@inproceedings{MooreRCPAH08secon, author = {Tyler Moore and Maxim Raya and Jolyon Clulow and Panagiotis Papadimitratos and Ross Anderson and Jean-Pierre Hubaux}, title = {Fast Exclusion of Errant Devices from Vehicular Networks}, booktitle = {Proceedings of the Fifth Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON)}, year = {2008}, pages = {135-143}, puburl = {http://dx.doi.org/10.1109/SAHCN.2008.26}, url = {https://tylermoore.utulsa.edu/secon08.pdf} }
@inproceedings{MooreCNA07esas, author = {Tyler Moore and Jolyon Clulow and Shishir Nagaraja and Ross Anderson}, title = {New Strategies for Revocation in Ad-Hoc Networks}, booktitle = {4th European Workshop on Security and Privacy in Ad-hoc and Sensor Networks (ESAS)}, year = {2007}, pages = {232-246}, puburl = {http://dx.doi.org/10.1007/978-3-540-73275-4_17}, url = {https://tylermoore.utulsa.edu/esas07.pdf}, presurl = {https://tylermoore.utulsa.edu/esas07-pres.pdf}, editor = {Frank Stajano and Catherine Meadows and Srdjan Capkun and Tyler Moore}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {4572} }
@inproceedings{MooreC07sec, author = {Tyler Moore and Jolyon Clulow}, title = {Secure Path-Key Revocation for Symmetric Key Pre-distribution Schemes in Sensor Networks}, booktitle = {Proceedings of the IFIP TC-11 22nd International Information Security Conference (IFIP SEC)}, year = {2007}, pages = {157-168}, puburl = {http://dx.doi.org/10.1007/978-0-387-72367-9_14}, url = {https://tylermoore.utulsa.edu/ifipsec2007-path.pdf}, presurl = {https://tylermoore.utulsa.edu/ifipsec-pres.pdf}, editor = {Hein S. Venter and Mariki M. Eloff and Les Labuschagne and Jan H. P. Eloff and Rossouw von Solms}, publisher = {Springer}, series = {IFIP}, volume = {232} }
@inproceedings{ClulowHKM06esas, author = {Jolyon Clulow and Gerhard P. Hancke and Markus G. Kuhn and Tyler Moore}, booktitle = {3rd European Workshop on Security and Privacy in Ad-hoc and Sensor Networks (ESAS)}, title = {So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks}, year = {2006}, pages = {83-97}, puburl = {http://dx.doi.org/10.1007/11964254_9}, url = {https://tylermoore.utulsa.edu/esas2006-distance.pdf}, presurl = {https://tylermoore.utulsa.edu/esas-pres.pdf}, editor = {Levente Butty{\'a}n and Virgil D. Gligor and Dirk Westhoff}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {4357} }
@inproceedings{Moore06percom, author = {Tyler Moore}, title = {A Collusion Attack on Pairwise Key Predistribution Schemes for Distributed Sensor Networks}, booktitle = {4th IEEE Conference on Pervasive Computing and Communications Security (PerSec)}, year = {2006}, pages = {251-255}, puburl = {http://doi.ieeecomputersociety.org/10.1109/PERCOMW.2006.3}, url = {https://tylermoore.utulsa.edu/persec06-moore.pdf}, presurl = {https://tylermoore.utulsa.edu/persec06-moore-pres.pdf}, publisher = {IEEE Computer Society} }
@inproceedings{RiekBM14weis, author = {Markus Riek and Rainer B{\"o}hme and Tyler Moore}, title = {Understanding the Influence of Cybercrime Risk on the E-Service Adoption of {E}uropean {I}nternet Users}, booktitle = {13th Workshop on the Economics of Information Security (WEIS)}, year = {2014}, url = {https://tylermoore.utulsa.edu/weis14.pdf} }
@inproceedings{DrewM14iwcc, author = {Jake Drew and Tyler Moore}, title = {Automatic Identification of Replicated Criminal Websites Using Combined Clustering}, booktitle = {International Workshop on Cyber Crime (IWCC), IEEE Security and Privacy Workshops}, year = {2014}, publisher = {IEEE}, url = {https://tylermoore.utulsa.edu/iwcc14.pdf} }
@inproceedings{VasekTM14bitcoin, author = {Marie Vasek and Micah Thornton and Tyler Moore}, title = {Empirical Analysis of Denial-of-Service Attacks in the {B}itcoin Ecosystem}, booktitle = {1st Workshop on Bitcoin Research}, year = {2014}, month = {March}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {8438}, pages = {57--71}, dataurl = {https://dx.doi.org/10.7910/DVN/25541}, url = {https://tylermoore.utulsa.edu/bitcoin14ddos.pdf}, puburl = {https://dx.doi.org/10.1007/978-3-662-44774-1_5}, presurl = {http://secon.utulsa.edu/vasek/thorntonbtc14pres.pdf} }
@inproceedings{JohnsonLGVM14bitcoin, author = {Benjamin Johnson and Aron Laszka and Jens Grossklags and Marie Vasek and Tyler Moore}, title = {Game-Theoretic Analysis of {DDoS} Attacks Against {B}itcoin Mining Pools}, booktitle = {1st Workshop on Bitcoin Research}, year = {2014}, month = {March}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {8438}, pages = {72--86}, url = {https://tylermoore.utulsa.edu/bitcoin14gt.pdf}, puburl = {https://dx.doi.org/10.1007/978-3-662-44774-1_6} }
