@inproceedings{DrewHM16star,
author = {Jake Drew and Michael Hahsler and Tyler Moore},
title = {Polymorphic Malware Detection Using Sequence Classification Methods},
booktitle = {Workshop on Bio-inspired Security, Trust, Assurance and Resilience (BioStar), IEEE Security and Privacy Workshops (SPW)},
year = 2016,
publisher = {IEEE},
doi = {10.1109/SPW.2016.30},
month = {May},
pages = {81--87},
url = {https://tylermoore.utulsa.edu/biostar16.pdf}
}
@inproceedings{VasekBCKM16fc,
author = {Marie Vasek and Joseph Bonneau and Ryan Castellucci and Cameron Keith and Tyler Moore},
title = {The {B}itcoin brain drain: Examining the Use and Abuse of {B}itcoin Brain Wallets},
booktitle = {Financial Cryptography and Data Security},
year = {2016},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
url = {https://tylermoore.utulsa.edu/fc16.pdf},
presurl = {https://tylermoore.utulsa.edu/fc16pres.pdf}
}
@techreport{MooreDC15ibm,
author = {Tyler Moore and Scott Dynes and Frederick Chang},
title = {Identifying How Firms Manage Cybersecurity Investment},
institution = {Darwin Deason Institute for Cyber Security, Southern Methodist University},
number = {DDI-TR-1001},
year = 2015,
month = {October},
day = 28,
url = {https://tylermoore.utulsa.edu/ciso15ibm.pdf}
}
@inproceedings{RiekBM14weis,
author = {Markus Riek and
Rainer B{\"o}hme and
Tyler Moore},
title = {Understanding the Influence of Cybercrime Risk on the E-Service Adoption of {E}uropean {I}nternet Users},
booktitle = {13th Annual Workshop on the Economics of Information Security (WEIS)},
year = {2014},
url = {https://tylermoore.utulsa.edu/weis14.pdf}
}
@inproceedings{DrewM14iwcc,
author = {Jake Drew and Tyler Moore},
title = {Automatic Identification of Replicated Criminal
Websites Using Combined Clustering},
booktitle = {International Workshop on Cyber Crime (IWCC), IEEE Security and Privacy Workshops},
year = {2014},
publisher = {IEEE},
url = {https://tylermoore.utulsa.edu/iwcc14.pdf}
}
@inproceedings{VasekTM14bitcoin,
author = {Marie Vasek and Micah Thornton and Tyler Moore},
title = {Empirical Analysis of Denial-of-Service Attacks in the {B}itcoin Ecosystem},
booktitle = {1st Workshop on Bitcoin Research},
year = {2014},
month = {March},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {8438},
pages = {57--71},
dataurl = {http://dx.doi.org/10.7910/DVN/25541},
url = {https://tylermoore.utulsa.edu/bitcoin14ddos.pdf},
puburl = {http://dx.doi.org/10.1007/978-3-662-44774-1_5}
}
@inproceedings{JohnsonLGVM14bitcoin,
author = {Benjamin Johnson and Aron Laszka and Jens Grossklags and Marie Vasek and Tyler Moore},
title = {Game-Theoretic Analysis of {DDoS} Attacks Against {B}itcoin Mining Pools},
booktitle = {1st Workshop on Bitcoin Research},
year = {2014},
month = {March},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {8438},
pages = {72--86},
url = {https://tylermoore.utulsa.edu/bitcoin14gt.pdf},
puburl = {http://dx.doi.org/10.1007/978-3-662-44774-1_6}
}
@inproceedings{MooreC14fc,
author = {Tyler Moore and Richard Clayton},
title = {The Ghosts of Banking Past: {E}mpirical Analysis of Closed Bank Websites},
booktitle = {Financial Cryptography and Data Security},
year = {2014},
month = {March},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {8437},
dataurl = {http://dx.doi.org/10.7910/DVN/26011},
url = {https://tylermoore.utulsa.edu/fc14ghosts.pdf},
presurl = {https://tylermoore.utulsa.edu/fc14banks-pres.pdf},
puburl = {http://dx.doi.org/10.1007/978-3-662-45472-5_3},
pages = {33--48}
}
@inproceedings{VasekM14fc,
author = {Marie Vasek and Tyler Moore},
title = {Identifying Risk Factors for Webserver Compromise},
booktitle = {Financial Cryptography and Data Security},
year = {2014},
month = {March},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {8437},
dataurl = {http://dx.doi.org/10.7910/DVN/25608},
url = {https://tylermoore.utulsa.edu/fc14rf.pdf},
puburl = {http://dx.doi.org/10.1007/978-3-662-45472-5_22},
pages = {326--345}
}
@inproceedings{VasekM13ecrime,
author = {Marie Vasek and Tyler Moore},
title = {Empirical Analysis of Factors Affecting Malware {URL} Detection},
booktitle = {8th APWG eCrime Researchers Summit (eCrime)},
year = {2013},
month = {September},
