@inproceedings{DrewHM16star, author = {Jake Drew and Michael Hahsler and Tyler Moore}, title = {Polymorphic Malware Detection Using Sequence Classification Methods}, booktitle = {Workshop on Bio-inspired Security, Trust, Assurance and Resilience (BioStar), IEEE Security and Privacy Workshops (SPW)}, year = 2016, publisher = {IEEE}, doi = {10.1109/SPW.2016.30}, month = {May}, pages = {81--87}, url = {https://tylermoore.utulsa.edu/biostar16.pdf} }
@inproceedings{VasekBCKM16fc, author = {Marie Vasek and Joseph Bonneau and Ryan Castellucci and Cameron Keith and Tyler Moore}, title = {The {B}itcoin brain drain: Examining the Use and Abuse of {B}itcoin Brain Wallets}, booktitle = {Financial Cryptography and Data Security}, year = {2016}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, url = {https://tylermoore.utulsa.edu/fc16.pdf}, presurl = {https://tylermoore.utulsa.edu/fc16pres.pdf} }
@techreport{MooreDC15ibm, author = {Tyler Moore and Scott Dynes and Frederick Chang}, title = {Identifying How Firms Manage Cybersecurity Investment}, institution = {Darwin Deason Institute for Cyber Security, Southern Methodist University}, number = {DDI-TR-1001}, year = 2015, month = {October}, day = 28, url = {https://tylermoore.utulsa.edu/ciso15ibm.pdf} }
@inproceedings{RiekBM14weis, author = {Markus Riek and Rainer B{\"o}hme and Tyler Moore}, title = {Understanding the Influence of Cybercrime Risk on the E-Service Adoption of {E}uropean {I}nternet Users}, booktitle = {13th Annual Workshop on the Economics of Information Security (WEIS)}, year = {2014}, url = {https://tylermoore.utulsa.edu/weis14.pdf} }
@inproceedings{DrewM14iwcc, author = {Jake Drew and Tyler Moore}, title = {Automatic Identification of Replicated Criminal Websites Using Combined Clustering}, booktitle = {International Workshop on Cyber Crime (IWCC), IEEE Security and Privacy Workshops}, year = {2014}, publisher = {IEEE}, url = {https://tylermoore.utulsa.edu/iwcc14.pdf} }
@inproceedings{VasekTM14bitcoin, author = {Marie Vasek and Micah Thornton and Tyler Moore}, title = {Empirical Analysis of Denial-of-Service Attacks in the {B}itcoin Ecosystem}, booktitle = {1st Workshop on Bitcoin Research}, year = {2014}, month = {March}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {8438}, pages = {57--71}, dataurl = {http://dx.doi.org/10.7910/DVN/25541}, url = {https://tylermoore.utulsa.edu/bitcoin14ddos.pdf}, puburl = {http://dx.doi.org/10.1007/978-3-662-44774-1_5} }
@inproceedings{JohnsonLGVM14bitcoin, author = {Benjamin Johnson and Aron Laszka and Jens Grossklags and Marie Vasek and Tyler Moore}, title = {Game-Theoretic Analysis of {DDoS} Attacks Against {B}itcoin Mining Pools}, booktitle = {1st Workshop on Bitcoin Research}, year = {2014}, month = {March}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {8438}, pages = {72--86}, url = {https://tylermoore.utulsa.edu/bitcoin14gt.pdf}, puburl = {http://dx.doi.org/10.1007/978-3-662-44774-1_6} }
@inproceedings{MooreC14fc, author = {Tyler Moore and Richard Clayton}, title = {The Ghosts of Banking Past: {E}mpirical Analysis of Closed Bank Websites}, booktitle = {Financial Cryptography and Data Security}, year = {2014}, month = {March}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {8437}, dataurl = {http://dx.doi.org/10.7910/DVN/26011}, url = {https://tylermoore.utulsa.edu/fc14ghosts.pdf}, presurl = {https://tylermoore.utulsa.edu/fc14banks-pres.pdf}, puburl = {http://dx.doi.org/10.1007/978-3-662-45472-5_3}, pages = {33--48} }
@inproceedings{VasekM14fc, author = {Marie Vasek and Tyler Moore}, title = {Identifying Risk Factors for Webserver Compromise}, booktitle = {Financial Cryptography and Data Security}, year = {2014}, month = {March}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {8437}, dataurl = {http://dx.doi.org/10.7910/DVN/25608}, url = {https://tylermoore.utulsa.edu/fc14rf.pdf}, puburl = {http://dx.doi.org/10.1007/978-3-662-45472-5_22}, pages = {326--345} }
@inproceedings{VasekM13ecrime, author = {Marie Vasek and Tyler Moore}, title = {Empirical Analysis of Factors Affecting Malware {URL} Detection}, booktitle = {8th APWG eCrime Researchers Summit (eCrime)}, year = {2013}, month = {September}, url = {https://tylermoore.utulsa.edu/ecrime13.pdf} }