@inproceedings{MooreC14fc, author = {Tyler Moore and Richard Clayton}, title = {The Ghosts of Banking Past: {E}mpirical Analysis of Closed Bank Websites}, booktitle = {Financial Cryptography and Data Security}, year = {2014}, month = {March}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {8437}, dataurl = {https://dx.doi.org/10.7910/DVN/26011}, url = {https://tylermoore.utulsa.edu/fc14ghosts.pdf}, presurl = {https://tylermoore.utulsa.edu/fc14banks-pres.pdf}, puburl = {https://dx.doi.org/10.1007/978-3-662-45472-5_3}, pages = {33--48} }
@inproceedings{VasekM14fc, author = {Marie Vasek and Tyler Moore}, title = {Identifying Risk Factors for Webserver Compromise}, booktitle = {Financial Cryptography and Data Security}, year = {2014}, month = {March}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {8437}, dataurl = {https://dx.doi.org/10.7910/DVN/25608}, url = {https://tylermoore.utulsa.edu/fc14rf.pdf}, puburl = {https://dx.doi.org/10.1007/978-3-662-45472-5_22}, pages = {326--345}, presurl = {http://secon.utulsa.edu/vasek/vasekfc14pres.pdf} }
@inproceedings{VasekM13ecrime, author = {Marie Vasek and Tyler Moore}, title = {Empirical Analysis of Factors Affecting Malware {URL} Detection}, booktitle = {8th APWG eCrime Researchers Summit (eCrime)}, year = {2013}, month = {September}, url = {https://tylermoore.utulsa.edu/ecrime13.pdf}, presurl = {http://secon.utulsa.edu/vasek/vasekecrime13pres.pdf} }
@inproceedings{LeontiadisMC13ec, author = {Nektarios Leontiadis and Tyler Moore and Nicolas Christin}, title = {Pick Your Poison: {P}ricing and Inventories at Unlicensed Online Pharmacies}, booktitle = {ACM Conference on Electronic Commerce (EC)}, url = {https://tylermoore.utulsa.edu/ec13.pdf}, puburl = {http://dl.acm.org/citation.cfm?id=2482610‎}, publisher = {ACM}, year = {2013}, month = {June}, pages = {621-638} }
@inproceedings{MooreC13fc, author = {Tyler Moore and Nicolas Christin}, title = {Beware the Middleman: Empirical Analysis of {B}itcoin-Exchange Risk}, booktitle = {Financial Cryptography and Data Security}, year = {2013}, month = {April}, url = {https://tylermoore.utulsa.edu/fc13.pdf}, presurl = {https://tylermoore.utulsa.edu/fc13pres.pdf}, puburl = {https://dx.doi.org/10.1007/978-3-642-39884-1_3}, dataurl = {https://dx.doi.org/10.7910/DVN/25545}, pages = {25-33}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {7859} }
@inproceedings{MooreC12ecrime, author = {Tyler Moore and Richard Clayton}, title = {Discovering Phishing Dropboxes Using Email Metadata}, booktitle = {7th APWG eCrime Researchers Summit (eCrime)}, year = {2012}, month = {October}, pages = {}, url = {https://tylermoore.utulsa.edu/ecrime12dropbox.pdf}, presurl = {https://tylermoore.utulsa.edu/ecrime12dropboxpres.pdf} }
@inproceedings{BoehmeM12ecrime, author = {Rainer B{\"o}hme and Tyler Moore}, title = {How Do Consumers React to Cybercrime?}, booktitle = {APWG eCrime Researchers Summit (eCrime)}, year = {2012}, month = {October}, pages = {}, url = {https://tylermoore.utulsa.edu/ecrime12eurobar.pdf}, presurl = {https://tylermoore.utulsa.edu/ecrime12eurobarpres.pdf} }
@inproceedings{EdwardsMSHF12nspw, author = {Benjamin Edwards and Tyler Moore and George Stelle and Steven A. Hofmeyr and Stephanie Forrest}, title = {Beyond the Blacklist: Modeling Malware Spread and the Effect of Interventions}, booktitle = {Proceedings of the New Security Paradigms Workshop, Bertinoro, Italy, September 19-21, 2012}, year = {2012}, publisher = {ACM}, url = {https://tylermoore.utulsa.edu/nspw12.pdf} }
@inproceedings{VasekM12cset, author = {Vasek, Marie and Moore, Tyler}, title = {Do malware reports expedite cleanup? {A}n experimental study}, booktitle = {Proceedings of the 5th USENIX Workshop on Cyber Security Experimentation and Test}, series = {CSET'12}, year = {2012}, location = {Bellevue, WA}, puburl = {https://www.usenix.org/system/files/conference/cset12/cset12-final20.pdf}, url = {https://tylermoore.utulsa.edu/cset12.pdf}, presurl = {https://www.usenix.org/sites/default/files/conference/protected-files/vasek_cset12_slides.pdf}, dataurl = {https://dx.doi.org/10.7910/DVN/25571}, publisher = {USENIX Association}, address = {Berkeley, CA, USA} }
@inproceedings{AndersonBBCELMS12weis, author = {Ross Anderson and Chris Barton and Rainer B{\"o}hme and Richard Clayton and Michael van Eeten and Michael Levi and Tyler Moore and Stefan Savage}, title = {Measuring the Cost of Cybercrime}, booktitle = {11th Workshop on the Economics of Information Security (WEIS)}, year = {2012}, url = {https://tylermoore.utulsa.edu/weis12.pdf}, presurl = {https://tylermoore.utulsa.edu/weis12pres.pdf} }
@inproceedings{MooreHC12fc, author = {Tyler Moore and Jie Han and Richard Clayton}, title = {The Postmodern {P}onzi Scheme: Empirical Analysis of High-Yield Investment Programs}, booktitle = {Financial Cryptography and Data Security}, year = {2012}, pages = {41-56}, puburl = {https://dx.doi.org/10.1007/978-3-642-32946-3_4}, url = {https://tylermoore.utulsa.edu/fc12.pdf}, presurl = {https://tylermoore.utulsa.edu/fc12pres.pdf}, editor = {Angelos D. Keromytis}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {7397}, puburl = {https://dx.doi.org/10.1007/978-3-642-32946-3} }
