[1] | Marie Vasek and Tyler Moore. Analyzing the Bitcoin Ponzi scheme ecosystem. In Fifth Workshop on Bitcoin and Blockchain Research, Lecture Notes in Computer Science. Springer, 2018. [ bib ] |
[2] | Muwei Zheng, Hannah Robbins, Zimo Chai, Prakash Thapa, and Tyler Moore. Cybersecurity research datasets: Taxonomy and empirical analysis. In 11th USENIX Workshop on Cyber Security Experimentation and Test (CSET 18), Baltimore, MD, 2018. USENIX Association. [ bib | data | paper | publisher | presentation ] |
[3] | Amir Feder, Neil Gandal, JT Hamrick, Tyler Moore, and Marie Vasek. The rise and fall of cryptocurrencies. In 17th Workshop on the Economics of Information Security (WEIS), 2018. [ bib | paper | presentation ] |
[4] | Neil Gandal, JT Hamrick, Tyler Moore, and Tali Oberman. Price manipulation in the Bitcoin ecosystem. In 16th Workshop on the Economics of Information Security (WEIS), 2017. [ bib | paper | presentation ] |
[5] | Samaneh Tajalizadehkhoob, Tom van Goethem, Maciej Korczyński, Arman Noroozian, Rainer Böhme, Tyler Moore, Wouter Joosen, and Michel van Eeten. Herding vulnerable cats: A statistical approach to disentangle joint responsibility for web security in shared hosting. In ACM SIGSAC Conference on Computer and Communications Security, CCS '17. ACM, 2017. [ bib | paper ] |
[6] | Jonathan M. Spring, Tyler Moore, and David Pym. Practicing a science of security: A philosophy of science perspective. In New Security Paradigms Workshop (NSPW). ACM, 2017. [ bib | paper ] |
[7] | Jake Drew, Michael Hahsler, and Tyler Moore. Polymorphic malware detection using sequence classification methods. In Workshop on Bio-inspired Security, Trust, Assurance and Resilience (BioStar), IEEE Security and Privacy Workshops (SPW), pages 81--87. IEEE, May 2016. [ bib | DOI | paper ] |
[8] | Marie Vasek, Joseph Bonneau, Ryan Castellucci, Cameron Keith, and Tyler Moore. The Bitcoin brain drain: Examining the use and abuse of Bitcoin brain wallets. In Jens Grossklags and Bart Preneel, editors, Financial Cryptography and Data Security, volume 9603 of Lecture Notes in Computer Science, pages 609--618. Springer, 2016. [ bib | paper | publisher | presentation ] |
[9] | Tyler Moore, Scott Dynes, and Frederick Chang. Identifying how firms manage cybersecurity investment. In 15th Workshop on the Economics of Information Security (WEIS), 2016. [ bib | paper | presentation ] |
[10] | Amir Feder, Neil Gandal, JT Hamrick, and Tyler Moore. The impact of DDoS and other security shocks on Bitcoin currency exchanges: Evidence from Mt. Gox. In 15th Workshop on the Economics of Information Security (WEIS), 2016. [ bib | paper | presentation ] |
[11] | Marie Vasek, Matthew Weeden, and Tyler Moore. Measuring the impact of sharing abuse data with web hosting providers. In ACM Workshop on Information Sharing and Collaborative Security, pages 71--80. ACM, 2016. [ bib | paper | publisher | presentation ] |
[12] | John Wadleigh, Jake Drew, and Tyler Moore. The e-commerce market for “lemons”: Identification and analysis of websites selling counterfeit goods. In International World Wide Web Conference (Security and Privacy Track), pages 1188--1197. ACM, May 2015. [ bib | paper | publisher ] |
[13] | Richard Clayton, Tyler Moore, and Nicolas Christin. Concentrating correctly on cybercrime concentration. In 14th Workshop on the Economics of Information Security, 2015. [ bib | paper | publisher ] |
[14] | Orcun Cetin, Mohammad Hanif Jhaveri, Carlos Ganan, Michel van Eeten, and Tyler Moore. Understanding the role of sender reputation in abuse reporting and cleanup. In 14th Workshop on the Economics of Information Security, 2015. [ bib | paper ] |
