[1]
|
Arghya Mukherjee and Tyler Moore.
Beyond the hype: Empirical evaluation of cryptocurrency unicorn
success.
In 58th Hawaii International Conference on System Sciences
(HICSS), 2025.
[ bib |
paper ]
|
[2]
|
Abulfaz Hajizada, Matthew Adams, and Tyler Moore.
Construction and analysis of a large-scale firm-level cybersecurity
posture dataset.
In 30th Americas Conference on Information Systems (AMCIS),
2024.
[ bib |
paper |
publisher ]
|
[3]
|
Seth Hastings, Tyler Moore Bradley Brummel, and Sal Aurigemma.
The influence of security related stress and self-efficacy on actual
security behaviors over time.
In 16th IFIP WG 8.11/11.13 Dewald Roode Workshop on Information
Systems Security Research, 2024.
[ bib |
paper ]
|
[4]
|
Samantha Phillips, Bradley Brummel, Sal Aurigemma, and Tyler Moore.
Measuring dimensions of information security culture across
industries with situational judgement tests.
In 16th IFIP WG 8.11/11.13 Dewald Roode Workshop on Information
Systems Security Research, 2024.
[ bib |
paper ]
|
[5]
|
Vincent Gonzales, Andrew Morin, and Tyler Moore.
Cost-benefit framework for secure smart installations.
In 4th IEEE Cyber Awareness and Research Symposium (CARS),
2024.
[ bib ]
|
[6]
|
Alex Howe, Andrew Morin, Mauricio Papa, and Tyler Moore.
A cost-sensitive approach for managing intrusion alerts in OT
environments.
In The 19th International Conference on Critical Information
Infrastructures Security (CRITIS), 2024.
[ bib |
paper ]
|
[7]
|
Seth Hastings, Corey Bolger, Philip Shumway, and Tyler Moore.
Transforming raw authentication logs into interpretable events.
In Workshop on SOC Operations and Construction (WOSOC).
Internet Society, 2024.
[ bib |
paper ]
|
[8]
|
Samantha Phillips, Sal Aurigemma, Bradley Brummel, and Tyler Moore.
Leveraging situational judgment tests to measure behavioral
information security.
In 57th Hawaii International Conference on System Sciences
(HICSS), pages 4714--4723, 2024.
[ bib |
paper |
publisher ]
|
[9]
|
Geoffrey Simpson and Tyler Moore.
Identifying subdomain doppelganger attacks against companies.
In 57th Hawaii International Conference on System Sciences
(HICSS), pages 7387--7896, 2024.
[ bib |
paper |
publisher ]
|
[10]
|
Philip Shumway, Bradley Brummel, Tyler Moore, and Sal Aurigemma.
Naturalistic observations of login attempts: Do security
implementations and demands affect employee job behaviors and perceptions?
In 22nd Annual Security Conference (ASC), 2023.
[ bib ]
|
[11]
|
Corey Bolger, Bradley Brummel, Sal Aurigemma, Tyler Moore, and Meagan Baskin.
Information security awareness: Identifying gaps in current
measurement tools.
In 22nd Annual Security Conference (ASC), 2023.
[ bib |
paper ]
|
[12]
|
Seth Hastings, Tyler Moore, Sal Aurigemma, and Bradley Brummel.
Predicting authentication performance with psychological constructs.
In 22nd Annual Security Conference (ASC), 2023.
[ bib |
paper ]
|
[13]
|
Samantha Phillips, Bradley Brummel, Sal Aurigemma, and Tyler Moore.
Information security culture: A look ahead at measurement methods.
In 22nd Annual Security Conference (ASC), 2023.
[ bib |
paper ]
|
[14]
|
Abulfaz Hajizada and Tyler Moore.
On gaps in enterprise cyber attack reporting.
In IEEE European Symposium on Security and Privacy Workshops
(EuroS&PW), pages 227--231. IEEE, 2023.
[ bib |
DOI |
paper ]
|
[15]
|
Andrew Morin and Tyler Moore.
How cryptocurrency exchange interruptions create arbitrage
opportunities.
In IEEE European Symposium on Security and Privacy Workshops
(EuroS&PW), pages 207--215. IEEE, 2023.
[ bib |
DOI |
paper ]
|
[16]
|
Jonathan Codi West and Tyler Moore.
Longitudinal study of internet-facing OpenSSH update patterns.
In Oliver Hohlfeld, Giovane Moura, and Cristel Pelsser, editors,
Passive and Active Measurement, volume 13210 of Lecture Notes in
Computer Science, pages 675--689, Cham, 2022. Springer.
[ bib |
paper ]
|
[17]
|
Andrew Morin, Tyler Moore, and Eric Olson.
Breaking the stablecoin buck: Measuring the impact of security breach
and liquidation shocks.
In 21st Workshop on the Economics of Information Security
(WEIS), 2022.
[ bib |
paper ]
|
[18]
|
Andrew Morin and Tyler Moore.
Towards cost-balanced intrusion detection in OT environments.
In IEEE Conference on Communications and Network Security (CNS)
Cyber Resilience Workshop, pages 1--6, 2022.
[ bib |
DOI |
paper ]
|
[19]
|
Gilberto Atondo Siu, Alice Hutchings, Marie Vasek, and Tyler Moore.
“invest in crypto!”: An analysis of investment scam
advertisements found in bitcointalk.