@inproceedings{MooreLC11ccs, author = {Tyler Moore and Nektarios Leontiadis and Nicolas Christin}, title = {Fashion crimes: trending-term exploitation on the web}, booktitle = {ACM Conference on Computer and Communications Security (CCS)}, year = {2011}, pages = {455-466}, url = {https://tylermoore.utulsa.edu/ccs11.pdf}, puburl = {http://doi.acm.org/10.1145/2046707.2046761}, presurl = {https://tylermoore.utulsa.edu/ccs11pres.pdf}, editor = {Yan Chen and George Danezis and Vitaly Shmatikov}, publisher = {ACM} }
@inproceedings{LeontiadisMC11uss, author = {Nektarios Leontiadis and Tyler Moore and Nicolas Christin}, title = {Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade}, booktitle = {USENIX Security Symposium}, year = {2011}, url = {https://tylermoore.utulsa.edu/usenix11.pdf}, puburl = {http://static.usenix.org/events/sec11/tech/full_papers/Leontiadis.pdf}, publisher = {USENIX Association} }
@inproceedings{HofmeyrMFES11weis, author = {Steven A. Hofmeyr and Tyler Moore and Stephanie Forrest and Benjamin Edwards and George Stelle}, title = {Modeling Internet-Scale Policies for Cleaning up Malware}, year = {2011}, url = {https://tylermoore.utulsa.edu/weis11model.pdf}, puburl = {http://weis2011.econinfosec.org/papers/Modeling\%20Internet-Scale\%20Policies\%20for\%20Cleaning\%20up\%20Malware.pdf}, booktitle = {10th Workshop on the Economics of Information Security (WEIS)} }
@inproceedings{LandauM11weis, author = {Susan Landau and Tyler Moore}, title = {Economic Tussles in Federated Identity Management}, booktitle = {10th Workshop on the Economics of Information Security (WEIS)}, year = {2011}, puburl = {http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/4254}, presurl = {https://tylermoore.utulsa.edu/nist12pres.pdf} }
@inproceedings{MooreC11fc, author = {Tyler Moore and Richard Clayton}, title = {Ethical Dilemmas in Take-Down Research}, booktitle = {Workshop on the Ethics of Computer Security Research (Financial Cryptography Workshops)}, year = {2011}, pages = {154-168}, url = {https://tylermoore.utulsa.edu/wecsr11.pdf}, presurl = {https://tylermoore.utulsa.edu/wecsr11pres.pdf}, puburl = {https://dx.doi.org/10.1007/978-3-642-29889-9_14}, editor = {George Danezis and Sven Dietrich and Kazue Sako}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {7126} }
@inproceedings{MooreFP10nspw, author = {Tyler Moore and Allan Friedman and Ariel D. Procaccia}, title = {Would a 'cyber warrior' protect us: exploring trade-offs between attack and defense of information systems}, booktitle = {New Security Paradigms Workshop (NSPW)}, year = {2010}, pages = {85-94}, url = {https://tylermoore.utulsa.edu/nspw10.pdf}, puburl = {http://doi.acm.org/10.1145/1900546.1900559}, editor = {Angelos D. Keromytis and Sean Peisert and Richard Ford and Carrie Gates}, publisher = {ACM} }
@inproceedings{MoranM10fc, author = {Tal Moran and Tyler Moore}, title = {The Phish-Market Protocol: Securely Sharing Attack Data between Competitors}, booktitle = {Financial Cryptography and Data Security}, year = {2010}, pages = {222-237}, puburl = {https://dx.doi.org/10.1007/978-3-642-14577-3_18}, url = {https://tylermoore.utulsa.edu/fc10phishmarket.pdf}, presurl = {https://tylermoore.utulsa.edu/fc10phishmarketpres.pdf}, editor = {Radu Sion}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {6052} }
@inproceedings{MooreE10fc, author = {Tyler Moore and Benjamin Edelman}, title = {Measuring the Perpetrators and Funders of Typosquatting}, booktitle = {Financial Cryptography and Data Security}, year = {2010}, pages = {175-191}, puburl = {https://dx.doi.org/10.1007/978-3-642-14577-3_15}, url = {https://tylermoore.utulsa.edu/fc10typo.pdf}, presurl = {https://tylermoore.utulsa.edu/fc10typopres.pdf}, dataurl = {http://www.benedelman.org/typosquatting/}, editor = {Radu Sion}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {6052} }
@inproceedings{BohmeM09weis, author = {Rainer B{\"o}hme and Tyler Moore}, title = {The Iterated Weakest Link - A Model of Adaptive Security Investment}, booktitle = {8th Workshop on the Economics of Information Security (WEIS)}, year = {2009}, url = {https://tylermoore.utulsa.edu/weis09.pdf}, presurl = {https://tylermoore.utulsa.edu/weis09pres.pdf}, puburl = {http://weis09.infosecon.net/files/152/index.html} }