[15] | Tyler Moore and Richard Clayton. Which malware lures work best? measurements from a large instant messaging worm. In APWG Symposium on Electronic Crime Research (eCrime), pages 69--78. IEEE, 2015. [ bib | DOI | paper ] |
[16] | Marie Vasek and Tyler Moore. There's no free lunch, even using Bitcoin: Tracking the popularity and profits of virtual currency scams. In Rainer Böhme and Tatsuaki Okamoto, editors, Financial Cryptography and Data Security, volume 8975 of Lecture Notes in Computer Science, pages 44--61. Springer, January 2015. [ bib | DOI | paper | publisher | presentation ] |
[17] | Marie Vasek, Micah Thornton, and Tyler Moore. Empirical analysis of denial-of-service attacks in the Bitcoin ecosystem. In 1st Workshop on Bitcoin Research, volume 8438 of Lecture Notes in Computer Science, pages 57--71. Springer, March 2014. [ bib | data | paper | publisher | presentation ] |
[18] | Benjamin Johnson, Aron Laszka, Jens Grossklags, Marie Vasek, and Tyler Moore. Game-theoretic analysis of DDoS attacks against Bitcoin mining pools. In 1st Workshop on Bitcoin Research, volume 8438 of Lecture Notes in Computer Science, pages 72--86. Springer, March 2014. [ bib | paper | publisher ] |
[19] | Tyler Moore and Richard Clayton. The ghosts of banking past: Empirical analysis of closed bank websites. In Financial Cryptography and Data Security, volume 8437 of Lecture Notes in Computer Science, pages 33--48. Springer, March 2014. [ bib | data | paper | publisher | presentation ] |
[20] | Marie Vasek and Tyler Moore. Identifying risk factors for webserver compromise. In Financial Cryptography and Data Security, volume 8437 of Lecture Notes in Computer Science, pages 326--345. Springer, March 2014. [ bib | data | paper | publisher | presentation ] |
[21] | Markus Riek, Rainer Böhme, and Tyler Moore. Understanding the influence of cybercrime risk on the e-service adoption of European Internet users. In 13th Workshop on the Economics of Information Security (WEIS), 2014. [ bib | paper ] |
[22] | Jake Drew and Tyler Moore. Automatic identification of replicated criminal websites using combined clustering. In International Workshop on Cyber Crime (IWCC), IEEE Security and Privacy Workshops. IEEE, 2014. [ bib | paper ] |
[23] | Nektarios Leontiadis, Tyler Moore, and Nicolas Christin. A nearly four-year longitudinal study of search-engine poisoning. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, pages 930--941. ACM, 2014. [ bib | DOI | paper | publisher ] |
[24] | Marie Vasek and Tyler Moore. Empirical analysis of factors affecting malware URL detection. In 8th APWG eCrime Researchers Summit (eCrime), September 2013. [ bib | paper | presentation ] |
[25] | Nektarios Leontiadis, Tyler Moore, and Nicolas Christin. Pick your poison: Pricing and inventories at unlicensed online pharmacies. In ACM Conference on Electronic Commerce (EC), pages 621--638. ACM, June 2013. [ bib | paper | publisher ] |
[26] | Tyler Moore and Nicolas Christin. Beware the middleman: Empirical analysis of Bitcoin-exchange risk. In Financial Cryptography and Data Security, volume 7859 of Lecture Notes in Computer Science, pages 25--33. Springer, April 2013. [ bib | data | paper | publisher | presentation ] |
[27] | Tyler Moore and Richard Clayton. Discovering phishing dropboxes using email metadata. In 7th APWG eCrime Researchers Summit (eCrime), October 2012. [ bib | paper | presentation ] |
[28] | Rainer Böhme and Tyler Moore. How do consumers react to cybercrime? In APWG eCrime Researchers Summit (eCrime), October 2012. [ bib | paper | presentation ] |
[29] | Benjamin Edwards, Tyler Moore, George Stelle, Steven A. Hofmeyr, and Stephanie Forrest. Beyond the blacklist: Modeling malware spread and the effect of interventions. In Proceedings of the New Security Paradigms Workshop, Bertinoro, Italy, September 19-21, 2012. ACM, 2012. [ bib | paper ] |