@inproceedings{LeontiadisMC13ec, author = {Nektarios Leontiadis and Tyler Moore and Nicolas Christin}, title = {Pick Your Poison: {P}ricing and Inventories at Unlicensed Online Pharmacies}, booktitle = {ACM Conference on Electronic Commerce (EC)}, url = {https://tylermoore.utulsa.edu/ec13.pdf}, puburl = {http://dl.acm.org/citation.cfm?id=2482610‎}, publisher = {ACM}, year = {2013}, month = {June}, pages = {621-638} }
@inproceedings{MooreC13fc, author = {Tyler Moore and Nicolas Christin}, title = {Beware the Middleman: Empirical Analysis of {B}itcoin-Exchange Risk}, booktitle = {Financial Cryptography and Data Security}, year = {2013}, month = {April}, url = {https://tylermoore.utulsa.edu/fc13.pdf}, presurl = {https://tylermoore.utulsa.edu/fc13pres.pdf}, puburl = {http://dx.doi.org/10.1007/978-3-642-39884-1_3}, dataurl = {http://dx.doi.org/10.7910/DVN/25545}, pages = {25-33}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {7859} }
@inproceedings{MooreC12ecrime, author = {Tyler Moore and Richard Clayton}, title = {Discovering Phishing Dropboxes Using Email Metadata}, booktitle = {7th APWG eCrime Researchers Summit (eCrime)}, year = {2012}, month = {October}, pages = {}, url = {https://tylermoore.utulsa.edu/ecrime12dropbox.pdf}, presurl = {https://tylermoore.utulsa.edu/ecrime12dropboxpres.pdf} }
@inproceedings{BoehmeM12ecrime, author = {Rainer B{\"o}hme and Tyler Moore}, title = {How Do Consumers React to Cybercrime?}, booktitle = {APWG eCrime Researchers Summit (eCrime)}, year = {2012}, month = {October}, pages = {}, url = {https://tylermoore.utulsa.edu/ecrime12eurobar.pdf}, presurl = {https://tylermoore.utulsa.edu/ecrime12eurobarpres.pdf} }
@inproceedings{EdwardsMSHF12nspw, author = {Benjamin Edwards and Tyler Moore and George Stelle and Steven A. Hofmeyr and Stephanie Forrest}, title = {Beyond the Blacklist: Modeling Malware Spread and the Effect of Interventions}, booktitle = {Proceedings of the New Security Paradigms Workshop, Bertinoro, Italy, September 19-21, 2012}, year = {2012}, publisher = {ACM}, url = {https://tylermoore.utulsa.edu/nspw12.pdf} }
@inproceedings{VasekM12cset, author = {Vasek, Marie and Moore, Tyler}, title = {Do malware reports expedite cleanup? {A}n experimental study}, booktitle = {Proceedings of the 5th USENIX Workshop on Cyber Security Experimentation and Test}, series = {CSET'12}, year = {2012}, location = {Bellevue, WA}, puburl = {https://www.usenix.org/system/files/conference/cset12/cset12-final20.pdf}, url = {https://tylermoore.utulsa.edu/cset12.pdf}, presurl = {https://www.usenix.org/sites/default/files/conference/protected-files/vasek_cset12_slides.pdf}, dataurl = {http://dx.doi.org/10.7910/DVN/25571}, publisher = {USENIX Association}, address = {Berkeley, CA, USA} }
@inproceedings{AndersonBBCELMS12weis, author = {Ross Anderson and Chris Barton and Rainer B{\"o}hme and Richard Clayton and Michael van Eeten and Michael Levi and Tyler Moore and Stefan Savage}, title = {Measuring the Cost of Cybercrime}, booktitle = {11th Annual Workshop on the Economics of Information Security (WEIS)}, year = {2012}, url = {https://tylermoore.utulsa.edu/weis12.pdf}, presurl = {https://tylermoore.utulsa.edu/weis12pres.pdf} }
@inproceedings{MooreHC12fc, author = {Tyler Moore and Jie Han and Richard Clayton}, title = {The Postmodern {P}onzi Scheme: Empirical Analysis of High-Yield Investment Programs}, booktitle = {Financial Cryptography and Data Security}, year = {2012}, pages = {41-56}, puburl = {http://dx.doi.org/10.1007/978-3-642-32946-3_4}, url = {https://tylermoore.utulsa.edu/fc12.pdf}, presurl = {https://tylermoore.utulsa.edu/fc12pres.pdf}, editor = {Angelos D. Keromytis}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {7397}, puburl = {http://dx.doi.org/10.1007/978-3-642-32946-3} }
@inproceedings{MooreLC11ccs, author = {Tyler Moore and Nektarios Leontiadis and Nicolas Christin}, title = {Fashion crimes: trending-term exploitation on the web}, booktitle = {ACM Conference on Computer and Communications Security (CCS)}, year = {2011}, pages = {455-466}, url = {https://tylermoore.utulsa.edu/ccs11.pdf}, puburl = {http://doi.acm.org/10.1145/2046707.2046761}, presurl = {https://tylermoore.utulsa.edu/ccs11pres.pdf}, editor = {Yan Chen and George Danezis and Vitaly Shmatikov}, publisher = {ACM} }