@inproceedings{MooreCS09leet, author = {Moore, Tyler and Clayton, Richard and Stern, Henry}, title = {Temporal correlations between spam and phishing websites}, booktitle = {Proceedings of the 2nd USENIX conference on Large-scale exploits and emergent threats: botnets, spyware, worms, and more}, series = {LEET'09}, year = {2009}, location = {Boston, MA}, puburl = {https://www.usenix.org/conference/leet-09/temporal-correlations-between-spam-and-phishing-websites}, url = {https://tylermoore.utulsa.edu/leet09.pdf}, presurl = {https://tylermoore.utulsa.edu/leet09pres.pdf}, publisher = {USENIX Association}, address = {Berkeley, CA, USA} }
@inproceedings{MooreC09fc, author = {Tyler Moore and Richard Clayton}, title = {Evil Searching: Compromise and Recompromise of Internet Hosts for Phishing}, booktitle = {Financial Cryptography and Data Security}, year = {2009}, pages = {256-272}, puburl = {https://dx.doi.org/10.1007/978-3-642-03549-4_16}, url = {https://tylermoore.utulsa.edu/fc09.pdf}, presurl = {https://tylermoore.utulsa.edu/fc09pres.pdf}, editor = {Roger Dingledine and Philippe Golle}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {5628} }
@inproceedings{MooreC08ecrime, author = {Tyler Moore and Richard Clayton}, title = {The Consequence of Non-Cooperation in the Fight Against Phishing}, booktitle = {APWG eCrime Researchers Summit}, year = {2008}, pages = {1-14}, puburl = {https://dx.doi.org/10.1109/ECRIME.2008.4696968}, url = {https://tylermoore.utulsa.edu/ecrime08.pdf}, presurl = {https://tylermoore.utulsa.edu/ecrime08pres.pdf}, publisher = {IEEE} }
@inproceedings{MooreC08fc, author = {Tyler Moore and Richard Clayton}, title = {Evaluating the Wisdom of Crowds in Assessing Phishing Websites}, booktitle = {Financial Cryptography and Data Security}, year = {2008}, pages = {16-30}, puburl = {https://dx.doi.org/10.1007/978-3-540-85230-8_2}, url = {https://tylermoore.utulsa.edu/fc08.pdf}, presurl = {https://tylermoore.utulsa.edu/fc08pres.pdf}, editor = {Gene Tsudik}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {5143} }
@inproceedings{MooreC07ecrime, author = {Tyler Moore and Richard Clayton}, title = {Examining the impact of website take-down on phishing}, booktitle = {APWG eCrime Researchers Summit}, year = {2007}, pages = {1-13}, puburl = {http://doi.acm.org/10.1145/1299015.1299016}, url = {https://tylermoore.utulsa.edu/ecrime07.pdf}, presurl = {https://tylermoore.utulsa.edu/ecrime07pres.pdf}, editor = {Lorrie Faith Cranor}, publisher = {ACM}, series = {ACM International Conference Proceeding Series}, volume = {269} }
@inproceedings{MooreC07weis, author = {Tyler Moore and Richard Clayton}, title = {An Empirical Analysis of the Current State of Phishing Attack and Defence}, booktitle = {6th Workshop on the Economics of Information Security (WEIS)}, year = {2007}, puburl = {http://weis2007.econinfosec.org/papers/51.pdf}, url = {https://tylermoore.utulsa.edu/weis07.pdf}, presurl = {https://tylermoore.utulsa.edu/weis07pres.pdf} }
@inproceedings{Moore06weis, author = {Tyler Moore}, title = {The Economics of Digital Forensics}, booktitle = {5th Workshop on the Economics of Information Security (WEIS)}, year = {2006}, puburl = {http://weis2006.econinfosec.org/docs/14.pdf}, url = {https://tylermoore.utulsa.edu/weis06.pdf} }
@inproceedings{Moore05weis, author = {Tyler Moore}, title = {Countering Hidden-Action Attacks on Networked Systems}, booktitle = {4th Workshop on the Economics of Information Security (WEIS)}, year = {2005}, puburl = {http://infosecon.net/workshop/pdf/18.pdf}, url = {https://tylermoore.utulsa.edu/weis05.pdf}, presurl = {https://tylermoore.utulsa.edu/weis05pres.pdf} }
@inproceedings{LorenzMMHS01, author = {Gary Lorenz and Tyler Moore and Gavin Manes and John Hale and Sujeet Shenoi}, title = {Securing {SS7} Telecommunications Networks}, booktitle = {Second IEEE Systems, Man and Cybernetics Information Assurance Workshop}, year = {2001}, month = {June}, day = {5-6} }
@inproceedings{LeontiadisMC14, author = {Leontiadis, Nektarios and Moore, Tyler and Christin, Nicolas}, title = {A Nearly Four-Year Longitudinal Study of Search-Engine Poisoning}, booktitle = {Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security}, series = {CCS '14}, year = {2014}, isbn = {978-1-4503-2957-6}, location = {Scottsdale, Arizona, USA}, pages = {930--941}, numpages = {12}, url = {https://tylermoore.utulsa.edu/ccs14.pdf}, puburl = {http://doi.acm.org/10.1145/2660267.2660332}, doi = {10.1145/2660267.2660332}, acmid = {2660332}, publisher = {ACM}, keywords = {online crime, search engines, web security} }
@inproceedings{ClaytonMC15weis, author = {Richard Clayton and Tyler Moore and Nicolas Christin}, title = {Concentrating Correctly on Cybercrime Concentration}, booktitle = {14th Workshop on the Economics of Information Security}, year = 2015, url = {http://www.econinfosec.org/archive/weis2015/papers/WEIS_2015_clayton.pdf}, puburl = {https://tylermoore.utulsa.edu/weis15pres.pdf} }
