@article{Moore10elsevier, author = {Tyler Moore}, title = {Phishing and the Economics of E-crime}, journal = {Elsevier Infosecurity Magazine}, volume = 4, number = 6, pages = {34--37}, year = 2007 }
@inproceedings{AndersonM07crypto, author = {Ross Anderson and Tyler Moore}, title = {Information Security Economics - and Beyond}, booktitle = {27th Annual International Cryptology Conference (CRYPTO)}, year = {2007}, pages = {68-91}, puburl = {http://dx.doi.org/10.1007/978-3-540-74143-5_5}, url = {https://tylermoore.utulsa.edu/crypto07.pdf}, editor = {Alfred Menezes}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {4622} }
@misc{Moore07dimacs, author = {Tyler Moore}, title = {Workshop Report: {DIMACS} Workshop on Information Security Economics}, location = {Rutgers University, Piscataway, NJ, USA}, month = jan, days = {18--19}, year = 2007 }
@article{MooreA05enisa, author = {Tyler Moore and Ross Anderson}, title = {Trends in Security Economics}, journal = {European Network and Information Security Agency Quarterly}, volume = 1, number = 3, pages = {6--7}, year = 2005 }
@article{Moore08VB, author = {Tyler Moore}, title = {How wise are crowds when assessing phishing websites?}, journal = {Virus Bulletin}, month = apr, year = 2008 }
@article{Moore11VB, author = {Tyler Moore}, title = {Investigating the abuse of search engines to promote illicit online pharmacies}, journal = {Virus Bulletin}, month = nov, year = 2011 }
@article{Moore13ijcip, title = {The promise and perils of digital currencies}, author = {Tyler Moore}, journal = {International Journal of Critical Infrastructure Protection}, year = {2013}, url = {http://dx.doi.org/10.1016/j.ijcip.2013.08.002}, volume = 6, number = {3--4}, pages = {147--149} }
@inproceedings{HayashiMS15kcpay, title = {The Economics of Retail Payments Security}, author = {Fumiko Hayashi Tyler Moore and Richard J. Sullivan}, booktitle = {Fifth International Payments Policy Conference: The Puzzle of Payments Security, Federal Reserve Bank of Kansas City}, year = 2015, url = {https://tylermoore.utulsa.edu/kcpay15.pdf}, presurl = {https://tylermoore.utulsa.edu/kcpay-econ.pdf} }
@article{moore_et_al:DR:2017:7039, author = {Tyler Moore and Christian W. Probst and Kai Rannenberg and Michel van Eeten}, title = {{Assessing ICT Security Risks in Socio-Technical Systems (Dagstuhl Seminar 16461)}}, pages = {63--89}, journal = {Dagstuhl Reports}, issn = {2192-5283}, year = {2017}, volume = {6}, number = {11}, editor = {Tyler W. Moore and Christian W. Probst and Kai Rannenberg and Michel van Eeten}, publisher = {Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik}, address = {Dagstuhl, Germany}, url = {http://drops.dagstuhl.de/opus/volltexte/2017/7039}, urn = {urn:nbn:de:0030-drops-70390}, doi = {10.4230/DagRep.6.11.63}, annote = {Keywords: economics of risk assessment, human factor, return on security investment, security risk management, socio-technical security} }
@inproceedings{KosloffMKMS03spie, author = {Kosloff, Todd and Moore, Tyler and Keller, Jesse and Manes, Gavin and Shenoi, Sujeet}, title = {Attacks on public telephone networks: technologies and challenges}, booktitle = {{SPIE} 5071, Sensors, and Command, Control, Communications, and Intelligence {(C3I)} Technologies for Homeland Defense and Law Enforcement II, 72}, pages = {72-83}, year = {2003}, puburl = {http://dx.doi.org/10.1117/12.500826} }
@inproceedings{KosloffMKMS02sact, author = {Todd Kosloff and Tyler Moore and Jesse Keller and Gavin Manes and Sujeet Shenoi}, title = {{SS7} Messaging Attacks on Public Telephone Networks: Attack Scenarios and Detection}, booktitle = {Workshop on the Scientific Aspects of Cyber Terrorism}, publisher = {ACM}, month = {November}, day = 21, year = 2002, location = {Washington, DC} }
@inproceedings{AndersonBCM08isse, author = {Ross Anderson and Rainer B{\"o}hme and Richard Clayton and Tyler Moore}, title = {Security Economics and {E}uropean Policy}, booktitle = {Information Security Solutions Europe (ISSE)}, year = {2008}, pages = {57-76}, puburl = {http://dx.doi.org/10.1007/978-3-8348-9283-6_6}, editor = {Norbert Pohlmann and Helmut Reimer and Wolfgang Schneider}, publisher = {Vieweg+Teubner} }
@article{Moore:2017:HAE:3169408.3169773, author = {Moore, Tyler}, title = {On the Harms Arising from the Equifax Data Breach of 2017}, journal = {Int. J. Crit. Infrastruct. Prot.}, issue_date = {December 2017}, volume = {19}, number = {C}, month = dec, year = {2017}, issn = {1874-5482}, pages = {47--48}, numpages = {2}, url = {https://doi.org/10.1016/j.ijcip.2017.10.004}, doi = {10.1016/j.ijcip.2017.10.004}, acmid = {3169773}, publisher = {Elsevier Science Publishers B. V.}, address = {Amsterdam, The Netherlands, The Netherlands} }
@incollection{cybok-security-economics-kg, author = {Tyler Moore}, editor = {Awais Rashid and Yulia Cherdantseva and Andrew Martin and Steve Schneider}, title = {Security Economics Knowledge Guide}, booktitle = {CyBOK Knowledge Guides and Topic Guides}, publisher = {University of Bristol}, year = {2024}, puburl = {https://www.cybok.org/media/downloads/Security_Economics_KG_v1.0.0.pdf}, note = {KG Version 1.0.0} }
This file was generated by bibtex2html 1.99.