citation.cfm?id=2482610‎},
  publisher = {ACM},
  year = {2013},
  month = {June},
  pages = {621-638}
}
@inproceedings{MooreC13fc,
  author = {Tyler Moore and Nicolas Christin},
  title = {Beware the Middleman: Empirical Analysis of {B}itcoin-Exchange Risk},
  booktitle = {Financial Cryptography and Data Security},
  year = {2013},
  month = {April},
  url = {https://tylermoore.utulsa.edu/fc13.pdf},
  presurl = {https://tylermoore.utulsa.edu/fc13pres.pdf},
  puburl = {http://dx.doi.org/10.1007/978-3-642-39884-1_3},
  dataurl = {http://dx.doi.org/10.7910/DVN/25545},
  pages = {25-33},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {7859}
}
@inproceedings{MooreC12ecrime,
  author = {Tyler Moore and Richard Clayton},
  title = {Discovering Phishing Dropboxes Using Email Metadata},
  booktitle = {7th APWG eCrime Researchers Summit (eCrime)},
  year = {2012},
  month = {October},
  pages = {},
  url = {https://tylermoore.utulsa.edu/ecrime12dropbox.pdf},
  presurl = {https://tylermoore.utulsa.edu/ecrime12dropboxpres.pdf}
}
@inproceedings{BoehmeM12ecrime,
  author = {Rainer B{\"o}hme and Tyler Moore},
  title = {How Do Consumers React to Cybercrime?},
  booktitle = {APWG eCrime Researchers Summit (eCrime)},
  year = {2012},
  month = {October},
  pages = {},
  url = {https://tylermoore.utulsa.edu/ecrime12eurobar.pdf},
  presurl = {https://tylermoore.utulsa.edu/ecrime12eurobarpres.pdf}
}
@inproceedings{EdwardsMSHF12nspw,
  author = {Benjamin Edwards and
               Tyler Moore and
               George Stelle and
               Steven A. Hofmeyr and
               Stephanie Forrest},
  title = {Beyond the Blacklist: Modeling Malware Spread and the Effect
               of Interventions},
  booktitle = {Proceedings of the New Security Paradigms Workshop,
               Bertinoro, Italy, September 19-21, 2012},
  year = {2012},
  publisher = {ACM},
  url = {https://tylermoore.utulsa.edu/nspw12.pdf}
}
@inproceedings{VasekM12cset,
  author = {Vasek, Marie and Moore, Tyler},
  title = {Do malware reports expedite cleanup? {A}n experimental study},
  booktitle = {Proceedings of the 5th USENIX Workshop on Cyber Security Experimentation and Test},
  series = {CSET'12},
  year = {2012},
  location = {Bellevue, WA},
  puburl = {https://www.usenix.org/system/files/conference/cset12/cset12-final20.pdf},
  url = {https://tylermoore.utulsa.edu/cset12.pdf},
  presurl = {https://www.usenix.org/sites/default/files/conference/protected-files/vasek_cset12_slides.pdf},
  dataurl = {http://dx.doi.org/10.7910/DVN/25571},
  publisher = {USENIX Association},
  address = {Berkeley, CA, USA}
}
@inproceedings{AndersonBBCELMS12weis,
  author = {Ross Anderson and
               Chris Barton and
               Rainer B{\"o}hme and
               Richard Clayton and
               Michael van Eeten and
               Michael Levi and
               Tyler Moore and
               Stefan Savage},
  title = {Measuring the Cost of Cybercrime},
  booktitle = {11th Workshop on the Economics of Information Security (WEIS)},
  year = {2012},
  url = {https://tylermoore.utulsa.edu/weis12.pdf},
  presurl = {https://tylermoore.utulsa.edu/weis12pres.pdf}
}
@inproceedings{MooreHC12fc,
  author = {Tyler Moore and
               Jie Han and
               Richard Clayton},
  title = {The Postmodern {P}onzi Scheme: Empirical Analysis of High-Yield
