@article{ClulowM06sigops, author = {Jolyon Clulow and Tyler Moore}, title = {Suicide for the common good: a new strategy for credential revocation in self-organizing systems}, journal = {Operating Systems Review}, volume = {40}, number = {3}, year = {2006}, pages = {18-21}, puburl = {http://doi.acm.org/10.1145/1151374.1151381} }
@article{PapaCM13ifip, author = {Steve Papa and William Casper and Tyler Moore}, title = {Securing wastewater facilities from accidental and intentional harm: a cost-benefit analysis}, journal = {International Journal of Critical Infrastructure Protection}, year = {2013}, volume = 6, number = 2, pages = {96-106}, url = {https://tylermoore.utulsa.edu/ijcip13.pdf}, puburl = {http://dx.doi.org/10.1016/j.ijcip.2013.05.002} }
@article{LandauM12firstmonday, author = {Susan Landau and Tyler Moore}, title = {Economic tussles in federated identity management}, journal = {First Monday}, volume = {17}, number = {10}, year = {2012}, puburl = {http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/4254}, presurl = {https://tylermoore.utulsa.edu/nist12pres.pdf} }
@article{RePEc:idt:journl:cs8102, author = {Tyler Moore and Richard Clayton}, title = {The Impact of Public Information on Phishing Attack and Defense}, journal = {Communications \& Strategies}, year = 2011, volume = {1}, number = {81}, pages = {45-68}, month = {1st quart}, keywords = {security economics; online crime; phishing; transparency}, puburl = {http://ideas.repec.org/a/idt/journl/cs8102.html}, url = {https://tylermoore.utulsa.edu/cs81.pdf} }
@article{Moore10ijcip, author = {Tyler Moore}, title = {The economics of cybersecurity: Principles and policy options}, journal = {International Journal of Critical Infrastructure Protection}, volume = {3}, number = {3--4}, pages = {103 - 117}, year = {2010}, issn = {1874-5482}, doi = {10.1016/j.ijcip.2010.10.002}, puburl = {http://www.sciencedirect.com/science/article/pii/S1874548210000429}, url = {https://tylermoore.utulsa.edu/ijcip10.pdf} }
@article{BohmeM10ieeesp, author = {Rainer B{\"o}hme and Tyler Moore}, title = {The Iterated Weakest Link}, journal = {IEEE Security {\&} Privacy}, volume = {8}, number = {1}, year = {2010}, pages = {53-55}, puburl = {http://doi.ieeecomputersociety.org/10.1109/MSP.2010.51}, url = {https://tylermoore.utulsa.edu/iwl-gordon.pdf} }
@article{WoodsM20ieeesp, author = {Daniel W. Woods and Tyler Moore}, title = {Does insurance have a future in governing cybersecurity?}, journal = {IEEE Security {\&} Privacy}, volume = {18}, number = {1}, year = {2020}, url = {https://tylermoore.utulsa.edu/govins20.pdf} }
@article{MoranM10ieeesp, author = {Tal Moran and Tyler Moore}, title = {The Phish-Market Protocol: Secure Sharing Between Competitors}, journal = {IEEE Security {\&} Privacy}, volume = {8}, number = {4}, year = {2010}, pages = {40-45}, puburl = {http://doi.ieeecomputersociety.org/10.1109/MSP.2010.138}, url = {https://tylermoore.utulsa.edu/sp10phishmarket.pdf} }
@article{Moore09JEP, author = {Tyler Moore and Richard Clayton and Ross Anderson}, title = {The Economics of Online Crime}, journal = {Journal of Economic Perspectives}, volume = 23, number = 3, month = {Summer}, year = 2009, pages = {3--20}, puburl = {http://www.aeaweb.org/articles.php?doi=10.1257/jep.23.3.3}, url = {https://tylermoore.utulsa.edu/jep09.pdf} }
@article{DrewMEURASIP14, author = {Jake Drew and Tyler Moore}, title = {Optimized Combined Clustering Methods for Finding Replicated Criminal Websites}, journal = {{EURASIP} Journal on Information Security}, year = 2014, volume = {2014}, number = {14}, url = {http://jis.eurasipjournals.com/content/2014/1/14/abstract} }
