invitedrefs.bib

@article{Moore10elsevier,
  author = {Tyler Moore},
  title = {Phishing and the Economics of E-crime},
  journal = {Elsevier Infosecurity Magazine},
  volume = 4,
  number = 6,
  pages = {34--37},
  year = 2007
}
@inproceedings{AndersonM07crypto,
  author = {Ross Anderson and
               Tyler Moore},
  title = {Information Security Economics - and Beyond},
  booktitle = {27th Annual International Cryptology Conference (CRYPTO)},
  year = {2007},
  pages = {68-91},
  puburl = {http://dx.doi.org/10.1007/978-3-540-74143-5_5},
  url = {https://tylermoore.utulsa.edu/crypto07.pdf},
  editor = {Alfred Menezes},
  publisher = {Springer},
  series = {Lecture Notes in Computer Science},
  volume = {4622}
}
@misc{Moore07dimacs,
  author = {Tyler Moore},
  title = {Workshop Report: {DIMACS} Workshop on Information Security Economics},
  location = {Rutgers University, Piscataway, NJ, USA},
  month = jan,
  days = {18--19},
  year = 2007
}
@article{MooreA05enisa,
  author = {Tyler Moore and Ross Anderson},
  title = {Trends in Security Economics},
  journal = {European Network and Information Security Agency Quarterly},
  volume = 1,
  number = 3,
  pages = {6--7},
  year = 2005
}
@article{Moore08VB,
  author = {Tyler Moore},
  title = {How wise are crowds when assessing phishing websites?},
  journal = {Virus Bulletin},
  month = apr,
  year = 2008
}
@article{Moore11VB,
  author = {Tyler Moore},
  title = {Investigating the abuse of search engines to promote illicit online pharmacies},
  journal = {Virus Bulletin},
  month = nov,
  year = 2011
}
@article{Moore13ijcip,
  title = {The promise and perils of digital currencies},
  author = {Tyler Moore},
  journal = {International Journal of Critical Infrastructure Protection},
  year = {2013},
  url = {http://dx.doi.org/10.1016/j.ijcip.2013.08.002},
  volume = 6,
  number = {3--4},
  pages = {147--149}
}
@inproceedings{HayashiMS15kcpay,
  title = {The Economics of Retail Payments Security},
  author = {Fumiko Hayashi Tyler Moore and Richard J. Sullivan},
  booktitle = {Fifth International Payments Policy Conference: The Puzzle of Payments Security, Federal Reserve Bank of Kansas City},
  year = 2015,
  url = {https://tylermoore.utulsa.edu/kcpay15.pdf},
  presurl = {https://tylermoore.utulsa.edu/kcpay-econ.pdf}
}
@article{moore_et_al:DR:2017:7039,
  author = {Tyler Moore and Christian W. Probst and Kai Rannenberg and Michel van Eeten},
  title = {{Assessing ICT Security Risks in Socio-Technical Systems (Dagstuhl Seminar 16461)}},
  pages = {63--89},
  journal = {Dagstuhl Reports},
  issn = {2192-5283},
  year = {2017},
  volume = {6},
  number = {11},
  editor = {Tyler W. Moore and Christian W. Probst and Kai Rannenberg and Michel van Eeten},
  publisher = {Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik},
  address = {Dagstuhl, Germany},
  url = {http://drops.dagstuhl.de/opus/volltexte/2017/7039},
  urn = {urn:nbn:de:0030-drops-70390},
  doi = {10.4230/DagRep.6.11.63},
  annote = {Keywords: economics of risk assessment, human factor, return on security investment, security risk management, socio-technical security}
}
@inproceedings{KosloffMKMS03spie,
  author = {Kosloff, T. and Moore, Tyler and Keller, J. and Manes, Gavin W. and Shenoi, Sujeet},
  title = {Attacks on public telephone networks: technologies and challenges},
  booktitle = {{SPIE} 5071, Sensors, and Command, Control, Communications, and Intelligence {(C3I)} Technologies for Homeland Defense and Law Enforcement II, 72},
  pages = {72-83},
  year = {2003},
  puburl = {http://dx.doi.org/10.1117/12.500826}
}
@inproceedings{KosloffMKMS02sact,
  author = {Todd Kosloff and Tyler Moore and Jesse Keller and Gavin Manes and Sujeet Shenoi},
  title = {{SS7} Messaging Attacks on Public Telephone Networks: Attack Scenarios and Detection},
  booktitle = {Workshop on the Scientific Aspects of Cyber Terrorism},
  publisher = {ACM},
  month = {November},
  day = 21,
  year = 2002,
  location = {Washington, DC}
}

This file was generated by bibtex2html 1.98.