@inproceedings{LeontiadisMC11uss, author = {Nektarios Leontiadis and Tyler Moore and Nicolas Christin}, title = {Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade}, booktitle = {USENIX Security Symposium}, year = {2011}, url = {https://tylermoore.utulsa.edu/usenix11.pdf}, puburl = {http://static.usenix.org/events/sec11/tech/full_papers/Leontiadis.pdf}, publisher = {USENIX Association} }
@inproceedings{HofmeyrMFES11weis, author = {Steven A. Hofmeyr and Tyler Moore and Stephanie Forrest and Benjamin Edwards and George Stelle}, title = {Modeling Internet-Scale Policies for Cleaning up Malware}, year = {2011}, url = {https://tylermoore.utulsa.edu/weis11model.pdf}, puburl = {http://weis2011.econinfosec.org/papers/Modeling\%20Internet-Scale\%20Policies\%20for\%20Cleaning\%20up\%20Malware.pdf}, booktitle = {10th Annual Workshop on the Economics of Information Security (WEIS)} }
@inproceedings{LandauM11weis, author = {Susan Landau and Tyler Moore}, title = {Economic Tussles in Federated Identity Management}, booktitle = {10th Annual Workshop on the Economics of Information Security (WEIS)}, year = {2011}, puburl = {http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/4254}, presurl = {https://tylermoore.utulsa.edu/nist12pres.pdf} }
@inproceedings{MooreC11fc, author = {Tyler Moore and Richard Clayton}, title = {Ethical Dilemmas in Take-Down Research}, booktitle = {Workshop on the Ethics of Computer Security Research (Financial Cryptography Workshops)}, year = {2011}, pages = {154-168}, url = {https://tylermoore.utulsa.edu/wecsr11.pdf}, presurl = {https://tylermoore.utulsa.edu/wecsr11pres.pdf}, puburl = {http://dx.doi.org/10.1007/978-3-642-29889-9_14}, editor = {George Danezis and Sven Dietrich and Kazue Sako}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {7126} }
@inproceedings{MooreFP10nspw, author = {Tyler Moore and Allan Friedman and Ariel D. Procaccia}, title = {Would a 'cyber warrior' protect us: exploring trade-offs between attack and defense of information systems}, booktitle = {New Security Paradigms Workshop (NSPW)}, year = {2010}, pages = {85-94}, url = {https://tylermoore.utulsa.edu/nspw10.pdf}, puburl = {http://doi.acm.org/10.1145/1900546.1900559}, editor = {Angelos D. Keromytis and Sean Peisert and Richard Ford and Carrie Gates}, publisher = {ACM} }
@inproceedings{MoranM10fc, author = {Tal Moran and Tyler Moore}, title = {The Phish-Market Protocol: Securely Sharing Attack Data between Competitors}, booktitle = {Financial Cryptography and Data Security}, year = {2010}, pages = {222-237}, puburl = {http://dx.doi.org/10.1007/978-3-642-14577-3_18}, url = {https://tylermoore.utulsa.edu/fc10phishmarket.pdf}, presurl = {https://tylermoore.utulsa.edu/fc10phishmarketpres.pdf}, editor = {Radu Sion}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {6052} }
@inproceedings{MooreE10fc, author = {Tyler Moore and Benjamin Edelman}, title = {Measuring the Perpetrators and Funders of Typosquatting}, booktitle = {Financial Cryptography and Data Security}, year = {2010}, pages = {175-191}, puburl = {http://dx.doi.org/10.1007/978-3-642-14577-3_15}, url = {https://tylermoore.utulsa.edu/fc10typo.pdf}, presurl = {https://tylermoore.utulsa.edu/fc10typopres.pdf}, dataurl = {http://www.benedelman.org/typosquatting/}, editor = {Radu Sion}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {6052} }
@inproceedings{BohmeM09weis, author = {Rainer B{\"o}hme and Tyler Moore}, title = {The Iterated Weakest Link - A Model of Adaptive Security Investment}, booktitle = {8th Annual Workshop on the Economics of Information Security (WEIS)}, year = {2009}, url = {https://tylermoore.utulsa.edu/weis09.pdf}, presurl = {https://tylermoore.utulsa.edu/weis09pres.pdf}, puburl = {http://weis09.infosecon.net/files/152/index.html} }