@article{AndersonM06science, author = {Anderson, Ross and Moore, Tyler}, title = {The Economics of Information Security}, journal = {Science}, volume = {314}, number = {5799}, pages = {610-613}, year = {2006}, doi = {10.1126/science.1130992}, puburl = {http://www.sciencemag.org/content/314/5799/610.full.pdf}, url = {https://tylermoore.utulsa.edu/science-econ.pdf} }
@article{VasekWM16tdsc, author = {Vasek, Marie and Wadleigh, John and Moore, Tyler}, title = {Hacking is not random: a case-control study of webserver-compromise risk}, journal = {IEEE Transactions on Dependable and Secure Computing}, volume = {13}, number = 2, year = 2016, pages = {206--219}, url = {https://tylermoore.utulsa.edu/tdsc15vasek.pdf}, puburl = {http://dx.doi.org/10.1109/TDSC.2015.2427847} }
@article{RiekBM16tdsc, author = {Riek, Markus and B\"ohme, Rainer and Moore, Tyler}, title = {Measuring the Influence of Perceived Cybercrime Risk on Online Service Avoidance}, journal = {IEEE Transactions on Dependable and Secure Computing}, volume = {13}, number = 2, year = 2016, pages = {261--273}, url = {https://tylermoore.utulsa.edu/tdsc15riek.pdf}, puburl = {http://dx.doi.org/10.1109/TDSC.2015.2410795} }
@article{BoehmeCEM15jep, author = {B\"ohme, Rainer and Christin, Nicolas and Edelman, Benjamin and Moore, Tyler}, title = {Bitcoin: Economics, Technology, and Governance}, journal = {Journal of Economic Perspectives}, volume = {29}, number = {2}, year = {2015}, pages = {213-38}, doi = {10.1257/jep.29.2.213}, puburl = {http://www.aeaweb.org/articles.php?doi=10.1257/jep.29.2.213} }
@article{BohmeM16JIS, author = {Rainer B{\"o}hme and Tyler Moore}, title = {The ``Iterated Weakest Link'' Model of Adaptive Security Investment}, journal = {Journal of Information Security}, volume = 7, number = 2, pages = {81--102}, year = {2016}, puburl = {http://dx.doi.org/10.4236/jis.2016.72006}, url = {https://tylermoore.utulsa.edu/jis16.pdf} }
@article{CetinJGVM2016jcs, title = {Understanding the role of sender reputation in abuse reporting and cleanup}, author = {Cetin, Orcun and Jhaveri, Mohammad Hanif and Ga{\~n}{\'a}n, Carlos and van Eeten, Michel and Moore, Tyler}, journal = {Journal of Cybersecurity}, volume = {2}, number = {1}, pages = {83--98}, year = {2016}, publisher = {Oxford University Press}, puburl = {https://cybersecurity.oxfordjournals.org/content/2/1/83} }
@article{JhaveriCGMV16csur, title = {Abuse Reporting and the Fight Against Cybercrime}, author = {Jhaveri, Mohammad Hanif and Cetin, Orcun and Ga{\~n}{\'a}n, Carlos and Moore, Tyler and Eeten, Michel Van}, journal = {ACM Computing Surveys (CSUR)}, volume = {49}, number = {4}, pages = {68}, year = {2017}, publisher = {ACM}, puburl = {http://dl.acm.org/citation.cfm?id=3003147}, url = {https://tylermoore.utulsa.edu/csur17.pdf} }
@article{Drew2017jis, author = {Jake Drew and Michael Hahsler and Tyler Moore}, title = {Polymorphic malware detection using sequence classification methods and ensembles}, journal = {EURASIP Journal on Information Security}, year = {2017}, volume = {2017}, number = {1}, pages = {2}, issn = {1687-417X}, puburl = {http://dx.doi.org/10.1186/s13635-017-0055-6} }
@article{Rovner17jogss, author = {Rovner, Joshua and Moore, Tyler}, title = {Does the Internet Need a Hegemon?}, journal = {Journal of Global Security Studies}, volume = {2}, number = {3}, pages = {184-203}, year = {2017}, doi = {10.1093/jogss/ogx008}, url = {http://dx.doi.org/10.1093/jogss/ogx008} }
@article{Gandal17jme, author = {Neil Gandal and JT Hamrick and Tyler Moore and Tali Obermann}, title = {Price Manipulation in the {Bitcoin} Ecosystem}, journal = {Journal of Monetary Economics}, volume = {95}, month = {May}, pages = {86--96}, year = 2018, doi = {10.1016/j.jmoneco.2017.12.004}, url = {https://tylermoore.utulsa.edu/jme17.pdf}, appendix = {https://tylermoore.utulsa.edu/jme17appendix.pdf}, publisher = {Elsevier} }