               Investment Programs},
  booktitle = {Financial Cryptography and Data Security},
  year = {2012},
  pages = {41-56},
  puburl = {http://dx.doi.org/10.1007/978-3-642-32946-3_4},
  url = {https://tylermoore.utulsa.edu/fc12.pdf},
  presurl = {https://tylermoore.utulsa.edu/fc12pres.pdf},
  editor = {Angelos D. Keromytis},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {7397},
  puburl = {http://dx.doi.org/10.1007/978-3-642-32946-3}
}
@inproceedings{MooreLC11ccs,
  author = {Tyler Moore and
               Nektarios Leontiadis and
               Nicolas Christin},
  title = {Fashion crimes: trending-term exploitation on the web},
  booktitle = {ACM Conference on Computer and Communications Security (CCS)},
  year = {2011},
  pages = {455-466},
  url = {https://tylermoore.utulsa.edu/ccs11.pdf},
  puburl = {http://doi.acm.org/10.1145/2046707.2046761},
  presurl = {https://tylermoore.utulsa.edu/ccs11pres.pdf},
  editor = {Yan Chen and
               George Danezis and
               Vitaly Shmatikov},
  publisher = {ACM}
}
@inproceedings{LeontiadisMC11uss,
  author = {Nektarios Leontiadis and
               Tyler Moore and
               Nicolas Christin},
  title = {Measuring and Analyzing Search-Redirection Attacks in the
               Illicit Online Prescription Drug Trade},
  booktitle = {USENIX Security Symposium},
  year = {2011},
  url = {https://tylermoore.utulsa.edu/usenix11.pdf},
  puburl = {http://static.usenix.org/events/sec11/tech/full_papers/Leontiadis.pdf},
  publisher = {USENIX Association}
}
@inproceedings{HofmeyrMFES11weis,
  author = {Steven A. Hofmeyr and
               Tyler Moore and
               Stephanie Forrest and
               Benjamin Edwards and
               George Stelle},
  title = {Modeling Internet-Scale Policies for Cleaning up Malware},
  year = {2011},
  url = {https://tylermoore.utulsa.edu/weis11model.pdf},
  puburl = {http://weis2011.econinfosec.org/papers/Modeling\%20Internet-Scale\%20Policies\%20for\%20Cleaning\%20up\%20Malware.pdf},
  booktitle = {10th Workshop on the Economics of Information Security (WEIS)}
}
@inproceedings{LandauM11weis,
  author = {Susan Landau and
               Tyler Moore},
  title = {Economic Tussles in Federated Identity Management},
  booktitle = {10th Workshop on the Economics of Information Security (WEIS)},
  year = {2011},
  puburl = {http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/4254},
  presurl = {https://tylermoore.utulsa.edu/nist12pres.pdf}
}
@inproceedings{MooreC11fc,
  author = {Tyler Moore and
               Richard Clayton},
  title = {Ethical Dilemmas in Take-Down Research},
  booktitle = {Workshop on the Ethics of Computer Security Research (Financial Cryptography Workshops)},
  year = {2011},
  pages = {154-168},
  url = {https://tylermoore.utulsa.edu/wecsr11.pdf},
  presurl = {https://tylermoore.utulsa.edu/wecsr11pres.pdf},
  puburl = {http://dx.doi.org/10.1007/978-3-642-29889-9_14},
  editor = {George Danezis and
               Sven Dietrich and
               Kazue Sako},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {7126}
}
@inproceedings{MooreFP10nspw,
  author = {Tyler Moore and
               Allan Friedman and
               Ariel D. Procaccia},
  title = {Would a 'cyber warrior' protect us: exploring trade-offs