@inproceedings{MooreCS09leet, author = {Moore, Tyler and Clayton, Richard and Stern, Henry}, title = {Temporal correlations between spam and phishing websites}, booktitle = {Proceedings of the 2nd USENIX conference on Large-scale exploits and emergent threats: botnets, spyware, worms, and more}, series = {LEET'09}, year = {2009}, location = {Boston, MA}, puburl = {https://www.usenix.org/conference/leet-09/temporal-correlations-between-spam-and-phishing-websites}, url = {https://tylermoore.utulsa.edu/leet09.pdf}, presurl = {https://tylermoore.utulsa.edu/leet09pres.pdf}, publisher = {USENIX Association}, address = {Berkeley, CA, USA} }
@inproceedings{MooreC09fc, author = {Tyler Moore and Richard Clayton}, title = {Evil Searching: Compromise and Recompromise of Internet Hosts for Phishing}, booktitle = {Financial Cryptography and Data Security}, year = {2009}, pages = {256-272}, puburl = {http://dx.doi.org/10.1007/978-3-642-03549-4_16}, url = {https://tylermoore.utulsa.edu/fc09.pdf}, presurl = {https://tylermoore.utulsa.edu/fc09pres.pdf}, editor = {Roger Dingledine and Philippe Golle}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {5628} }
@inproceedings{MooreC08ecrime, author = {Tyler Moore and Richard Clayton}, title = {The Consequence of Non-Cooperation in the Fight Against Phishing}, booktitle = {APWG eCrime Researchers Summit}, year = {2008}, pages = {1-14}, puburl = {http://dx.doi.org/10.1109/ECRIME.2008.4696968}, url = {https://tylermoore.utulsa.edu/ecrime08.pdf}, presurl = {https://tylermoore.utulsa.edu/ecrime08pres.pdf}, publisher = {IEEE} }
@inproceedings{AndersonBCM08isse, author = {Ross Anderson and Rainer B{\"o}hme and Richard Clayton and Tyler Moore}, title = {Security Economics and {E}uropean Policy}, booktitle = {Information Security Solutions Europe (ISSE)}, year = {2008}, pages = {57-76}, puburl = {http://dx.doi.org/10.1007/978-3-8348-9283-6_6}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, publisher = {Vieweg+Teubner} }
@inproceedings{MooreC08fc, author = {Tyler Moore and Richard Clayton}, title = {Evaluating the Wisdom of Crowds in Assessing Phishing Websites}, booktitle = {Financial Cryptography and Data Security}, year = {2008}, pages = {16-30}, puburl = {http://dx.doi.org/10.1007/978-3-540-85230-8_2}, url = {https://tylermoore.utulsa.edu/fc08.pdf}, presurl = {https://tylermoore.utulsa.edu/fc08pres.pdf}, editor = {Gene Tsudik}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {5143} }
@inproceedings{MooreC07ecrime, author = {Tyler Moore and Richard Clayton}, title = {Examining the impact of website take-down on phishing}, booktitle = {APWG eCrime Researchers Summit}, year = {2007}, pages = {1-13}, puburl = {http://doi.acm.org/10.1145/1299015.1299016}, url = {https://tylermoore.utulsa.edu/ecrime07.pdf}, presurl = {https://tylermoore.utulsa.edu/ecrime07pres.pdf}, editor = {Lorrie Faith Cranor}, publisher = {ACM}, series = {ACM International Conference Proceeding Series}, volume = {269} }
@inproceedings{MooreC07weis, author = {Tyler Moore and Richard Clayton}, title = {An Empirical Analysis of the Current State of Phishing Attack and Defence}, booktitle = {6th Annual Workshop on the Economics of Information Security (WEIS)}, year = {2007}, puburl = {http://weis2007.econinfosec.org/papers/51.pdf}, url = {https://tylermoore.utulsa.edu/weis07.pdf}, presurl = {https://tylermoore.utulsa.edu/weis07pres.pdf} }
@inproceedings{Moore06weis, author = {Tyler Moore}, title = {The Economics of Digital Forensics}, booktitle = {5th Annual Workshop on the Economics of Information Security (WEIS)}, year = {2006}, puburl = {http://weis2006.econinfosec.org/docs/14.pdf}, url = {https://tylermoore.utulsa.edu/weis06.pdf} }
@inproceedings{Moore05weis, author = {Tyler Moore}, title = {Countering Hidden-Action Attacks on Networked Systems}, booktitle = {4th Annual Workshop on the Economics of Information Security (WEIS)}, year = {2005}, puburl = {http://infosecon.net/workshop/pdf/18.pdf}, url = {https://tylermoore.utulsa.edu/weis05.pdf}, presurl = {https://tylermoore.utulsa.edu/weis05pres.pdf} }
@inproceedings{LeontiadisMC14, author = {Leontiadis, Nektarios and Moore, Tyler and Christin, Nicolas}, title = {A Nearly Four-Year Longitudinal Study of Search-Engine Poisoning}, booktitle = {Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security}, series = {CCS '14}, year = {2014}, isbn = {978-1-4503-2957-6}, location = {Scottsdale, Arizona, USA}, pages = {930--941}, numpages = {12}, url = {https://tylermoore.utulsa.edu/ccs14.pdf}, puburl = {http://doi.acm.org/10.1145/2660267.2660332}, doi = {10.1145/2660267.2660332}, acmid = {2660332}, publisher = {ACM}, address = {New York, NY, USA}, keywords = {online crime, search engines, web security} }