@inproceedings{CetinJGMV15weis, title = {Understanding the Role of Sender Reputation in Abuse Reporting and Cleanup}, author = {Orcun Cetin and Mohammad Hanif Jhaveri and Carlos Ga{\~n}{\'a}n and Michel van Eeten and Tyler Moore}, booktitle = {14th Workshop on the Economics of Information Security}, year = 2015, url = {http://www.econinfosec.org/archive/weis2015/papers/WEIS_2015_cetin.pdf} }
@inproceedings{WadleighDM15www, author = {John Wadleigh and Jake Drew and Tyler Moore}, title = {The E-Commerce Market for ``Lemons'': Identification and Analysis of Websites Selling Counterfeit Goods}, booktitle = {International World Wide Web Conference (Security and Privacy Track)}, year = {2015}, month = {May}, publisher = {ACM}, pages = {1188-1197}, url = {https://tylermoore.utulsa.edu/www15.pdf}, puburl = {http://www.www2015.it/documents/proceedings/proceedings/p1188.pdf} }
@inproceedings{MooreC15apwg, author = {Tyler Moore and Richard Clayton}, title = {Which Malware Lures Work Best? Measurements from a Large Instant Messaging Worm}, booktitle = {{APWG} Symposium on Electronic Crime Research (eCrime)}, year = 2015, doi = {10.1109/ECRIME.2015.7120801}, pages = {69--78}, publisher = {IEEE}, url = {https://tylermoore.utulsa.edu/ecrime15.pdf} }
@inproceedings{VasekM15fc, author = {Marie Vasek and Tyler Moore}, title = {There's no free lunch, even using {B}itcoin: Tracking the Popularity and Profits of Virtual Currency Scams}, booktitle = {Financial Cryptography and Data Security}, year = {2015}, volume = {8975}, editor = {B\"ohme, Rainer and Okamoto, Tatsuaki}, doi = {10.1007/978-3-662-47854-7_4}, pages = {44-61}, puburl = {https://dx.doi.org/10.1007/978-3-662-47854-7_4}, month = {January}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, url = {https://tylermoore.utulsa.edu/fc15.pdf}, presurl = {http://secon.utulsa.edu/vasek/vasekfc15pres.pdf} }
@inproceedings{VasekBCKM16fc, author = {Marie Vasek and Joseph Bonneau and Ryan Castellucci and Cameron Keith and Tyler Moore}, title = {The {B}itcoin brain drain: Examining the Use and Abuse of {B}itcoin Brain Wallets}, booktitle = {Financial Cryptography and Data Security}, year = {2016}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {9603}, pages = {609--618}, editor = {Jens Grossklags and Bart Preneel}, url = {https://tylermoore.utulsa.edu/fc16.pdf}, puburl = {https://dx.doi.org/10.1007/978-3-662-54970-4_36}, presurl = {https://tylermoore.utulsa.edu/fc16pres.pdf} }
@inproceedings{DrewHM16star, author = {Jake Drew and Michael Hahsler and Tyler Moore}, title = {Polymorphic Malware Detection Using Sequence Classification Methods}, booktitle = {Workshop on Bio-inspired Security, Trust, Assurance and Resilience (BioStar), IEEE Security and Privacy Workshops (SPW)}, year = 2016, publisher = {IEEE}, doi = {10.1109/SPW.2016.30}, month = {May}, pages = {81--87}, url = {https://tylermoore.utulsa.edu/biostar16.pdf} }
@inproceedings{MooreDC16weis, author = {Tyler Moore and Scott Dynes and Frederick Chang}, title = {Identifying how firms manage cybersecurity investment}, booktitle = {15th Workshop on the Economics of Information Security (WEIS)}, year = 2016, url = {https://tylermoore.utulsa.edu/weis16ciso.pdf}, presurl = {https://tylermoore.utulsa.edu/weis16cisopres.pdf} }
@inproceedings{FederGHM16weis, author = {Amir Feder and Neil Gandal and JT Hamrick and Tyler Moore}, title = {The Impact of {DDoS} and Other Security Shocks on {Bitcoin} Currency Exchanges: Evidence from {Mt. Gox}}, booktitle = {15th Workshop on the Economics of Information Security (WEIS)}, year = 2016, url = {https://tylermoore.utulsa.edu/weis16gox.pdf}, presurl = {https://tylermoore.utulsa.edu/weis16goxpres.pdf} }
@inproceedings{VasekWM16wiscs, author = {Marie Vasek and Matthew Weeden and Tyler Moore}, title = {Measuring the Impact of Sharing Abuse Data with Web Hosting Providers}, booktitle = {ACM Workshop on Information Sharing and Collaborative Security}, year = 2016, pages = {71--80}, publisher = {{ACM}}, url = {https://tylermoore.utulsa.edu/wiscs16.pdf}, puburl = {http://dl.acm.org/citation.cfm?id=2994548}, presurl = {https://tylermoore.utulsa.edu/vasekwiscs16pres.pdf} }
@inproceedings{GandalHMO17weis, author = {Neil Gandal and JT Hamrick and Tyler Moore and Tali Oberman}, title = {Price Manipulation in the {Bitcoin} Ecosystem}, booktitle = {16th Workshop on the Economics of Information Security (WEIS)}, year = 2017, url = {https://tylermoore.utulsa.edu/jme17.pdf}, presurl = {https://tylermoore.utulsa.edu/weis17pres.pdf} }
@inproceedings{Cats17ccs, title = {Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting}, author = {Samaneh Tajalizadehkhoob and Tom van Goethem and Maciej Korczy\'nski and Arman Noroozian and Rainer B\"ohme and Tyler Moore and Wouter Joosen and Michel van Eeten}, booktitle = {ACM SIGSAC Conference on Computer and Communications Security}, series = {CCS '17}, year = {2017}, location = {Dallas, Texas, USA}, publisher = {ACM}, url = {https://tylermoore.utulsa.edu/ccs17.pdf} }