url = {https://tylermoore.utulsa.edu/ecrime13.pdf}
}
@inproceedings{LeontiadisMC13ec,
author = {Nektarios Leontiadis and Tyler Moore and Nicolas Christin},
title = {Pick Your Poison: {P}ricing and Inventories at Unlicensed Online Pharmacies},
booktitle = {ACM Conference on Electronic Commerce (EC)},
url = {https://tylermoore.utulsa.edu/ec13.pdf},
puburl = {http://dl.acm.org/citation.cfm?id=2482610‎},
publisher = {ACM},
year = {2013},
month = {June},
pages = {621-638}
}
@inproceedings{MooreC13fc,
author = {Tyler Moore and Nicolas Christin},
title = {Beware the Middleman: Empirical Analysis of {B}itcoin-Exchange Risk},
booktitle = {Financial Cryptography and Data Security},
year = {2013},
month = {April},
url = {https://tylermoore.utulsa.edu/fc13.pdf},
presurl = {https://tylermoore.utulsa.edu/fc13pres.pdf},
puburl = {http://dx.doi.org/10.1007/978-3-642-39884-1_3},
dataurl = {http://dx.doi.org/10.7910/DVN/25545},
pages = {25-33},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {7859}
}
@inproceedings{MooreC12ecrime,
author = {Tyler Moore and Richard Clayton},
title = {Discovering Phishing Dropboxes Using Email Metadata},
booktitle = {7th APWG eCrime Researchers Summit (eCrime)},
year = {2012},
month = {October},
pages = {},
url = {https://tylermoore.utulsa.edu/ecrime12dropbox.pdf},
presurl = {https://tylermoore.utulsa.edu/ecrime12dropboxpres.pdf}
}
@inproceedings{BoehmeM12ecrime,
author = {Rainer B{\"o}hme and Tyler Moore},
title = {How Do Consumers React to Cybercrime?},
booktitle = {APWG eCrime Researchers Summit (eCrime)},
year = {2012},
month = {October},
pages = {},
url = {https://tylermoore.utulsa.edu/ecrime12eurobar.pdf},
presurl = {https://tylermoore.utulsa.edu/ecrime12eurobarpres.pdf}
}
@inproceedings{EdwardsMSHF12nspw,
author = {Benjamin Edwards and
Tyler Moore and
George Stelle and
Steven A. Hofmeyr and
Stephanie Forrest},
title = {Beyond the Blacklist: Modeling Malware Spread and the Effect
of Interventions},
booktitle = {Proceedings of the New Security Paradigms Workshop,
Bertinoro, Italy, September 19-21, 2012},
year = {2012},
publisher = {ACM},
url = {https://tylermoore.utulsa.edu/nspw12.pdf}
}
@inproceedings{VasekM12cset,
author = {Vasek, Marie and Moore, Tyler},
title = {Do malware reports expedite cleanup? {A}n experimental study},
booktitle = {Proceedings of the 5th USENIX Workshop on Cyber Security Experimentation and Test},
series = {CSET'12},
year = {2012},
location = {Bellevue, WA},
puburl = {https://www.usenix.org/system/files/conference/cset12/cset12-final20.pdf},
url = {https://tylermoore.utulsa.edu/cset12.pdf},
presurl = {https://www.usenix.org/sites/default/files/conference/protected-files/vasek_cset12_slides.pdf},
dataurl = {http://dx.doi.org/10.7910/DVN/25571},
publisher = {USENIX Association},
address = {Berkeley, CA, USA}
}
@inproceedings{AndersonBBCELMS12weis,
author = {Ross Anderson and
Chris Barton and
Rainer B{\"o}hme and
Richard Clayton and
Michael van Eeten and
Michael Levi and
Tyler Moore and
Stefan Savage},
title = {Measuring the Cost of Cybercrime},
booktitle = {11th Annual Workshop on the Economics of Information Security (WEIS)},
year = {2012},
url = {https://tylermoore.utulsa.edu/weis12.pdf},
presurl = {https://tylermoore.utulsa.edu/weis12pres.pdf}
}
@inproceedings{MooreHC12fc,
author = {Tyler Moore and
Jie Han and
Richard Clayton},
title = {The Postmodern {P}onzi Scheme: Empirical Analysis of High-Yield
Investment Programs},
booktitle = {Financial Cryptography and Data Security},
year = {2012},
pages = {41-56},
puburl = {http://dx.doi.org/10.1007/978-3-642-32946-3_4},
url = {https://tylermoore.utulsa.edu/fc12.pdf},
presurl = {https://tylermoore.utulsa.edu/fc12pres.pdf},
editor = {Angelos D. Keromytis},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {7397},
puburl = {http://dx.doi.org/10.1007/978-3-642-32946-3}
}
@inproceedings{MooreLC11ccs,
author = {Tyler Moore and
Nektarios Leontiadis and
Nicolas Christin},
title = {Fashion crimes: trending-term exploitation on the web},
booktitle = {ACM Conference on Computer and Communications Security (CCS)},
year = {2011},
pages = {455-466},
url = {https://tylermoore.utulsa.edu/ccs11.pdf},
puburl = {http://doi.acm.org/10.1145/2046707.2046761},