@inproceedings{ClaytonMC15weis, author = {Richard Clayton and Tyler Moore and Nicolas Christin}, title = {Concentrating Correctly on Cybercrime Concentration}, booktitle = {Workshop on the Economics of Information Security}, year = 2015, url = {http://www.econinfosec.org/archive/weis2015/papers/WEIS_2015_clayton.pdf}, puburl = {https://tylermoore.utulsa.edu/weis15pres.pdf} }
@inproceedings{CetinJGMV15weis, title = {Understanding the Role of Sender Reputation in Abuse Reporting and Cleanup}, author = {Orcun Cetin and Mohammad Hanif Jhaveri and Carlos Ganan and Michel van Eeten and Tyler Moore}, booktitle = {Workshop on the Economics of Information Security}, year = 2015, url = {http://www.econinfosec.org/archive/weis2015/papers/WEIS_2015_cetin.pdf} }
@inproceedings{WadleighDM15www, author = {John Wadleigh and Jake Drew and Tyler Moore}, title = {The E-Commerce Market for ``Lemons'': Identification and Analysis of Websites Selling Counterfeit Goods}, booktitle = {International World Wide Web Conference (Security and Privacy Track)}, year = {2015}, month = {May}, publisher = {ACM}, pages = {1188-1197}, url = {https://tylermoore.utulsa.edu/www15.pdf}, puburl = {http://www.www2015.it/documents/proceedings/proceedings/p1188.pdf} }
@inproceedings{MooreC15apwg, author = {Tyler Moore and Richard Clayton}, title = {Which Malware Lures Work Best? Measurements from a Large Instant Messaging Worm}, booktitle = {APWG Symposium on Electronic Crime Research}, year = 2015, publisher = {IEEE}, url = {https://tylermoore.utulsa.edu/ecrime15.pdf} }
@inproceedings{VasekM15fc, author = {Marie Vasek and Tyler Moore}, title = {There's no free lunch, even using {B}itcoin: Tracking the Popularity and Profits of Virtual Currency Scams}, booktitle = {Financial Cryptography and Data Security}, year = {2015}, volume = {8975}, editor = {B\"ohme, Rainer and Okamoto, Tatsuaki}, doi = {10.1007/978-3-662-47854-7_4}, pages = {44-61}, puburl = {http://dx.doi.org/10.1007/978-3-662-47854-7_4}, month = {January}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, url = {https://tylermoore.utulsa.edu/fc15.pdf} }
@article{PapaCM13ifip, author = {Steve Papa and William Casper and Tyler Moore}, title = {Securing wastewater facilities from accidental and intentional harm: a cost-benefit analysis}, journal = {International Journal of Critical Infrastructure Protection}, year = {2013}, volume = 6, number = 2, pages = {96-106}, url = {https://tylermoore.utulsa.edu/ijcip13.pdf}, puburl = {http://dx.doi.org/10.1016/j.ijcip.2013.05.002} }
@article{LandauM12firstmonday, author = {Susan Landau and Tyler Moore}, title = {Economic tussles in federated identity management}, journal = {First Monday}, volume = {17}, number = {10}, year = {2012}, puburl = {http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/4254}, presurl = {https://tylermoore.utulsa.edu/nist12pres.pdf} }
@article{RePEc:idt:journl:cs8102, author = {Tyler Moore and Richard Clayton}, title = {The Impact of Public Information on Phishing Attack and Defense}, journal = {Communications \& Strategies}, year = 2011, volume = {1}, number = {81}, pages = {45-68}, keywords = {security economics; online crime; phishing; transparency}, puburl = {http://ideas.repec.org/a/idt/journl/cs8102.html}, url = {https://tylermoore.utulsa.edu/cs81.pdf} }
@article{Moore10ijcip, author = {Tyler Moore}, title = {The economics of cybersecurity: Principles and policy options}, journal = {International Journal of Critical Infrastructure Protection}, volume = {3}, number = {3--4}, pages = {103 - 117}, year = {2010}, issn = {1874-5482}, doi = {10.1016/j.ijcip.2010.10.002}, puburl = {http://www.sciencedirect.com/science/article/pii/S1874548210000429}, url = {https://tylermoore.utulsa.edu/ijcip10.pdf} }