[30] | Marie Vasek and Tyler Moore. Do malware reports expedite cleanup? An experimental study. In Proceedings of the 5th USENIX Workshop on Cyber Security Experimentation and Test, CSET'12, Berkeley, CA, USA, 2012. USENIX Association. [ bib | data | paper | publisher | presentation ] |
[31] | Ross Anderson, Chris Barton, Rainer Böhme, Richard Clayton, Michael van Eeten, Michael Levi, Tyler Moore, and Stefan Savage. Measuring the cost of cybercrime. In 11th Workshop on the Economics of Information Security (WEIS), 2012. [ bib | paper | presentation ] |
[32] | Tyler Moore, Jie Han, and Richard Clayton. The postmodern Ponzi scheme: Empirical analysis of high-yield investment programs. In Angelos D. Keromytis, editor, Financial Cryptography and Data Security, volume 7397 of Lecture Notes in Computer Science, pages 41--56. Springer, 2012. [ bib | paper | publisher | presentation ] |
[33] | Tyler Moore, Nektarios Leontiadis, and Nicolas Christin. Fashion crimes: trending-term exploitation on the web. In Yan Chen, George Danezis, and Vitaly Shmatikov, editors, ACM Conference on Computer and Communications Security (CCS), pages 455--466. ACM, 2011. [ bib | paper | publisher | presentation ] |
[34] | Nektarios Leontiadis, Tyler Moore, and Nicolas Christin. Measuring and analyzing search-redirection attacks in the illicit online prescription drug trade. In USENIX Security Symposium. USENIX Association, 2011. [ bib | paper | publisher ] |
[35] | Steven A. Hofmeyr, Tyler Moore, Stephanie Forrest, Benjamin Edwards, and George Stelle. Modeling internet-scale policies for cleaning up malware. In 10th Workshop on the Economics of Information Security (WEIS), 2011. [ bib | paper | publisher ] |
[36] | Susan Landau and Tyler Moore. Economic tussles in federated identity management. In 10th Workshop on the Economics of Information Security (WEIS), 2011. [ bib | publisher | presentation ] |
[37] | Tyler Moore and Richard Clayton. Ethical dilemmas in take-down research. In George Danezis, Sven Dietrich, and Kazue Sako, editors, Workshop on the Ethics of Computer Security Research (Financial Cryptography Workshops), volume 7126 of Lecture Notes in Computer Science, pages 154--168. Springer, 2011. [ bib | paper | publisher | presentation ] |
[38] | Tyler Moore, Allan Friedman, and Ariel D. Procaccia. Would a 'cyber warrior' protect us: exploring trade-offs between attack and defense of information systems. In Angelos D. Keromytis, Sean Peisert, Richard Ford, and Carrie Gates, editors, New Security Paradigms Workshop (NSPW), pages 85--94. ACM, 2010. [ bib | paper | publisher ] |
[39] | Tal Moran and Tyler Moore. The phish-market protocol: Securely sharing attack data between competitors. In Radu Sion, editor, Financial Cryptography and Data Security, volume 6052 of Lecture Notes in Computer Science, pages 222--237. Springer, 2010. [ bib | paper | publisher | presentation ] |
[40] | Tyler Moore and Benjamin Edelman. Measuring the perpetrators and funders of typosquatting. In Radu Sion, editor, Financial Cryptography and Data Security, volume 6052 of Lecture Notes in Computer Science, pages 175--191. Springer, 2010. [ bib | data | paper | publisher | presentation ] |
[41] | Rainer Böhme and Tyler Moore. The iterated weakest link - a model of adaptive security investment. In 8th Workshop on the Economics of Information Security (WEIS), 2009. [ bib | paper | publisher | presentation ] |
[42] | Tyler Moore, Richard Clayton, and Henry Stern. Temporal correlations between spam and phishing websites. In Proceedings of the 2nd USENIX conference on Large-scale exploits and emergent threats: botnets, spyware, worms, and more, LEET'09, Berkeley, CA, USA, 2009. USENIX Association. [ bib | paper | publisher | presentation ] |