presurl = {https://tylermoore.utulsa.edu/ccs11pres.pdf},
editor = {Yan Chen and
George Danezis and
Vitaly Shmatikov},
publisher = {ACM}
}
@inproceedings{LeontiadisMC11uss,
author = {Nektarios Leontiadis and
Tyler Moore and
Nicolas Christin},
title = {Measuring and Analyzing Search-Redirection Attacks in the
Illicit Online Prescription Drug Trade},
booktitle = {USENIX Security Symposium},
year = {2011},
url = {https://tylermoore.utulsa.edu/usenix11.pdf},
puburl = {http://static.usenix.org/events/sec11/tech/full_papers/Leontiadis.pdf},
publisher = {USENIX Association}
}
@inproceedings{HofmeyrMFES11weis,
author = {Steven A. Hofmeyr and
Tyler Moore and
Stephanie Forrest and
Benjamin Edwards and
George Stelle},
title = {Modeling Internet-Scale Policies for Cleaning up Malware},
year = {2011},
url = {https://tylermoore.utulsa.edu/weis11model.pdf},
puburl = {http://weis2011.econinfosec.org/papers/Modeling\%20Internet-Scale\%20Policies\%20for\%20Cleaning\%20up\%20Malware.pdf},
booktitle = {10th Annual Workshop on the Economics of Information Security (WEIS)}
}
@inproceedings{LandauM11weis,
author = {Susan Landau and
Tyler Moore},
title = {Economic Tussles in Federated Identity Management},
booktitle = {10th Annual Workshop on the Economics of Information Security (WEIS)},
year = {2011},
puburl = {http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/4254},
presurl = {https://tylermoore.utulsa.edu/nist12pres.pdf}
}
@inproceedings{MooreC11fc,
author = {Tyler Moore and
Richard Clayton},
title = {Ethical Dilemmas in Take-Down Research},
booktitle = {Workshop on the Ethics of Computer Security Research (Financial Cryptography Workshops)},
year = {2011},
pages = {154-168},
url = {https://tylermoore.utulsa.edu/wecsr11.pdf},
presurl = {https://tylermoore.utulsa.edu/wecsr11pres.pdf},
puburl = {http://dx.doi.org/10.1007/978-3-642-29889-9_14},
editor = {George Danezis and
Sven Dietrich and
Kazue Sako},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {7126}
}
@inproceedings{MooreFP10nspw,
author = {Tyler Moore and
Allan Friedman and
Ariel D. Procaccia},
title = {Would a 'cyber warrior' protect us: exploring trade-offs
between attack and defense of information systems},
booktitle = {New Security Paradigms Workshop (NSPW)},
year = {2010},
pages = {85-94},
url = {https://tylermoore.utulsa.edu/nspw10.pdf},
puburl = {http://doi.acm.org/10.1145/1900546.1900559},
editor = {Angelos D. Keromytis and
Sean Peisert and
Richard Ford and
Carrie Gates},
publisher = {ACM}
}
@inproceedings{MoranM10fc,
author = {Tal Moran and
Tyler Moore},
title = {The Phish-Market Protocol: Securely Sharing Attack Data
between Competitors},
booktitle = {Financial Cryptography and Data Security},
year = {2010},
pages = {222-237},
puburl = {http://dx.doi.org/10.1007/978-3-642-14577-3_18},
url = {https://tylermoore.utulsa.edu/fc10phishmarket.pdf},
presurl = {https://tylermoore.utulsa.edu/fc10phishmarketpres.pdf},
editor = {Radu Sion},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {6052}
}
@inproceedings{MooreE10fc,
author = {Tyler Moore and
Benjamin Edelman},
title = {Measuring the Perpetrators and Funders of Typosquatting},
booktitle = {Financial Cryptography and Data Security},
year = {2010},
pages = {175-191},
puburl = {http://dx.doi.org/10.1007/978-3-642-14577-3_15},
url = {https://tylermoore.utulsa.edu/fc10typo.pdf},
presurl = {https://tylermoore.utulsa.edu/fc10typopres.pdf},
dataurl = {http://www.benedelman.org/typosquatting/},
editor = {Radu Sion},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {6052}
}
@inproceedings{BohmeM09weis,
author = {Rainer B{\"o}hme and
Tyler Moore},
title = {The Iterated Weakest Link - A Model of Adaptive Security
Investment},
booktitle = {8th Annual Workshop on the Economics of Information Security (WEIS)},
year = {2009},
url = {https://tylermoore.utulsa.edu/weis09.pdf},
presurl = {https://tylermoore.utulsa.edu/weis09pres.pdf},
puburl = {http://weis09.infosecon.net/files/152/index.html}
}
@inproceedings{MooreCS09leet,
author = {Moore, Tyler and Clayton, Richard and Stern, Henry},
title = {Temporal correlations between spam and phishing websites},