@article{BohmeM10ieeesp, author = {Rainer B{\"o}hme and Tyler Moore}, title = {The Iterated Weakest Link}, journal = {IEEE Security {\&} Privacy}, volume = {8}, number = {1}, year = {2010}, pages = {53-55}, puburl = {http://doi.ieeecomputersociety.org/10.1109/MSP.2010.51}, url = {https://tylermoore.utulsa.edu/iwl-gordon.pdf} }
@article{MoranM10ieeesp, author = {Tal Moran and Tyler Moore}, title = {The Phish-Market Protocol: Secure Sharing Between Competitors}, journal = {IEEE Security {\&} Privacy}, volume = {8}, number = {4}, year = {2010}, pages = {40-45}, puburl = {http://doi.ieeecomputersociety.org/10.1109/MSP.2010.138}, url = {https://tylermoore.utulsa.edu/sp10phishmarket.pdf} }
@article{Moore09JEP, author = {Tyler Moore and Richard Clayton and Ross Anderson}, title = {The Economics of Online Crime}, journal = {Journal of Economic Perspectives}, volume = 23, number = 3, month = {Summer}, year = 2009, pages = {3--20}, puburl = {http://www.aeaweb.org/articles.php?doi=10.1257/jep.23.3.3}, url = {https://tylermoore.utulsa.edu/jep09.pdf} }
@article{DrewMEURASIP14, author = {Jake Drew and Tyler Moore}, title = {Optimized Combined Clustering Methods for Finding Replicated Criminal Websites}, journal = {{EURASIP} Journal on Information Security}, year = 2014, volume = {2014}, number = {14}, url = {http://jis.eurasipjournals.com/content/2014/1/14/abstract} }
@article{AndersonM06science, author = {Anderson, Ross and Moore, Tyler}, title = {The Economics of Information Security}, journal = {Science}, volume = {314}, number = {5799}, pages = {610-613}, year = {2006}, doi = {10.1126/science.1130992}, puburl = {http://www.sciencemag.org/content/314/5799/610.full.pdf}, url = {https://tylermoore.utulsa.edu/science-econ.pdf} }
@article{VasekWM16tdsc, author = {Vasek, Marie and Wadleigh, John and Moore, Tyler}, title = {Hacking is not random: a case-control study of webserver-compromise risk}, journal = {IEEE Transactions on Dependable and Secure Computing}, volume = {13}, number = 2, year = 2016, pages = {206--219}, url = {https://tylermoore.utulsa.edu/tdsc15vasek.pdf}, puburl = {http://dx.doi.org/10.1109/TDSC.2015.2427847} }
@article{RiekBM16tdsc, author = {Riek, Markus and B\"ohme, Rainer and Moore, Tyler}, title = {Measuring the Influence of Perceived Cybercrime Risk on Online Service Avoidance}, journal = {IEEE Transactions on Dependable and Secure Computing}, volume = {13}, number = 2, year = 2016, pages = {261--273}, url = {https://tylermoore.utulsa.edu/tdsc15riek.pdf}, puburl = {http://dx.doi.org/10.1109/TDSC.2015.2410795} }
@article{BoehmeCEM15jep, author = {B\"ohme, Rainer and Christin, Nicolas and Edelman, Benjamin and Moore, Tyler}, title = {Bitcoin: Economics, Technology, and Governance}, journal = {Journal of Economic Perspectives}, volume = {29}, number = {2}, year = {2015}, pages = {213-38}, doi = {10.1257/jep.29.2.213}, puburl = {http://www.aeaweb.org/articles.php?doi=10.1257/jep.29.2.213} }
@inproceedings{HayashiMS15kcpay, title = {The Economics of Retail Payments Security}, author = {Fumiko Hayashi Tyler Moore and Richard J. Sullivan}, booktitle = {Fifth International Payments Policy Conference: The Puzzle of Payments Security, Federal Reserve Bank of Kansas City}, year = 2015, url = {https://tylermoore.utulsa.edu/kcpay15.pdf}, presurl = {https://tylermoore.utulsa.edu/kcpay-econ.pdf} }
@incollection{MooreA12oxford, author = {Tyler Moore and Ross Anderson}, title = {Internet Security}, editor = {Martin Peitz and Joel Waldfogel}, booktitle = {The Oxford Handbook of the Digital Economy}, pages = {572-599}, year = 2012, publisher = {Oxford University Press}, puburl = {http://www.oxfordhandbooks.com/10.1093/oxfordhb/9780195397840.001.0001/oxfordhb-9780195397840-e-21}, url = {https://tylermoore.utulsa.edu/oxford12.pdf} }
@incollection{Moore10nas, author = {Tyler Moore}, title = {The economics of cybersecurity: Principles and policy options}, booktitle = {Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy}, isbn = {9780309160353}, puburl = {http://books.nap.edu/openbook.php?record_id=12997&page=3}, year = {2010}, pages = {3--23}, publisher = {The National Academies Press} }