               between attack and defense of information systems},
  booktitle = {New Security Paradigms Workshop (NSPW)},
  year = {2010},
  pages = {85-94},
  url = {https://tylermoore.utulsa.edu/nspw10.pdf},
  puburl = {http://doi.acm.org/10.1145/1900546.1900559},
  editor = {Angelos D. Keromytis and
               Sean Peisert and
               Richard Ford and
               Carrie Gates},
  publisher = {ACM}
}
@inproceedings{MoranM10fc,
  author = {Tal Moran and
               Tyler Moore},
  title = {The Phish-Market Protocol: Securely Sharing Attack Data
               between Competitors},
  booktitle = {Financial Cryptography and Data Security},
  year = {2010},
  pages = {222-237},
  puburl = {http://dx.doi.org/10.1007/978-3-642-14577-3_18},
  url = {https://tylermoore.utulsa.edu/fc10phishmarket.pdf},
  presurl = {https://tylermoore.utulsa.edu/fc10phishmarketpres.pdf},
  editor = {Radu Sion},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {6052}
}
@inproceedings{MooreE10fc,
  author = {Tyler Moore and
               Benjamin Edelman},
  title = {Measuring the Perpetrators and Funders of Typosquatting},
  booktitle = {Financial Cryptography and Data Security},
  year = {2010},
  pages = {175-191},
  puburl = {http://dx.doi.org/10.1007/978-3-642-14577-3_15},
  url = {https://tylermoore.utulsa.edu/fc10typo.pdf},
  presurl = {https://tylermoore.utulsa.edu/fc10typopres.pdf},
  dataurl = {http://www.benedelman.org/typosquatting/},
  editor = {Radu Sion},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {6052}
}
@inproceedings{BohmeM09weis,
  author = {Rainer B{\"o}hme and
               Tyler Moore},
  title = {The Iterated Weakest Link - A Model of Adaptive Security
               Investment},
  booktitle = {8th Workshop on the Economics of Information Security (WEIS)},
  year = {2009},
  url = {https://tylermoore.utulsa.edu/weis09.pdf},
  presurl = {https://tylermoore.utulsa.edu/weis09pres.pdf},
  puburl = {http://weis09.infosecon.net/files/152/index.html}
}
@inproceedings{MooreCS09leet,
  author = {Moore, Tyler and Clayton, Richard and Stern, Henry},
  title = {Temporal correlations between spam and phishing websites},
  booktitle = {Proceedings of the 2nd USENIX conference on Large-scale exploits and emergent threats: botnets, spyware, worms, and more},
  series = {LEET'09},
  year = {2009},
  location = {Boston, MA},
  puburl = {https://www.usenix.org/conference/leet-09/temporal-correlations-between-spam-and-phishing-websites},
  url = {https://tylermoore.utulsa.edu/leet09.pdf},
  presurl = {https://tylermoore.utulsa.edu/leet09pres.pdf},
  publisher = {USENIX Association},
  address = {Berkeley, CA, USA}
}
@inproceedings{MooreC09fc,
  author = {Tyler Moore and
               Richard Clayton},
  title = {Evil Searching: Compromise and Recompromise of Internet
               Hosts for Phishing},
  booktitle = {Financial Cryptography and Data Security},
  year = {2009},
  pages = {256-272},
  puburl = {http://dx.doi.org/10.1007/978-3-642-03549-4_16},
  url = {https://tylermoore.utulsa.edu/fc09.pdf},
  presurl = {https://tylermoore.utulsa.edu/fc09pres.pdf},
  editor = {Roger Dingledine and
               Philippe Golle},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {5628}
}
@inproceedings{MooreC08ecrime,
  author = {Tyler Moore and
               Richard Clayton},