[43] | Tyler Moore and Richard Clayton. Evil searching: Compromise and recompromise of internet hosts for phishing. In Roger Dingledine and Philippe Golle, editors, Financial Cryptography and Data Security, volume 5628 of Lecture Notes in Computer Science, pages 256--272. Springer, 2009. [ bib | paper | publisher | presentation ] |
[44] | Tyler Moore, Maxim Raya, Jolyon Clulow, Panagiotis Papadimitratos, Ross Anderson, and Jean-Pierre Hubaux. Fast exclusion of errant devices from vehicular networks. In Proceedings of the Fifth Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), pages 135--143, 2008. [ bib | paper | publisher ] |
[45] | Tyler Moore and Richard Clayton. The consequence of non-cooperation in the fight against phishing. In APWG eCrime Researchers Summit, pages 1--14. IEEE, 2008. [ bib | paper | publisher | presentation ] |
[46] | Tyler Moore and Richard Clayton. Evaluating the wisdom of crowds in assessing phishing websites. In Gene Tsudik, editor, Financial Cryptography and Data Security, volume 5143 of Lecture Notes in Computer Science, pages 16--30. Springer, 2008. [ bib | paper | publisher | presentation ] |
[47] | Tyler Moore, Jolyon Clulow, Shishir Nagaraja, and Ross Anderson. New strategies for revocation in ad-hoc networks. In Frank Stajano, Catherine Meadows, Srdjan Capkun, and Tyler Moore, editors, 4th European Workshop on Security and Privacy in Ad-hoc and Sensor Networks (ESAS), volume 4572 of Lecture Notes in Computer Science, pages 232--246. Springer, 2007. [ bib | paper | publisher | presentation ] |
[48] | Tyler Moore and Jolyon Clulow. Secure path-key revocation for symmetric key pre-distribution schemes in sensor networks. In Hein S. Venter, Mariki M. Eloff, Les Labuschagne, Jan H. P. Eloff, and Rossouw von Solms, editors, Proceedings of the IFIP TC-11 22nd International Information Security Conference (IFIP SEC), volume 232 of IFIP, pages 157--168. Springer, 2007. [ bib | paper | publisher | presentation ] |
[49] | Tyler Moore and Richard Clayton. Examining the impact of website take-down on phishing. In Lorrie Faith Cranor, editor, APWG eCrime Researchers Summit, volume 269 of ACM International Conference Proceeding Series, pages 1--13. ACM, 2007. [ bib | paper | publisher | presentation ] |
[50] | Tyler Moore and Richard Clayton. An empirical analysis of the current state of phishing attack and defence. In 6th Workshop on the Economics of Information Security (WEIS), 2007. [ bib | paper | publisher | presentation ] |
[51] | Jolyon Clulow, Gerhard P. Hancke, Markus G. Kuhn, and Tyler Moore. So near and yet so far: Distance-bounding attacks in wireless networks. In Levente Buttyán, Virgil D. Gligor, and Dirk Westhoff, editors, 3rd European Workshop on Security and Privacy in Ad-hoc and Sensor Networks (ESAS), volume 4357 of Lecture Notes in Computer Science, pages 83--97. Springer, 2006. [ bib | paper | publisher | presentation ] |
[52] | Tyler Moore. A collusion attack on pairwise key predistribution schemes for distributed sensor networks. In 4th IEEE Conference on Pervasive Computing and Communications Security (PerSec), pages 251--255. IEEE Computer Society, 2006. [ bib | paper | publisher | presentation ] |
[53] | Tyler Moore. The economics of digital forensics. In 5th Workshop on the Economics of Information Security (WEIS), 2006. [ bib | paper | publisher ] |
[54] | Tyler Moore. Countering hidden-action attacks on networked systems. In 4th Workshop on the Economics of Information Security (WEIS), 2005. [ bib | paper | publisher | presentation ] |
[55] | Gary Lorenz, Tyler Moore, Gavin Manes, John Hale, and Sujeet Shenoi. Securing SS7 telecommunications networks. In Second IEEE Systems, Man and Cybernetics Information Assurance Workshop, June 2001. [ bib ] |
This file was generated by bibtex2html 1.98.