@inproceedings{SpringMP17nspw, title = {Practicing a Science of Security: A Philosophy of Science Perspective}, booktitle = {New Security Paradigms Workshop (NSPW)}, author = {Jonathan M. Spring and Tyler Moore and David Pym}, year = {2017}, location = {Santa Cruz, California, USA}, publisher = {ACM}, url = {https://tylermoore.utulsa.edu/nspw17.pdf} }
@inproceedings{VasekM18bitcoin, title = {Analyzing the {Bitcoin} {Ponzi} Scheme Ecosystem}, author = {Marie Vasek and Tyler Moore}, booktitle = {Fifth Workshop on Bitcoin and Blockchain Research}, year = 2018, publisher = {Springer}, series = {Lecture Notes in Computer Science} }
@inproceedings{ZhengRCTM18cset, author = {Muwei Zheng and Hannah Robbins and Zimo Chai and Prakash Thapa and Tyler Moore}, title = {Cybersecurity Research Datasets: Taxonomy and Empirical Analysis}, booktitle = {11th {USENIX} Workshop on Cyber Security Experimentation and Test ({CSET} 18)}, year = {2018}, address = {Baltimore, MD}, puburl = {https://www.usenix.org/conference/cset18/presentation/zheng}, url = {https://tylermoore.utulsa.edu/cset18.pdf}, dataurl = {https://dx.doi.org/10.7910/DVN/4EPUIA}, presurl = {https://tylermoore.utulsa.edu/cset18pres.pdf}, publisher = {{USENIX} Association} }
@inproceedings{FederGHMV17weis, author = {Amir Feder and Neil Gandal and {JT} Hamrick and Tyler Moore and Marie Vasek}, title = {The rise and fall of cryptocurrencies}, booktitle = {17th Workshop on the Economics of Information Security (WEIS)}, year = 2018, url = {https://tylermoore.utulsa.edu/weis18.pdf}, presurl = {https://tylermoore.utulsa.edu/weis18pres.pdf} }
@inproceedings{WoodsMSWEIS19, author = {Daniel W. Woods and Tyler Moore and Andrew C. Simpson}, title = {The County Fair Cyber Loss Distribution: Drawing Inferences from Insurance Prices}, booktitle = {18th Workshop on the Economics of Information Security (WEIS)}, url = {https://tylermoore.utulsa.edu/weis19loss.pdf}, year = 2019 }
@inproceedings{HamrickWEIS19, author = {{JT} Hamrick and Farhang Rouhi and Arghya Mukherjee and Amir Feder and Neil Gandal and Tyler Moore and Marie Vasek and Neil Gandal and Marie Vasek}, title = {The economics of cryptocurrency pump and dump schemes}, booktitle = {18th Workshop on the Economics of Information Security (WEIS)}, url = {https://tylermoore.utulsa.edu/weis19pump.pdf}, year = 2019 }
@inproceedings{MooreKCTWEIS19, author = {Tyler Moore and Erin Kenneally and Michael Collett and Prakash Thapa}, title = {Valuing cybersecurity research datasets}, booktitle = {18th Workshop on the Economics of Information Security (WEIS)}, year = 2019, url = {https://tylermoore.utulsa.edu/weis19data.pdf}, presurl = {https://tylermoore.utulsa.edu/weis19datapres.pdf} }
@inproceedings{AndersonWEIS19, author = {Ross Anderson and Chris Barton and Rainer B\"ohme and Richard Clayton and Carlos Ga{\~n}{\'a}n and Tom Grasso and Michael Levi and Tyler Moore and Stefan Savage and Marie Vasek}, title = {Measuring the Changing Cost of Cybercrime}, booktitle = {18th Workshop on the Economics of Information Security (WEIS)}, url = {https://tylermoore.utulsa.edu/weis19cost.pdf}, year = 2019 }
@inproceedings{JohnsonBLOCKCHAIN18, author = {B. {Johnson} and A. {Laszka} and J. {Grossklags} and T. {Moore}}, booktitle = {IEEE International Conference on Blockchain (BLOCKCHAIN)}, title = {Economic Analyses of Security Investments on Cryptocurrency Exchanges}, year = {2018}, volume = {}, number = {}, pages = {1253-1262}, doi = {10.1109/Cybermatics_2018.2018.00220}, issn = {null}, month = {July} }
@inproceedings{SimpsonMC20apwg, author = {Geoffrey Simpson and Tyler Moore and Richard Clayton}, title = {Ten years of attacks on companies using visual impersonation of domain names}, booktitle = {{APWG} Symposium on Electronic Crime Research (eCrime)}, year = 2020, publisher = {IEEE}, url = {https://tylermoore.utulsa.edu/ecrime20vidn.pdf} }
@inproceedings{SimpsonM20apwg, author = {Geoffrey Simpson and Tyler Moore}, title = {Empirical analysis of losses from business-email compromise}, booktitle = {{APWG} Symposium on Electronic Crime Research (eCrime)}, year = 2020, publisher = {IEEE}, url = {https://tylermoore.utulsa.edu/ecrime20bec.pdf} }