booktitle = {Proceedings of the 2nd USENIX conference on Large-scale exploits and emergent threats: botnets, spyware, worms, and more},
series = {LEET'09},
year = {2009},
location = {Boston, MA},
puburl = {https://www.usenix.org/conference/leet-09/temporal-correlations-between-spam-and-phishing-websites},
url = {https://tylermoore.utulsa.edu/leet09.pdf},
presurl = {https://tylermoore.utulsa.edu/leet09pres.pdf},
publisher = {USENIX Association},
address = {Berkeley, CA, USA}
}
@inproceedings{MooreC09fc,
author = {Tyler Moore and
Richard Clayton},
title = {Evil Searching: Compromise and Recompromise of Internet
Hosts for Phishing},
booktitle = {Financial Cryptography and Data Security},
year = {2009},
pages = {256-272},
puburl = {http://dx.doi.org/10.1007/978-3-642-03549-4_16},
url = {https://tylermoore.utulsa.edu/fc09.pdf},
presurl = {https://tylermoore.utulsa.edu/fc09pres.pdf},
editor = {Roger Dingledine and
Philippe Golle},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {5628}
}
@inproceedings{MooreC08ecrime,
author = {Tyler Moore and
Richard Clayton},
title = {The Consequence of Non-Cooperation in the Fight Against Phishing},
booktitle = {APWG eCrime Researchers Summit},
year = {2008},
pages = {1-14},
puburl = {http://dx.doi.org/10.1109/ECRIME.2008.4696968},
url = {https://tylermoore.utulsa.edu/ecrime08.pdf},
presurl = {https://tylermoore.utulsa.edu/ecrime08pres.pdf},
publisher = {IEEE}
}
@inproceedings{AndersonBCM08isse,
author = {Ross Anderson and
Rainer B{\"o}hme and
Richard Clayton and
Tyler Moore},
title = {Security Economics and {E}uropean Policy},
booktitle = {Information Security Solutions Europe (ISSE)},
year = {2008},
pages = {57-76},
puburl = {http://dx.doi.org/10.1007/978-3-8348-9283-6_6},
editor = {Norbert Pohlmann and
Helmut Reimer and
Wolfgang Schneider},
publisher = {Vieweg+Teubner}
}
@inproceedings{MooreC08fc,
author = {Tyler Moore and
Richard Clayton},
title = {Evaluating the Wisdom of Crowds in Assessing Phishing Websites},
booktitle = {Financial Cryptography and Data Security},
year = {2008},
pages = {16-30},
puburl = {http://dx.doi.org/10.1007/978-3-540-85230-8_2},
url = {https://tylermoore.utulsa.edu/fc08.pdf},
presurl = {https://tylermoore.utulsa.edu/fc08pres.pdf},
editor = {Gene Tsudik},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {5143}
}
@inproceedings{MooreC07ecrime,
author = {Tyler Moore and
Richard Clayton},
title = {Examining the impact of website take-down on phishing},
booktitle = {APWG eCrime Researchers Summit},
year = {2007},
pages = {1-13},
puburl = {http://doi.acm.org/10.1145/1299015.1299016},
url = {https://tylermoore.utulsa.edu/ecrime07.pdf},
presurl = {https://tylermoore.utulsa.edu/ecrime07pres.pdf},
editor = {Lorrie Faith Cranor},
publisher = {ACM},
series = {ACM International Conference Proceeding Series},
volume = {269}
}
@inproceedings{MooreC07weis,
author = {Tyler Moore and
Richard Clayton},
title = {An Empirical Analysis of the Current State of Phishing Attack
and Defence},
booktitle = {6th Annual Workshop on the Economics of Information Security (WEIS)},
year = {2007},
puburl = {http://weis2007.econinfosec.org/papers/51.pdf},
url = {https://tylermoore.utulsa.edu/weis07.pdf},
presurl = {https://tylermoore.utulsa.edu/weis07pres.pdf}
}
@inproceedings{Moore06weis,
author = {Tyler Moore},
title = {The Economics of Digital Forensics},
booktitle = {5th Annual Workshop on the Economics of Information Security (WEIS)},
year = {2006},
puburl = {http://weis2006.econinfosec.org/docs/14.pdf},
url = {https://tylermoore.utulsa.edu/weis06.pdf}
}
@inproceedings{Moore05weis,
author = {Tyler Moore},
title = {Countering Hidden-Action Attacks on Networked Systems},
booktitle = {4th Annual Workshop on the Economics of Information Security (WEIS)},
year = {2005},
puburl = {http://infosecon.net/workshop/pdf/18.pdf},
url = {https://tylermoore.utulsa.edu/weis05.pdf},
presurl = {https://tylermoore.utulsa.edu/weis05pres.pdf}
}
@inproceedings{LeontiadisMC14,
author = {Leontiadis, Nektarios and Moore, Tyler and Christin, Nicolas},
title = {A Nearly Four-Year Longitudinal Study of Search-Engine Poisoning},
booktitle = {Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security},
series = {CCS '14},
year = {2014},
isbn = {978-1-4503-2957-6},
