[1] Daniel W. Woods and Tyler Moore. Does insurance have a future in governing cybersecurity? IEEE Security & Privacy, 18(1), 2020. [ bib | paper ]
[2] Tyler Moore, Nicolas Christin, and Janos Szurdi. Revisiting the risks of bitcoin currency exchange closure. ACM Transactions on Internet Technology, 18(4):50:1--50:18, September 2018. [ bib | DOI | paper | publisher ]
[3] Neil Gandal, JT Hamrick, Tyler Moore, and Tali Obermann. Price manipulation in the Bitcoin ecosystem. Journal of Monetary Economics, 95:86--96, May 2018. [ bib | DOI | appendix | paper ]
[4] Mohammad Hanif Jhaveri, Orcun Cetin, Carlos Gañán, Tyler Moore, and Michel Van Eeten. Abuse reporting and the fight against cybercrime. ACM Computing Surveys (CSUR), 49(4):68, 2017. [ bib | paper | publisher ]
[5] Jake Drew, Michael Hahsler, and Tyler Moore. Polymorphic malware detection using sequence classification methods and ensembles. EURASIP Journal on Information Security, 2017(1):2, 2017. [ bib | publisher ]
[6] Joshua Rovner and Tyler Moore. Does the internet need a hegemon? Journal of Global Security Studies, 2(3):184--203, 2017. [ bib | DOI | paper ]
[7] Marie Vasek, John Wadleigh, and Tyler Moore. Hacking is not random: a case-control study of webserver-compromise risk. IEEE Transactions on Dependable and Secure Computing, 13(2):206--219, 2016. [ bib | paper | publisher ]
[8] Markus Riek, Rainer Böhme, and Tyler Moore. Measuring the influence of perceived cybercrime risk on online service avoidance. IEEE Transactions on Dependable and Secure Computing, 13(2):261--273, 2016. [ bib | paper | publisher ]
[9] Rainer Böhme and Tyler Moore. The “iterated weakest link” model of adaptive security investment. Journal of Information Security, 7(2):81--102, 2016. [ bib | paper | publisher ]
[10] Orcun Cetin, Mohammad Hanif Jhaveri, Carlos Gañán, Michel van Eeten, and Tyler Moore. Understanding the role of sender reputation in abuse reporting and cleanup. Journal of Cybersecurity, 2(1):83--98, 2016. [ bib | publisher ]
[11] Rainer Böhme, Nicolas Christin, Benjamin Edelman, and Tyler Moore. Bitcoin: Economics, technology, and governance. Journal of Economic Perspectives, 29(2):213--38, 2015. [ bib | DOI | publisher ]
[12] Jake Drew and Tyler Moore. Optimized combined clustering methods for finding replicated criminal websites. EURASIP Journal on Information Security, 2014(14), 2014. [ bib | paper ]
[13] Steve Papa, William Casper, and Tyler Moore. Securing wastewater facilities from accidental and intentional harm: a cost-benefit analysis. International Journal of Critical Infrastructure Protection, 6(2):96--106, 2013. [ bib | paper | publisher ]
[14] Susan Landau and Tyler Moore. Economic tussles in federated identity management. First Monday, 17(10), 2012. [ bib | publisher | presentation ]
[15] Tyler Moore and Richard Clayton. The impact of public information on phishing attack and defense. Communications & Strategies, 1(81):45--68, 1st quart 2011. [ bib | paper | publisher ]
[16] Tyler Moore. The economics of cybersecurity: Principles and policy options. International Journal of Critical Infrastructure Protection, 3(3--4):103 -- 117, 2010. [ bib | DOI | paper | publisher ]
[17] Rainer Böhme and Tyler Moore. The iterated weakest link. IEEE Security & Privacy, 8(1):53--55, 2010. [ bib | paper | publisher ]
[18] Tal Moran and Tyler Moore. The phish-market protocol: Secure sharing between competitors. IEEE Security & Privacy, 8(4):40--45, 2010. [ bib | paper | publisher ]
[19] Tyler Moore, Richard Clayton, and Ross Anderson. The economics of online crime. Journal of Economic Perspectives, 23(3):3--20, Summer 2009. [ bib | paper | publisher ]
[20] Jolyon Clulow and Tyler Moore. Suicide for the common good: a new strategy for credential revocation in self-organizing systems. Operating Systems Review, 40(3):18--21, 2006. [ bib | publisher ]
[21] Ross Anderson and Tyler Moore. The economics of information security. Science, 314(5799):610--613, 2006. [ bib | DOI | paper | publisher ]

This file was generated by bibtex2html 1.98.