@incollection{AndersonMNO07, author = {Ross Anderson and Tyler Moore and Shishir Nagaraja and Andy Ozment}, title = {Incentives and Information Security}, editor = {Nisan, Noam and Roughgarden, Tim and Tardos, Eva and Vazirani, Vijay V.}, pages = {633-649}, booktitle = {Algorithmic Game Theory}, year = {2007}, isbn = {0521872820}, publisher = {Cambridge University Press}, address = {New York, NY, USA} }
@article{BohmeM16JIS, author = {Rainer B{\"o}hme and Tyler Moore}, title = {The ``Iterated Weakest Link'' Model of Adaptive Security Investment}, journal = {Journal of Information Security}, volume = 7, number = 2, pages = {81--102}, year = {2016}, puburl = {http://dx.doi.org/10.4236/jis.2016.72006}, url = {https://tylermoore.utulsa.edu/jis16.pdf} }
@inproceedings{MooreDC16weis, author = {Tyler Moore and Scott Dynes and Frederick Chang}, title = {Identifying how firms manage cybersecurity investment}, booktitle = {15th Workshop on the Economics of Information Security (WEIS)}, year = 2016, url = {https://tylermoore.utulsa.edu/weis16ciso.pdf}, presurl = {https://tylermoore.utulsa.edu/weis16cisopres.pdf} }
@inproceedings{FederGHM16weis, author = {Amir Feder and Neil Gandal and JT Hamrick and Tyler Moore}, title = {The Impact of {DDoS} and Other Security Shocks on {Bitcoin} Currency Exchanges: Evidence from {Mt. Gox}}, booktitle = {15th Workshop on the Economics of Information Security (WEIS)}, year = 2016, url = {https://tylermoore.utulsa.edu/weis16gox.pdf}, presurl = {https://tylermoore.utulsa.edu/weis16goxpres.pdf} }
@inproceedings{VasekWM16wiscs, author = {Marie Vasek and Matthew Weeden and Tyler Moore}, title = {Measuring the Impact of Sharing Abuse Data with Web Hosting Providers}, booktitle = {ACM Workshop on Information Sharing and Collaborative Security}, year = 2016, pages = {71--80}, publisher = {{ACM}}, url = {https://tylermoore.utulsa.edu/wiscs16.pdf}, puburl = {http://dl.acm.org/citation.cfm?id=2994548}, presurl = {https://tylermoore.utulsa.edu/vasekwiscs16pres.pdf} }
@article{CetinJGVM2016jcs, title = {Understanding the role of sender reputation in abuse reporting and cleanup}, author = {Cetin, Orcun and Jhaveri, Mohammad Hanif and Ga{\~n}{\'a}n, Carlos and van Eeten, Michel and Moore, Tyler}, journal = {Journal of Cybersecurity}, volume = {2}, number = {1}, pages = {83--98}, year = {2016}, publisher = {Oxford University Press}, puburl = {https://cybersecurity.oxfordjournals.org/content/2/1/83} }
@article{JhaveriCGMV16csur, title = {Abuse Reporting and the Fight Against Cybercrime}, author = {Jhaveri, Mohammad Hanif and Cetin, Orcun and Ga{\~n}{\'a}n, Carlos and Moore, Tyler and Eeten, Michel Van}, journal = {ACM Computing Surveys (CSUR)}, volume = {49}, number = {4}, pages = {68}, year = {2017}, publisher = {ACM}, puburl = {http://dl.acm.org/citation.cfm?id=3003147}, url = {https://tylermoore.utulsa.edu/csur17.pdf} }
@article{Drew2017jis, author = {Jake Drew and Michael Hahsler and Tyler Moore}, title = {Polymorphic malware detection using sequence classification methods and ensembles}, journal = {EURASIP Journal on Information Security}, year = {2017}, volume = {2017}, number = {1}, pages = {2}, issn = {1687-417X}, puburl = {http://dx.doi.org/10.1186/s13635-017-0055-6} }
@article{Rovner17jogss, author = {Rovner, Joshua and Moore, Tyler}, title = {Does the Internet Need a Hegemon?}, journal = {Journal of Global Security Studies}, volume = {2}, number = {3}, pages = {184-203}, year = {2017}, doi = {10.1093/jogss/ogx008}, url = {http://dx.doi.org/10.1093/jogss/ogx008} }
@article{Gandal17jme, author = {Neil Gandal and JT Hamrick and Tyler Moore and Tali Obermann}, title = {Price Manipulation in the {Bitcoin} Ecosystem}, journal = {Journal of Monetary Economics}, volume = {95}, month = {May}, pages = {86--96}, year = 2018, doi = {10.1016/j.jmoneco.2017.12.004}, url = {https://tylermoore.utulsa.edu/jme17.pdf}, appendix = {https://tylermoore.utulsa.edu/jme17appendix.pdf}, publisher = {Elsevier} }
@article{Moore18toit, author = {Moore, Tyler and Christin, Nicolas and Szurdi, Janos}, title = {Revisiting the Risks of Bitcoin Currency Exchange Closure}, journal = {ACM Transactions on Internet Technology}, issue_date = {November 2018}, volume = {18}, number = {4}, month = sep, year = {2018}, issn = {1533-5399}, pages = {50:1--50:18}, articleno = {50}, numpages = {18}, url = {https://tylermoore.utulsa.edu/toit17.pdf}, puburl = {http://doi.acm.org/10.1145/3155808}, doi = {10.1145/3155808}, acmid = {3155808}, publisher = {ACM}, address = {New York, NY, USA}, keywords = {Bitcoin, currency exchanges, cybercrime, security economics} }