location = {Scottsdale, Arizona, USA},
pages = {930--941},
numpages = {12},
url = {https://tylermoore.utulsa.edu/ccs14.pdf},
puburl = {http://doi.acm.org/10.1145/2660267.2660332},
doi = {10.1145/2660267.2660332},
acmid = {2660332},
publisher = {ACM},
address = {New York, NY, USA},
keywords = {online crime, search engines, web security}
}
@inproceedings{ClaytonMC15weis,
author = {Richard Clayton and Tyler Moore and Nicolas Christin},
title = {Concentrating Correctly on Cybercrime Concentration},
booktitle = {Workshop on the Economics of Information Security},
year = 2015,
url = {http://www.econinfosec.org/archive/weis2015/papers/WEIS_2015_clayton.pdf},
puburl = {https://tylermoore.utulsa.edu/weis15pres.pdf}
}
@inproceedings{CetinJGMV15weis,
title = {Understanding the Role of Sender Reputation in Abuse Reporting and Cleanup},
author = {Orcun Cetin and Mohammad Hanif Jhaveri and Carlos Ganan and Michel van Eeten and Tyler Moore},
booktitle = {Workshop on the Economics of Information Security},
year = 2015,
url = {http://www.econinfosec.org/archive/weis2015/papers/WEIS_2015_cetin.pdf}
}
@inproceedings{WadleighDM15www,
author = {John Wadleigh and Jake Drew and Tyler Moore},
title = {The E-Commerce Market for ``Lemons'': Identification and Analysis of Websites Selling Counterfeit Goods},
booktitle = {International World Wide Web Conference (Security and Privacy Track)},
year = {2015},
month = {May},
publisher = {ACM},
pages = {1188-1197},
url = {https://tylermoore.utulsa.edu/www15.pdf},
puburl = {http://www.www2015.it/documents/proceedings/proceedings/p1188.pdf}
}
@inproceedings{MooreC15apwg,
author = {Tyler Moore and Richard Clayton},
title = {Which Malware Lures Work Best? Measurements
from a Large Instant Messaging Worm},
booktitle = {APWG Symposium on Electronic Crime Research},
year = 2015,
publisher = {IEEE},
url = {https://tylermoore.utulsa.edu/ecrime15.pdf}
}
@inproceedings{VasekM15fc,
author = {Marie Vasek and Tyler Moore},
title = {There's no free lunch, even using {B}itcoin: Tracking the Popularity and Profits of Virtual Currency Scams},
booktitle = {Financial Cryptography and Data Security},
year = {2015},
volume = {8975},
editor = {B\"ohme, Rainer and Okamoto, Tatsuaki},
doi = {10.1007/978-3-662-47854-7_4},
pages = {44-61},
puburl = {http://dx.doi.org/10.1007/978-3-662-47854-7_4},
month = {January},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
url = {https://tylermoore.utulsa.edu/fc15.pdf}
}
@article{PapaCM13ifip,
author = {Steve Papa and William Casper and Tyler Moore},
title = {Securing wastewater facilities from accidental and intentional harm: a cost-benefit analysis},
journal = {International Journal of Critical Infrastructure Protection},
year = {2013},
volume = 6,
number = 2,
pages = {96-106},
url = {https://tylermoore.utulsa.edu/ijcip13.pdf},
puburl = {http://dx.doi.org/10.1016/j.ijcip.2013.05.002}
}
@article{LandauM12firstmonday,
author = {Susan Landau and
Tyler Moore},
title = {Economic tussles in federated identity management},
journal = {First Monday},
volume = {17},
number = {10},
year = {2012},
puburl = {http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/4254},
presurl = {https://tylermoore.utulsa.edu/nist12pres.pdf}
}
@article{RePEc:idt:journl:cs8102,
author = {Tyler Moore and Richard Clayton},
title = {The Impact of Public Information on Phishing Attack and Defense},
journal = {Communications \& Strategies},
year = 2011,
volume = {1},
number = {81},
pages = {45-68},
keywords = {security economics; online crime; phishing; transparency},
puburl = {http://ideas.repec.org/a/idt/journl/cs8102.html},
url = {https://tylermoore.utulsa.edu/cs81.pdf}
}
@article{Moore10ijcip,
author = {Tyler Moore},
title = {The economics of cybersecurity: Principles and policy options},
journal = {International Journal of Critical Infrastructure Protection},
volume = {3},
number = {3--4},
pages = {103 - 117},
year = {2010},
issn = {1874-5482},
doi = {10.1016/j.ijcip.2010.10.002},
puburl = {http://www.sciencedirect.com/science/article/pii/S1874548210000429},
url = {https://tylermoore.utulsa.edu/ijcip10.pdf}
}
@article{BohmeM10ieeesp,
author = {Rainer B{\"o}hme and
Tyler Moore},
title = {The Iterated Weakest Link},