  title = {The Consequence of Non-Cooperation in the Fight Against Phishing},
  booktitle = {APWG eCrime Researchers Summit},
  year = {2008},
  pages = {1-14},
  puburl = {http://dx.doi.org/10.1109/ECRIME.2008.4696968},
  url = {https://tylermoore.utulsa.edu/ecrime08.pdf},
  presurl = {https://tylermoore.utulsa.edu/ecrime08pres.pdf},
  publisher = {IEEE}
}
@inproceedings{AndersonBCM08isse,
  author = {Ross Anderson and
               Rainer B{\"o}hme and
               Richard Clayton and
               Tyler Moore},
  title = {Security Economics and {E}uropean Policy},
  booktitle = {Information Security Solutions Europe (ISSE)},
  year = {2008},
  pages = {57-76},
  puburl = {http://dx.doi.org/10.1007/978-3-8348-9283-6_6},
  editor = {Norbert Pohlmann and
               Helmut Reimer and
               Wolfgang Schneider},
  publisher = {Vieweg+Teubner}
}
@inproceedings{MooreC08fc,
  author = {Tyler Moore and
               Richard Clayton},
  title = {Evaluating the Wisdom of Crowds in Assessing Phishing Websites},
  booktitle = {Financial Cryptography and Data Security},
  year = {2008},
  pages = {16-30},
  puburl = {http://dx.doi.org/10.1007/978-3-540-85230-8_2},
  url = {https://tylermoore.utulsa.edu/fc08.pdf},
  presurl = {https://tylermoore.utulsa.edu/fc08pres.pdf},
  editor = {Gene Tsudik},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {5143}
}
@inproceedings{MooreC07ecrime,
  author = {Tyler Moore and
               Richard Clayton},
  title = {Examining the impact of website take-down on phishing},
  booktitle = {APWG eCrime Researchers Summit},
  year = {2007},
  pages = {1-13},
  puburl = {http://doi.acm.org/10.1145/1299015.1299016},
  url = {https://tylermoore.utulsa.edu/ecrime07.pdf},
  presurl = {https://tylermoore.utulsa.edu/ecrime07pres.pdf},
  editor = {Lorrie Faith Cranor},
  publisher = {ACM},
  series = {ACM International Conference Proceeding Series},
  volume = {269}
}
@inproceedings{MooreC07weis,
  author = {Tyler Moore and
               Richard Clayton},
  title = {An Empirical Analysis of the Current State of Phishing Attack
               and Defence},
  booktitle = {6th Workshop on the Economics of Information Security (WEIS)},
  year = {2007},
  puburl = {http://weis2007.econinfosec.org/papers/51.pdf},
  url = {https://tylermoore.utulsa.edu/weis07.pdf},
  presurl = {https://tylermoore.utulsa.edu/weis07pres.pdf}
}
@inproceedings{Moore06weis,
  author = {Tyler Moore},
  title = {The Economics of Digital Forensics},
  booktitle = {5th Workshop on the Economics of Information Security (WEIS)},
  year = {2006},
  puburl = {http://weis2006.econinfosec.org/docs/14.pdf},
  url = {https://tylermoore.utulsa.edu/weis06.pdf}
}
@inproceedings{Moore05weis,
  author = {Tyler Moore},
  title = {Countering Hidden-Action Attacks on Networked Systems},
  booktitle = {4th Workshop on the Economics of Information Security (WEIS)},
  year = {2005},
  puburl = {http://infosecon.net/workshop/pdf/18.pdf},
  url = {https://tylermoore.utulsa.edu/weis05.pdf},
  presurl = {https://tylermoore.utulsa.edu/weis05pres.pdf}
}
@inproceedings{KosloffMKMS03spie,
  author = {Kosloff, T. and Moore, Tyler and Keller, J. and Manes, Gavin W. and Shenoi, Sujeet},
  title = {Attacks on public telephone networks: technologies and challenges},