@article{Moore18toit, author = {Moore, Tyler and Christin, Nicolas and Szurdi, Janos}, title = {Revisiting the Risks of Bitcoin Currency Exchange Closure}, journal = {ACM Transactions on Internet Technology}, issue_date = {November 2018}, volume = {18}, number = {4}, month = sep, year = {2018}, issn = {1533-5399}, pages = {50:1--50:18}, articleno = {50}, numpages = {18}, url = {https://tylermoore.utulsa.edu/toit17.pdf}, puburl = {http://doi.acm.org/10.1145/3155808}, doi = {10.1145/3155808}, acmid = {3155808}, publisher = {ACM}, address = {New York, NY, USA}, keywords = {Bitcoin, currency exchanges, cybercrime, security economics} }
@article{WoodsM20cacm, author = {Daniel W. Woods and Tyler Moore}, title = {Cyber warranties: market fix or marketing trick?}, journal = {Communications of the ACM}, volume = {63}, number = {4}, year = {2020}, pages = {104--107}, url = {https://tylermoore.utulsa.edu/cacmwarranty.pdf}, puburl = {https://cacm.acm.org/magazines/2020/4/243648-cyber-warranties/fulltext} }
@article{Boehme20cacm, author = {Rainer B\"ohme and Lisa Eckey and Tyler Moore and Neha Narula and Tim Ruffing and Aviv Zohar}, title = {Responsible vulnerability disclosure in cryptocurrencies}, journal = {Communications of the ACM}, volume = {63}, number = {10}, pages = {62--71}, url = {https://tylermoore.utulsa.edu/cacm20cryptovuln.pdf}, puburl = {https://cacm.acm.org/magazines/2020/10/247597-responsible-vulnerability-disclosure-in-cryptocurrencies/fulltext}, year = {2020} }
@article{Hamrick:IPM21, title = {An examination of the cryptocurrency pump-and-dump ecosystem}, journal = {Information Processing \& Management}, volume = {58}, number = {4}, pages = {102506}, year = {2021}, issn = {0306-4573}, doi = {https://doi.org/10.1016/j.ipm.2021.102506}, puburl = {https://www.sciencedirect.com/science/article/pii/S0306457321000169}, author = {J.T. Hamrick and Farhang Rouhi and Arghya Mukherjee and Amir Feder and Neil Gandal and Tyler Moore and Marie Vasek}, keywords = {Cryptocurrency, Price manipulation, Cybercrime measurement}, abstract = {The recent introduction of thousands of cryptocurrencies in an unregulated environment has created many opportunities for unscrupulous traders to profit from price manipulation. We quantify the scope of one widespread tactic, the “pump and dump”, in which actors coordinate to bid up the price of coins before selling at a profit. We joined all relevant channels on two popular group-messaging platforms, Telegram and Discord, and identified thousands of different pumps targeting hundreds of coins. We find that pumps are modestly successful in driving short-term price rises, but that this effect has diminished over time. We also find that the most successful pumps are those that are most transparent about their intentions. Combined with evidence of concentration among a small number of channels, we conclude that regulators have an opportunity to effectively crack down on this illicit activity that threatens broader adoption of blockchain technologies.}, url = {https://tylermoore.utulsa.edu/ipm21.pdf} }
@article{Woods:DTRAP21, author = {Woods, Daniel W. and Moore, Tyler and Simpson, Andrew C.}, title = {The County Fair Cyber Loss Distribution: Drawing Inferences from Insurance Prices}, year = {2021}, issue_date = {April 2021}, publisher = {Association for Computing Machinery}, address = {New York, NY, USA}, volume = {2}, number = {2}, issn = {2692-1626}, puburl = {https://doi.org/10.1145/3434403}, doi = {10.1145/3434403}, abstract = {Insurance premiums reflect expectations about the future losses of each insured. Given the dearth of cyber security loss data, market premiums could shed light on the true magnitude of cyber losses despite noise from factors unrelated to losses. To that end, we extract cyber