journal = {IEEE Security {\&} Privacy},
volume = {8},
number = {1},
year = {2010},
pages = {53-55},
puburl = {http://doi.ieeecomputersociety.org/10.1109/MSP.2010.51},
url = {https://tylermoore.utulsa.edu/iwl-gordon.pdf}
}
@article{MoranM10ieeesp,
author = {Tal Moran and
Tyler Moore},
title = {The Phish-Market Protocol: Secure Sharing Between Competitors},
journal = {IEEE Security {\&} Privacy},
volume = {8},
number = {4},
year = {2010},
pages = {40-45},
puburl = {http://doi.ieeecomputersociety.org/10.1109/MSP.2010.138},
url = {https://tylermoore.utulsa.edu/sp10phishmarket.pdf}
}
@article{Moore09JEP,
author = {Tyler Moore and Richard Clayton and Ross Anderson},
title = {The Economics of Online Crime},
journal = {Journal of Economic Perspectives},
volume = 23,
number = 3,
month = {Summer},
year = 2009,
pages = {3--20},
puburl = {http://www.aeaweb.org/articles.php?doi=10.1257/jep.23.3.3},
url = {https://tylermoore.utulsa.edu/jep09.pdf}
}
@article{DrewMEURASIP14,
author = {Jake Drew and Tyler Moore},
title = {Optimized Combined Clustering Methods for Finding Replicated Criminal Websites},
journal = {{EURASIP} Journal on Information Security},
year = 2014,
volume = {2014},
number = {14},
url = {http://jis.eurasipjournals.com/content/2014/1/14/abstract}
}
@article{AndersonM06science,
author = {Anderson, Ross and Moore, Tyler},
title = {The Economics of Information Security},
journal = {Science},
volume = {314},
number = {5799},
pages = {610-613},
year = {2006},
doi = {10.1126/science.1130992},
puburl = {http://www.sciencemag.org/content/314/5799/610.full.pdf},
url = {https://tylermoore.utulsa.edu/science-econ.pdf}
}
@article{VasekWM16tdsc,
author = {Vasek, Marie and Wadleigh, John and Moore, Tyler},
title = {Hacking is not random: a case-control study of webserver-compromise risk},
journal = {IEEE Transactions on Dependable and Secure Computing},
volume = {13},
number = 2,
year = 2016,
pages = {206--219},
url = {https://tylermoore.utulsa.edu/tdsc15vasek.pdf},
puburl = {http://dx.doi.org/10.1109/TDSC.2015.2427847}
}
@article{RiekBM16tdsc,
author = {Riek, Markus and B\"ohme, Rainer and Moore, Tyler},
title = {Measuring the Influence of Perceived Cybercrime Risk on Online Service Avoidance},
journal = {IEEE Transactions on Dependable and Secure Computing},
volume = {13},
number = 2,
year = 2016,
pages = {261--273},
url = {https://tylermoore.utulsa.edu/tdsc15riek.pdf},
puburl = {http://dx.doi.org/10.1109/TDSC.2015.2410795}
}
@article{BoehmeCEM15jep,
author = {B\"ohme, Rainer and Christin, Nicolas and Edelman, Benjamin and Moore, Tyler},
title = {Bitcoin: Economics, Technology, and Governance},
journal = {Journal of Economic Perspectives},
volume = {29},
number = {2},
year = {2015},
pages = {213-38},
doi = {10.1257/jep.29.2.213},
puburl = {http://www.aeaweb.org/articles.php?doi=10.1257/jep.29.2.213}
}
@inproceedings{HayashiMS15kcpay,
title = {The Economics of Retail Payments Security},
author = {Fumiko Hayashi Tyler Moore and Richard J. Sullivan},
booktitle = {Fifth International Payments Policy Conference: The Puzzle of Payments Security, Federal Reserve Bank of Kansas City},
year = 2015,
url = {https://tylermoore.utulsa.edu/kcpay15.pdf},
presurl = {https://tylermoore.utulsa.edu/kcpay-econ.pdf}
}
@incollection{MooreA12oxford,
author = {Tyler Moore and
Ross Anderson},
title = {Internet Security},
editor = {Martin Peitz and Joel Waldfogel},
booktitle = {The Oxford Handbook of the Digital Economy},
pages = {572-599},
year = 2012,
publisher = {Oxford University Press},
puburl = {http://www.oxfordhandbooks.com/10.1093/oxfordhb/9780195397840.001.0001/oxfordhb-9780195397840-e-21},
url = {https://tylermoore.utulsa.edu/oxford12.pdf}
}
@incollection{Moore10nas,
author = {Tyler Moore},
title = {The economics of cybersecurity: Principles and policy options},
booktitle = {Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy},
isbn = {9780309160353},
puburl = {http://books.nap.edu/openbook.php?record_id=12997&page=3},
year = {2010},
pages = {3--23},
publisher = {The National Academies Press}
}
@incollection{AndersonMNO07,
author = {Ross Anderson and Tyler Moore and Shishir Nagaraja and Andy Ozment},
title = {Incentives and Information Security},