  booktitle = {{SPIE} 5071, Sensors, and Command, Control, Communications, and Intelligence {(C3I)} Technologies for Homeland Defense and Law Enforcement II, 72},
  pages = {72-83},
  year = {2003},
  puburl = {http://dx.doi.org/10.1117/12.500826}
}
@inproceedings{KosloffMKMS02sact,
  author = {Todd Kosloff and Tyler Moore and Jesse Keller and Gavin Manes and Sujeet Shenoi},
  title = {{SS7} Messaging Attacks on Public Telephone Networks: Attack Scenarios and Detection},
  booktitle = {Workshop on the Scientific Aspects of Cyber Terrorism},
  publisher = {ACM},
  month = {November},
  day = 21,
  year = 2002,
  location = {Washington, DC}
}
@inproceedings{LorenzMMHS01,
  author = {Gary Lorenz and Tyler Moore and Gavin Manes and John Hale and Sujeet Shenoi},
  title = {Securing {SS7} Telecommunications Networks},
  booktitle = {Second IEEE Systems, Man and Cybernetics Information Assurance Workshop},
  year = {2001},
  month = {June},
  day = {5-6}
}
@inproceedings{LeontiadisMC14,
  author = {Leontiadis, Nektarios and Moore, Tyler and Christin, Nicolas},
  title = {A Nearly Four-Year Longitudinal Study of Search-Engine Poisoning},
  booktitle = {Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security},
  series = {CCS '14},
  year = {2014},
  isbn = {978-1-4503-2957-6},
  location = {Scottsdale, Arizona, USA},
  pages = {930--941},
  numpages = {12},
  url = {https://tylermoore.utulsa.edu/ccs14.pdf},
  puburl = {http://doi.acm.org/10.1145/2660267.2660332},
  doi = {10.1145/2660267.2660332},
  acmid = {2660332},
  publisher = {ACM},
  address = {New York, NY, USA},
  keywords = {online crime, search engines, web security}
}
@inproceedings{ClaytonMC15weis,
  author = {Richard Clayton and Tyler Moore and Nicolas Christin},
  title = {Concentrating Correctly on Cybercrime Concentration},
  booktitle = {14th Workshop on the Economics of Information Security},
  year = 2015,
  url = {http://www.econinfosec.org/archive/weis2015/papers/WEIS_2015_clayton.pdf},
  puburl = {https://tylermoore.utulsa.edu/weis15pres.pdf}
}
@inproceedings{CetinJGMV15weis,
  title = {Understanding the Role of Sender Reputation in Abuse Reporting and Cleanup},
  author = {Orcun Cetin and Mohammad Hanif Jhaveri and Carlos Ganan and Michel van Eeten and Tyler Moore},
  booktitle = {14th Workshop on the Economics of Information Security},
  year = 2015,
  url = {http://www.econinfosec.org/archive/weis2015/papers/WEIS_2015_cetin.pdf}
}
@inproceedings{WadleighDM15www,
  author = {John Wadleigh and Jake Drew and Tyler Moore},
  title = {The E-Commerce Market for ``Lemons'': Identification and Analysis of Websites Selling Counterfeit Goods},
  booktitle = {International World Wide Web Conference (Security and Privacy Track)},
  year = {2015},
  month = {May},
  publisher = {ACM},
  pages = {1188-1197},
  url = {https://tylermoore.utulsa.edu/www15.pdf},
  puburl = {http://www.www2015.it/documents/proceedings/proceedings/p1188.pdf}
}
@inproceedings{MooreC15apwg,
  author = {Tyler Moore and Richard Clayton},
  title = {Which Malware Lures Work Best? Measurements
from a Large Instant Messaging Worm},
  booktitle = {{APWG} Symposium on Electronic Crime Research (eCrime)},
  year = 2015,
  doi = {10.1109/ECRIME.2015.7120801},
  pages = {69--78},
  publisher = {IEEE},
  url = {https://tylermoore.utulsa.edu/ecrime15.pdf}
}
@inproceedings{VasekM15fc,
  author = {Marie Vasek and Tyler Moore},