@inproceedings{DBLP:conf/icbc2/MorinV021, author = {Andrew Morin and Marie Vasek and Tyler Moore}, title = {Detecting Text Reuse in Cryptocurrency Whitepapers}, booktitle = {{IEEE} International Conference on Blockchain and Cryptocurrency, {ICBC} 2021, Sydney, Australia, May 3-6, 2021}, pages = {1--5}, publisher = {{IEEE}}, year = {2021}, url = {https://tylermoore.utulsa.edu/icbc21.pdf}, puburl = {https://doi.org/10.1109/ICBC51069.2021.9461147}, doi = {10.1109/ICBC51069.2021.9461147}, timestamp = {Wed, 30 Jun 2021 12:20:23 +0200}, biburl = {https://dblp.org/rec/conf/icbc2/MorinV021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{Vermeer:EuroSP21, author = {Matthew Vermeer and Jonathan West and Alejandro Cuevas and Shuonan Niu and Nicolas Christin and Michel {van Eeten} and Tobias Fiebig and Carlos Ga{\~n}{\'a}n and Tyler Moore}, title = {{SoK}: A framework for asset discovery: Systematizing advances in network measurements for protecting organizations}, booktitle = {Proceedings of the {6th IEEE European Symposium on Security and Privacy (Euro S\&P'21)}}, year = 2021, month = sep, address = {Vienna, Austria (online)}, url = {https://tylermoore.utulsa.edu/eurosp21.pdf} }
@inproceedings{Hamrick:Defi21, author = {{JT} Hamrick and Farhang Rouhi and Arghya Mukherjee and Marie Vasek and Tyler Moore and Neil Gandal}, title = {Analyzing Target-Based Cryptocurrency Pump and Dump Schemes}, booktitle = {{ACM CCS} Workshop on Decentralized Finance and Security}, year = 2021, url = {https://tylermoore.utulsa.edu/defi21.pdf} }
@inproceedings{Mukherjee:eCrime22, author = {Mukherjee, Arghya and Moore, Tyler}, title = {Cryptocurrency Exchange Closure Revisited (Again)}, booktitle = {{APWG} Symposium on Electronic Crime Research {(eCrime)}}, year = {2022}, volume = {}, number = {}, pages = {1-8}, doi = {10.1109/eCrime57793.2022.10142141}, url = {https://tylermoore.utulsa.edu/ecrime22exchange.pdf} }
@inproceedings{Siu:eCrime22, author = {Siu, Gilberto Atondo and Hutchings, Alice and Vasek, Marie and Moore, Tyler}, title = {“Invest in crypto!”: An analysis of investment scam advertisements found in Bitcointalk}, booktitle = {{APWG} Symposium on Electronic Crime Research {(eCrime)}}, year = {2022}, volume = {}, number = {}, pages = {1-12}, url = {https://tylermoore.utulsa.edu/ecrime22scam.pdf}, doi = {10.1109/eCrime57793.2022.10142100} }
@inproceedings{Morin:CNS22, author = {Morin, Andrew and Moore, Tyler}, booktitle = {IEEE Conference on Communications and Network Security (CNS) Cyber Resilience Workshop}, title = {Towards Cost-Balanced Intrusion Detection in {OT} Environments}, year = {2022}, volume = {}, number = {}, pages = {1-6}, doi = {10.1109/CNS56114.2022.10092920}, url = {https://tylermoore.utulsa.edu/crw22.pdf} }
@inproceedings{Morin:WEIS22, author = {Andrew Morin and Tyler Moore and Eric Olson}, title = {Breaking the Stablecoin Buck: Measuring the Impact of Security Breach and Liquidation Shocks}, booktitle = {21st Workshop on the Economics of Information Security (WEIS)}, year = 2022, url = {https://tylermoore.utulsa.edu/weis22stablecoin.pdf} }
@inproceedings{West:PAM22, author = {West, Jonathan Codi and Moore, Tyler}, editor = {Hohlfeld, Oliver and Moura, Giovane and Pelsser, Cristel}, title = {Longitudinal Study of Internet-Facing {OpenSSH} Update Patterns}, booktitle = {Passive and Active Measurement}, year = {2022}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {13210}, address = {Cham}, pages = {675--689}, abstract = {Keeping server software patched and up-to-date is a never-ending struggle for system administrators that is crucial for security. Nevertheless, we know little about how well or how consistently software updates are applied over time across the Internet. We shed light on software update behavior on publicly addressable networks by utilizing Internet-wide scans of OpenSSH banners. We primarily focus on OpenSSH banners which contain patch-level information in order to map accurate release dates. We augment this view by tracking which software security backports fix vulnerabilities in older OpenSSH versions. We find that the availability of backports, not CVE announcements or upstream software updates, trigger rapid updates. Unfortunately, we also determine that the lag in publishing backports (if they are published at all) combined with the steady cadence of new vulnerability reports ensures that most of the time, the vast majority of machines are vulnerable to at least one CVE. Additionally, we observe that major cloud hosting providers are consistently faster to apply patches.}, isbn = {978-3-030-98785-5}, url = {https://tylermoore.utulsa.edu/pam22.pdf} }
@inproceedings{Morin:WACCO23, author = {Andrew Morin and Tyler Moore}, title = {How Cryptocurrency Exchange Interruptions Create Arbitrage Opportunities}, booktitle = {IEEE European Symposium on Security and Privacy Workshops (EuroS\&PW)}, year = 2023, pages = {207--215}, doi = {10.1109/EuroSPW59978.2023.00028}, publisher = {{IEEE}}, url = {https://tylermoore.utulsa.edu/wacco23arbitrage.pdf} }
@inproceedings{Hajizada:WACCO23, author = {Hajizada, Abulfaz and Moore, Tyler}, booktitle = {IEEE European Symposium on Security and Privacy Workshops (EuroS\&PW)}, title = {On Gaps in Enterprise Cyber Attack Reporting}, year = {2023}, volume = {}, number = {}, pages = {227--231}, doi = {10.1109/EuroSPW59978.2023.00030}, publisher = {{IEEE}}, url = {https://tylermoore.utulsa.edu/wacco23sec.pdf} }