editor = {Nisan, Noam and Roughgarden, Tim and Tardos, Eva and Vazirani, Vijay V.},
pages = {633-649},
booktitle = {Algorithmic Game Theory},
year = {2007},
isbn = {0521872820},
publisher = {Cambridge University Press},
address = {New York, NY, USA}
}
@article{BohmeM16JIS,
author = {Rainer B{\"o}hme and
Tyler Moore},
title = {The ``Iterated Weakest Link'' Model of Adaptive Security
Investment},
journal = {Journal of Information Security},
volume = 7,
number = 2,
pages = {81--102},
year = {2016},
puburl = {http://dx.doi.org/10.4236/jis.2016.72006},
url = {https://tylermoore.utulsa.edu/jis16.pdf}
}
@inproceedings{MooreDC16weis,
author = {Tyler Moore and Scott Dynes and Frederick Chang},
title = {Identifying how firms manage cybersecurity investment},
booktitle = {15th Workshop on the Economics of Information Security (WEIS)},
year = 2016,
url = {https://tylermoore.utulsa.edu/weis16ciso.pdf},
presurl = {https://tylermoore.utulsa.edu/weis16cisopres.pdf}
}
@inproceedings{FederGHM16weis,
author = {Amir Feder and Neil Gandal and JT Hamrick and Tyler Moore},
title = {The Impact of {DDoS} and Other Security Shocks on {Bitcoin} Currency Exchanges: Evidence from {Mt. Gox}},
booktitle = {15th Workshop on the Economics of Information Security (WEIS)},
year = 2016,
url = {https://tylermoore.utulsa.edu/weis16gox.pdf},
presurl = {https://tylermoore.utulsa.edu/weis16goxpres.pdf}
}
@inproceedings{VasekWM16wiscs,
author = {Marie Vasek and Matthew Weeden and Tyler Moore},
title = {Measuring the Impact of Sharing Abuse Data with Web Hosting Providers},
booktitle = {ACM Workshop on Information Sharing and Collaborative Security},
year = 2016,
pages = {71--80},
publisher = {{ACM}},
url = {https://tylermoore.utulsa.edu/wiscs16.pdf},
puburl = {http://dl.acm.org/citation.cfm?id=2994548},
presurl = {https://tylermoore.utulsa.edu/vasekwiscs16pres.pdf}
}
@article{CetinJGVM2016jcs,
title = {Understanding the role of sender reputation in abuse reporting and cleanup},
author = {Cetin, Orcun and Jhaveri, Mohammad Hanif and Ga{\~n}{\'a}n, Carlos and van Eeten, Michel and Moore, Tyler},
journal = {Journal of Cybersecurity},
volume = {2},
number = {1},
pages = {83--98},
year = {2016},
publisher = {Oxford University Press},
puburl = {https://cybersecurity.oxfordjournals.org/content/2/1/83}
}
@article{JhaveriCGMV16csur,
title = {Abuse Reporting and the Fight Against Cybercrime},
author = {Jhaveri, Mohammad Hanif and Cetin, Orcun and Ga{\~n}{\'a}n, Carlos and Moore, Tyler and Eeten, Michel Van},
journal = {ACM Computing Surveys (CSUR)},
volume = {49},
number = {4},
pages = {68},
year = {2017},
publisher = {ACM},
puburl = {http://dl.acm.org/citation.cfm?id=3003147},
url = {https://tylermoore.utulsa.edu/csur17.pdf}
}
@article{Drew2017jis,
author = {Jake Drew and Michael Hahsler and Tyler Moore},
title = {Polymorphic malware detection using sequence classification methods and ensembles},
journal = {EURASIP Journal on Information Security},
year = {2017},
volume = {2017},
number = {1},
pages = {2},
issn = {1687-417X},
puburl = {http://dx.doi.org/10.1186/s13635-017-0055-6}
}
@article{Rovner17jogss,
author = {Rovner, Joshua and Moore, Tyler},
title = {Does the Internet Need a Hegemon?},
journal = {Journal of Global Security Studies},
volume = {2},
number = {3},
pages = {184-203},
year = {2017},
doi = {10.1093/jogss/ogx008},
url = {http://dx.doi.org/10.1093/jogss/ogx008}
}
@article{Gandal17jme,
author = {Neil Gandal and JT Hamrick and Tyler Moore and Tali Obermann},
title = {Price Manipulation in the {Bitcoin} Ecosystem},
journal = {Journal of Monetary Economics},
volume = {95},
month = {May},
pages = {86--96},
year = 2018,
doi = {10.1016/j.jmoneco.2017.12.004},
url = {https://tylermoore.utulsa.edu/jme17.pdf},
appendix = {https://tylermoore.utulsa.edu/jme17appendix.pdf},
publisher = {Elsevier}
}
@article{Moore18toit,
author = {Moore, Tyler and Christin, Nicolas and Szurdi, Janos},
title = {Revisiting the Risks of Bitcoin Currency Exchange Closure},
journal = {ACM Transactions on Internet Technology},
issue_date = {November 2018},
volume = {18},
number = {4},
month = sep,
year = {2018},
issn = {1533-5399},
pages = {50:1--50:18},
articleno = {50},