  title = {There's no free lunch, even using {B}itcoin: Tracking the Popularity and Profits of Virtual Currency Scams},
  booktitle = {Financial Cryptography and Data Security},
  year = {2015},
  volume = {8975},
  editor = {B\"ohme, Rainer and Okamoto, Tatsuaki},
  doi = {10.1007/978-3-662-47854-7_4},
  pages = {44-61},
  puburl = {http://dx.doi.org/10.1007/978-3-662-47854-7_4},
  month = {January},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  url = {https://tylermoore.utulsa.edu/fc15.pdf},
  presurl = {http://secon.utulsa.edu/vasek/vasekfc15pres.pdf}
}
@inproceedings{VasekBCKM16fc,
  author = {Marie Vasek and Joseph Bonneau and Ryan Castellucci and Cameron Keith and Tyler Moore},
  title = {The {B}itcoin brain drain: Examining the Use and Abuse of {B}itcoin Brain Wallets},
  booktitle = {Financial Cryptography and Data Security},
  year = {2016},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {9603},
  pages = {609--618},
  editor = {Jens Grossklags and Bart Preneel},
  url = {https://tylermoore.utulsa.edu/fc16.pdf},
  puburl = {http://dx.doi.org/10.1007/978-3-662-54970-4_36},
  presurl = {https://tylermoore.utulsa.edu/fc16pres.pdf}
}
@inproceedings{DrewHM16star,
  author = {Jake Drew and Michael Hahsler and Tyler Moore},
  title = {Polymorphic Malware Detection Using Sequence Classification Methods},
  booktitle = {Workshop on Bio-inspired Security, Trust, Assurance and Resilience (BioStar), IEEE Security and Privacy Workshops (SPW)},
  year = 2016,
  publisher = {IEEE},
  doi = {10.1109/SPW.2016.30},
  month = {May},
  pages = {81--87},
  url = {https://tylermoore.utulsa.edu/biostar16.pdf}
}
@inproceedings{MooreDC16weis,
  author = {Tyler Moore and Scott Dynes and Frederick Chang},
  title = {Identifying how firms manage cybersecurity investment},
  booktitle = {15th Workshop on the Economics of Information Security (WEIS)},
  year = 2016,
  url = {https://tylermoore.utulsa.edu/weis16ciso.pdf},
  presurl = {https://tylermoore.utulsa.edu/weis16cisopres.pdf}
}
@inproceedings{FederGHM16weis,
  author = {Amir Feder and Neil Gandal and JT Hamrick and Tyler Moore},
  title = {The Impact of {DDoS} and Other Security Shocks on {Bitcoin} Currency Exchanges: Evidence from {Mt. Gox}},
  booktitle = {15th Workshop on the Economics of Information Security (WEIS)},
  year = 2016,
  url = {https://tylermoore.utulsa.edu/weis16gox.pdf},
  presurl = {https://tylermoore.utulsa.edu/weis16goxpres.pdf}
}
@inproceedings{VasekWM16wiscs,
  author = {Marie Vasek and Matthew Weeden and Tyler Moore},
  title = {Measuring the Impact of Sharing Abuse Data with Web Hosting Providers},
  booktitle = {ACM Workshop on Information Sharing and Collaborative Security},
  year = 2016,
  pages = {71--80},
  publisher = {{ACM}},
  url = {https://tylermoore.utulsa.edu/wiscs16.pdf},
  puburl = {http://dl.acm.org/citation.cfm?id=2994548},
  presurl = {https://tylermoore.utulsa.edu/vasekwiscs16pres.pdf}
}
@inproceedings{GandalHMO17weis,
  author = {Neil Gandal and JT Hamrick and Tyler Moore and Tali Oberman},
  title = {Price Manipulation in the {Bitcoin} Ecosystem},
  booktitle = {16th Workshop on the Economics of Information Security (WEIS)},
  year = 2017,
  url = {https://tylermoore.utulsa.edu/weis17.pdf},
  presurl = {https://tylermoore.utulsa.edu/weis17pres.pdf}
}

This file was generated by bibtex2html 1.98.