@inproceedings{Cats17ccs, title = {Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting}, author = {Samaneh Tajalizadehkhoob and Tom van Goethem and Maciej Korczy\'nski and Arman Noroozian and Rainer B\"ohme and Tyler Moore and Wouter Joosen and Michel van Eeten}, booktitle = {ACM SIGSAC Conference on Computer and Communications Security}, series = {CCS '17}, year = {2017}, location = {Dallas, Texas, USA}, publisher = {ACM}, url = {https://tylermoore.utulsa.edu/ccs17.pdf} }
@inproceedings{SpringMP17nspw, title = {Practicing a Science of Security: A Philosophy of Science Perspective}, booktitle = {New Security Paradigms Workshop (NSPW)}, author = {Jonathan M. Spring and Tyler Moore and David Pym}, year = {2017}, location = {Santa Cruz, California, USA}, publisher = {ACM}, url = {https://tylermoore.utulsa.edu/nspw17.pdf} }
@inproceedings{VasekM18bitcoin, title = {Analyzing the {Bitcoin} {Ponzi} Scheme Ecosystem}, author = {Marie Vasek and Tyler Moore}, booktitle = {Fifth Workshop on Bitcoin and Blockchain Research}, year = 2018, publisher = {Springer}, series = {Lecture Notes in Computer Science} }
@inproceedings{ZhengRCTM18cset, author = {Muwei Zheng and Hannah Robbins and Zimo Chai and Prakash Thapa and Tyler Moore}, title = {Cybersecurity Research Datasets: Taxonomy and Empirical Analysis}, booktitle = {11th {USENIX} Workshop on Cyber Security Experimentation and Test ({CSET} 18)}, year = {2018}, address = {Baltimore, MD}, puburl = {https://www.usenix.org/conference/cset18/presentation/zheng}, url = {https://tylermoore.utulsa.edu/cset18.pdf}, dataurl = {https://dx.doi.org/10.7910/DVN/4EPUIA}, presurl = {https://tylermoore.utulsa.edu/cset18pres.pdf}, publisher = {{USENIX} Association} }
@inproceedings{FederGHMV17weis, author = {Amir Feder and Neil Gandal and {JT} Hamrick and Tyler Moore and Marie Vasek}, title = {The rise and fall of cryptocurrencies}, booktitle = {17th Workshop on the Economics of Information Security (WEIS)}, year = 2018, url = {https://tylermoore.utulsa.edu/weis18.pdf}, presurl = {https://tylermoore.utulsa.edu/weis18pres.pdf} }
@inproceedings{WoodsMSWEIS19, author = {Daniel W. Woods and Tyler Moore and Andrew C. Simpson}, title = {The County Fair Cyber Loss Distribution: Drawing Inferences from Insurance Prices}, booktitle = {18th Workshop on the Economics of Information Security (WEIS)}, url = {https://tylermoore.utulsa.edu/weis19loss.pdf}, year = 2019 }
@inproceedings{HamrickWEIS19, author = {{JT} Hamrick and Farhang Rouhi and Arghya Mukherjee and Amir Feder and Neil Gandal and Tyler Moore and Marie Vasek and Neil Gandal and Marie Vasek}, title = {The economics of cryptocurrency pump and dump schemes}, booktitle = {18th Workshop on the Economics of Information Security (WEIS)}, url = {https://tylermoore.utulsa.edu/weis19pump.pdf}, year = 2019 }
@inproceedings{MooreKCTWEIS19, author = {Tyler Moore and Erin Kenneally and Michael Collett and Prakash Thapa}, title = {Valuing cybersecurity research datasets}, booktitle = {18th Workshop on the Economics of Information Security (WEIS)}, year = 2019, url = {https://tylermoore.utulsa.edu/weis19data.pdf}, presurl = {https://tylermoore.utulsa.edu/weis19datapres.pdf} }
@inproceedings{AndersonWEIS19, author = {Ross Anderson and Chris Barton and Rainer B\"ohme and Richard Clayton and Carlos Ganan and Tom Grasso and Michael Levi and Tyler Moore and Stefan Savage and Marie Vasek}, title = {Measuring the Changing Cost of Cybercrime}, booktitle = {18th Workshop on the Economics of Information Security (WEIS)}, url = {https://tylermoore.utulsa.edu/weis19cost.pdf}, year = 2019 }
@article{WoodsM20ieeesp, author = {Daniel W. Woods and Tyler Moore}, title = {Does insurance have a future in governing cybersecurity?}, journal = {IEEE Security {\&} Privacy}, volume = {18}, number = {1}, year = {2020}, url = {https://tylermoore.utulsa.edu/govins20.pdf} }
This file was generated by bibtex2html 1.99.