numpages = {18},
url = {https://tylermoore.utulsa.edu/toit17.pdf},
puburl = {http://doi.acm.org/10.1145/3155808},
doi = {10.1145/3155808},
acmid = {3155808},
publisher = {ACM},
address = {New York, NY, USA},
keywords = {Bitcoin, currency exchanges, cybercrime, security economics}
}
@inproceedings{Cats17ccs,
title = {Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting},
author = {Samaneh Tajalizadehkhoob and Tom van Goethem and Maciej Korczy\'nski and Arman Noroozian and Rainer B\"ohme and Tyler Moore and Wouter Joosen and Michel van Eeten},
booktitle = {ACM SIGSAC Conference on Computer and Communications Security},
series = {CCS '17},
year = {2017},
location = {Dallas, Texas, USA},
publisher = {ACM},
url = {https://tylermoore.utulsa.edu/ccs17.pdf}
}
@inproceedings{SpringMP17nspw,
title = {Practicing a Science of Security: A Philosophy of Science Perspective},
booktitle = {New Security Paradigms Workshop (NSPW)},
author = {Jonathan M. Spring and Tyler Moore and David Pym},
year = {2017},
location = {Santa Cruz, California, USA},
publisher = {ACM},
url = {https://tylermoore.utulsa.edu/nspw17.pdf}
}
@inproceedings{VasekM18bitcoin,
title = {Analyzing the {Bitcoin} {Ponzi} Scheme Ecosystem},
author = {Marie Vasek and Tyler Moore},
booktitle = {Fifth Workshop on Bitcoin and Blockchain Research},
year = 2018,
publisher = {Springer},
series = {Lecture Notes in Computer Science}
}
@inproceedings{ZhengRCTM18cset,
author = {Muwei Zheng and Hannah Robbins and Zimo Chai and Prakash Thapa and Tyler Moore},
title = {Cybersecurity Research Datasets: Taxonomy and Empirical Analysis},
booktitle = {11th {USENIX} Workshop on Cyber Security Experimentation and Test ({CSET} 18)},
year = {2018},
address = {Baltimore, MD},
puburl = {https://www.usenix.org/conference/cset18/presentation/zheng},
url = {https://tylermoore.utulsa.edu/cset18.pdf},
dataurl = {https://dx.doi.org/10.7910/DVN/4EPUIA},
presurl = {https://tylermoore.utulsa.edu/cset18pres.pdf},
publisher = {{USENIX} Association}
}
@inproceedings{FederGHMV17weis,
author = {Amir Feder and Neil Gandal and {JT} Hamrick and Tyler Moore and Marie Vasek},
title = {The rise and fall of cryptocurrencies},
booktitle = {17th Workshop on the Economics of Information Security (WEIS)},
year = 2018,
url = {https://tylermoore.utulsa.edu/weis18.pdf},
presurl = {https://tylermoore.utulsa.edu/weis18pres.pdf}
}
@inproceedings{WoodsMSWEIS19,
author = {Daniel W. Woods and Tyler Moore and Andrew C. Simpson},
title = {The County Fair Cyber Loss Distribution: Drawing Inferences from Insurance Prices},
booktitle = {18th Workshop on the Economics of Information Security (WEIS)},
url = {https://tylermoore.utulsa.edu/weis19loss.pdf},
year = 2019
}
@inproceedings{HamrickWEIS19,
author = {{JT} Hamrick and Farhang Rouhi and Arghya Mukherjee and Amir Feder and Neil Gandal and Tyler Moore and Marie Vasek and Neil Gandal and Marie Vasek},
title = {The economics of cryptocurrency pump and dump schemes},
booktitle = {18th Workshop on the Economics of Information Security (WEIS)},
url = {https://tylermoore.utulsa.edu/weis19pump.pdf},
year = 2019
}
@inproceedings{MooreKCTWEIS19,
author = {Tyler Moore and Erin Kenneally and Michael Collett and Prakash Thapa},
title = {Valuing cybersecurity research datasets},
booktitle = {18th Workshop on the Economics of Information Security (WEIS)},
year = 2019,
url = {https://tylermoore.utulsa.edu/weis19data.pdf},
presurl = {https://tylermoore.utulsa.edu/weis19datapres.pdf}
}
@inproceedings{AndersonWEIS19,
author = {Ross Anderson and Chris Barton and Rainer B\"ohme and Richard Clayton and Carlos Ganan and Tom Grasso and Michael Levi and Tyler Moore and Stefan Savage and Marie Vasek},
title = {Measuring the Changing Cost of Cybercrime},
booktitle = {18th Workshop on the Economics of Information Security (WEIS)},
url = {https://tylermoore.utulsa.edu/weis19cost.pdf},
year = 2019
}
@article{WoodsM20ieeesp,
author = {Daniel W. Woods and
Tyler Moore},
title = {Does insurance have a future in governing cybersecurity?},
journal = {IEEE Security {\&} Privacy},
volume = {18},
number = {1},
year = {2020},
url = {https://tylermoore.utulsa.edu/govins20.pdf}
}
This file was generated by bibtex2html 1.99.