@inproceedings{Simpson:HICSS24, author = {Simpson, Geoffrey and Moore, Tyler}, booktitle = {57th Hawaii International Conference on System Sciences (HICSS)}, title = {Identifying Subdomain Doppelganger Attacks against Companies}, year = {2024}, pages = {7387--7896}, puburl = {https://hdl.handle.net/10125/107273}, url = {https://tylermoore.utulsa.edu/hicss24doppel.pdf} }
@inproceedings{Phillips:HICSS24, author = {Samantha Phillips and Sal Aurigemma and Bradley Brummel and Tyler Moore}, booktitle = {57th Hawaii International Conference on System Sciences (HICSS)}, title = {Leveraging Situational Judgment Tests to Measure Behavioral Information Security}, year = {2024}, volume = {}, number = {}, pages = {4714--4723}, puburl = {https://hdl.handle.net/10125/106951}, url = {https://tylermoore.utulsa.edu/hicss24sjt.pdf} }
@inproceedings{Phillips:ASC23, author = {Samantha Phillips and Bradley Brummel and Sal Aurigemma and Tyler Moore}, booktitle = {22nd Annual Security Conference (ASC)}, title = {Information Security Culture: A Look Ahead at Measurement Methods}, year = {2023}, volume = {}, number = {}, url = {https://tylermoore.utulsa.edu/asc23phillips.pdf} }
@inproceedings{Hastings:ASC23, author = {Seth Hastings and Tyler Moore and Sal Aurigemma and Bradley Brummel}, booktitle = {22nd Annual Security Conference (ASC)}, title = {Predicting Authentication Performance with Psychological Constructs}, year = {2023}, url = {https://tylermoore.utulsa.edu/asc23hastings.pdf} }
@inproceedings{Bolger:ASC23, author = {Corey Bolger and Bradley Brummel and Sal Aurigemma and Tyler Moore and Meagan Baskin}, booktitle = {22nd Annual Security Conference (ASC)}, title = {Information Security Awareness: Identifying Gaps in Current Measurement Tools}, year = {2023}, url = {https://tylermoore.utulsa.edu/asc23bolger.pdf} }
@inproceedings{Shumway:ASC23, author = {Philip Shumway and Bradley Brummel and Tyler Moore and Sal Aurigemma}, booktitle = {22nd Annual Security Conference (ASC)}, title = {Naturalistic observations of login attempts: Do security implementations and demands affect employee job behaviors and perceptions?}, year = {2023}, volume = {}, number = {} }
@inproceedings{Hastings:WOSOC24, title = {Transforming Raw Authentication Logs into Interpretable Events}, author = {Seth Hastings and Corey Bolger and Philip Shumway and Tyler Moore}, booktitle = {Workshop on SOC Operations and Construction (WOSOC)}, publisher = {Internet Society}, year = 2024, url = {https://tylermoore.utulsa.edu/wosoc24.pdf} }
@inproceedings{Muklherjee:HICSS25, author = {Arghya Mukherjee and Tyler Moore}, booktitle = {58th Hawaii International Conference on System Sciences (HICSS)}, title = {Beyond the Hype: Empirical Evaluation of Cryptocurrency Unicorn Success}, year = {2025}, url = {https://tylermoore.utulsa.edu/hicss25.pdf} }
@inproceedings{Howe:CRITIS24, author = {Alex Howe and Andrew Morin and Mauricio Papa and Tyler Moore}, title = {A cost-sensitive approach for managing intrusion alerts in {OT} environments}, booktitle = {The 19th International Conference on Critical Information Infrastructures Security {(CRITIS)}}, year = 2024, url = {https://tylermoore.utulsa.edu/critis24.pdf} }
@inproceedings{Gonzales:CARS24, author = {Vincent Gonzales and Andrew Morin and Tyler Moore}, title = {Cost-Benefit Framework for Secure Smart Installations}, booktitle = {4th IEEE Cyber Awareness and Research Symposium (CARS)}, year = 2024 }
@inproceedings{Phillips:DRW24, author = {Samantha Phillips and Bradley Brummel and Sal Aurigemma and Tyler Moore}, booktitle = {16th IFIP WG 8.11/11.13 Dewald Roode Workshop on Information Systems Security Research}, title = {Measuring Dimensions of Information Security Culture Across Industries with Situational Judgement Tests}, year = {2024}, volume = {}, number = {}, url = {https://tylermoore.utulsa.edu/drw24sjt.pdf} }
@inproceedings{Hastings:DRW24, author = {Seth Hastings and Tyler Moore Bradley Brummel and Sal Aurigemma}, booktitle = {16th IFIP WG 8.11/11.13 Dewald Roode Workshop on Information Systems Security Research}, title = {The Influence Of Security Related Stress And Self-Efficacy On Actual Security Behaviors Over Time}, year = {2024}, volume = {}, number = {}, url = {https://tylermoore.utulsa.edu/drw24behave.pdf} }
@inproceedings{Hajizada:AMCIS24, author = {Hajizada, Abulfaz and Adams, Matthew and Moore, Tyler}, title = {Construction and Analysis of a Large-Scale Firm-Level Cybersecurity Posture Dataset}, year = 2024, booktitle = {30th Americas Conference on Information Systems (AMCIS)}, puburl = {https://aisel.aisnet.org/amcis2024/security/security/40}, url = {https://tylermoore.utulsa.edu/amcis24.pdf} }
This file was generated by bibtex2html 1.99.