insurance pricing information from the regulatory filings of 26 insurers. We provide empirical observations on how premiums vary by coverage type, amount, and policyholder type and over time. A method using particle swarm optimisation and the expected value premium principle is introduced to iterate through candidate parameterised distributions with the goal of reducing error in predicting observed prices. We then aggregate the inferred loss models across 6,828 observed prices from all 26 insurers to derive the County Fair Cyber Loss Distribution. We demonstrate its value in decision support by applying it to a theoretical retail firm with annual revenue of $50M. The results suggest that the expected cyber liability loss is $428K and that the firm faces a 2.3% chance of experiencing a cyber liability loss between $100K and $10M each year. The method and resulting estimates could help organisations better manage cyber risk, regardless of whether they purchase insurance.}, journal = {Digital Threats: Research and Practice}, month = apr, articleno = {10}, numpages = {21}, keywords = {particle swarm optimization, Quantifying cyber risk, cyber insurance}, url = {https://tylermoore.utulsa.edu/dtrap21.pdf} }
@article{gandal_rise_2021, title = {The rise and fall of cryptocurrency coins and tokens}, issn = {1129-6569}, puburl = {https://doi.org/10.1007/s10203-021-00329-8}, doi = {10.1007/s10203-021-00329-8}, abstract = {Since Bitcoin’s introduction in 2009, interest in cryptocurrencies has soared. One manifestation of this interest has been the explosion of newly created coins and tokens. In this paper, we analyze the dynamics of this burgeoning industry. We consider both cryptocurrency coins and tokens. The paper examines the dynamics of coin and token creation, competition and destruction in the cryptocurrency industry. In order to conduct the analysis, we develop a methodology to identify peaks in prices and trade volume, as well as when coins and tokens are abandoned and subsequently “resurrected”. We also study trading activity. Our data spans more than 4 years: there are 1082 coins and 725 tokens in the data. While there are some similarities between coins and tokens regarding dynamics, there are some striking differences as well. Overall, we find that 44\% of publicly-traded coins are abandoned, at least temporarily. 71\% of abandoned coins are later resurrected, leaving 18\% of coins to fail permanently. Tokens experience abandonment less frequently, with only 7\% abandonment and 5\% permanent token abandonment at the end of the data. Using linear regressions, we find that market variables such as the bitcoin price are not associated with the rate of introducing new coins, though they are positively associated with issuing new tokens. We find that for both coins and tokens, market variables are positively associated with resurrection. We then examine the effect that the bursting of the Bitcoin bubble in December 2017 had on the dynamics in the industry. Unlike the end of the 2013 bubble, some alternative cryptocurrencies continue to flourish after the bursting of this bubble.}, journal = {Decisions in Economics and Finance}, author = {Gandal, Neil and Hamrick, J. T. and Moore, Tyler and Vasek, Marie}, month = jun, year = {2021} }
@article{Gandal:COSE23, author = {Neil Gandal and Tyler Moore and Michael Riordan and Noa Barnir}, title = {Empirically Evaluating the Effect of Security Precautions on Cyber Incidents}, journal = {Computers \& Security}, volume = {133}, pages = {103380}, month = {October}, year = 2023, publisher = {Elsevier}, url = {https://tylermoore.utulsa.edu/cose23.pdf}, puburl = {https://www.sciencedirect.com/science/article/pii/S0167404823002900} }
This file was generated by bibtex2html 1.99.