In APWG Symposium on Electronic Crime Research (eCrime),
pages 1--12, 2022.
[ bib |
DOI |
paper ]
|
[20]
|
Arghya Mukherjee and Tyler Moore.
Cryptocurrency exchange closure revisited (again).
In APWG Symposium on Electronic Crime Research (eCrime),
pages 1--8, 2022.
[ bib |
DOI |
paper ]
|
[21]
|
Matthew Vermeer, Jonathan West, Alejandro Cuevas, Shuonan Niu, Nicolas
Christin, Michel van Eeten, Tobias Fiebig, Carlos Gañán, and Tyler
Moore.
SoK: A framework for asset discovery: Systematizing advances in
network measurements for protecting organizations.
In Proceedings of the 6th IEEE European Symposium on Security
and Privacy (Euro S&P'21), Vienna, Austria (online), September 2021.
[ bib |
paper ]
|
[22]
|
JT Hamrick, Farhang Rouhi, Arghya Mukherjee, Marie Vasek, Tyler Moore, and
Neil Gandal.
Analyzing target-based cryptocurrency pump and dump schemes.
In ACM CCS Workshop on Decentralized Finance and Security,
2021.
[ bib |
paper ]
|
[23]
|
Andrew Morin, Marie Vasek, and Tyler Moore.
Detecting text reuse in cryptocurrency whitepapers.
In IEEE International Conference on Blockchain and
Cryptocurrency, ICBC 2021, Sydney, Australia, May 3-6, 2021, pages 1--5.
IEEE, 2021.
[ bib |
DOI |
paper |
publisher ]
|
[24]
|
Geoffrey Simpson and Tyler Moore.
Empirical analysis of losses from business-email compromise.
In APWG Symposium on Electronic Crime Research (eCrime).
IEEE, 2020.
[ bib |
paper ]
|
[25]
|
Geoffrey Simpson, Tyler Moore, and Richard Clayton.
Ten years of attacks on companies using visual impersonation of
domain names.
In APWG Symposium on Electronic Crime Research (eCrime).
IEEE, 2020.
[ bib |
paper ]
|
[26]
|
Ross Anderson, Chris Barton, Rainer Böhme, Richard Clayton, Carlos
Gañán, Tom Grasso, Michael Levi, Tyler Moore, Stefan Savage, and
Marie Vasek.
Measuring the changing cost of cybercrime.
In 18th Workshop on the Economics of Information Security
(WEIS), 2019.
[ bib |
paper ]
|
[27]
|
Tyler Moore, Erin Kenneally, Michael Collett, and Prakash Thapa.
Valuing cybersecurity research datasets.
In 18th Workshop on the Economics of Information Security
(WEIS), 2019.
[ bib |
paper |
presentation ]
|
[28]
|
JT Hamrick, Farhang Rouhi, Arghya Mukherjee, Amir Feder, Neil Gandal, Tyler
Moore, Marie Vasek, Neil Gandal, and Marie Vasek.
The economics of cryptocurrency pump and dump schemes.
In 18th Workshop on the Economics of Information Security
(WEIS), 2019.
[ bib |
paper ]
|
[29]
|
Daniel W. Woods, Tyler Moore, and Andrew C. Simpson.
The county fair cyber loss distribution: Drawing inferences from
insurance prices.
In 18th Workshop on the Economics of Information Security
(WEIS), 2019.
[ bib |
paper ]
|
[30]
|
B. Johnson, A. Laszka, J. Grossklags, and T. Moore.
Economic analyses of security investments on cryptocurrency
exchanges.
In IEEE International Conference on Blockchain (BLOCKCHAIN),
pages 1253--1262, July 2018.
[ bib |
DOI ]
|
[31]
|
Amir Feder, Neil Gandal, JT Hamrick, Tyler Moore, and Marie Vasek.
The rise and fall of cryptocurrencies.
In 17th Workshop on the Economics of Information Security
(WEIS), 2018.
[ bib |
paper |
presentation ]
|
[32]
|
Muwei Zheng, Hannah Robbins, Zimo Chai, Prakash Thapa, and Tyler Moore.
Cybersecurity research datasets: Taxonomy and empirical analysis.
In 11th USENIX Workshop on Cyber Security Experimentation and
Test (CSET 18), Baltimore, MD, 2018. USENIX Association.
[ bib |
data |
paper |
publisher |
presentation ]
|
[33]
|
Marie Vasek and Tyler Moore.
Analyzing the Bitcoin Ponzi scheme ecosystem.
In Fifth Workshop on Bitcoin and Blockchain Research, Lecture
Notes in Computer Science. Springer, 2018.
[ bib ]
|
[34]
|
Jonathan M. Spring, Tyler Moore, and David Pym.
Practicing a science of security: A philosophy of science
perspective.
In New Security Paradigms Workshop (NSPW). ACM, 2017.
[ bib |
paper ]
|
[35]
|
Samaneh Tajalizadehkhoob, Tom van Goethem, Maciej Korczyński, Arman
Noroozian, Rainer Böhme, Tyler Moore, Wouter Joosen, and Michel van Eeten.
Herding vulnerable cats: A statistical approach to disentangle joint
responsibility for web security in shared hosting.
In ACM SIGSAC Conference on Computer and Communications
Security, CCS '17. ACM, 2017.
[ bib |
paper ]
|
[36]
|
Neil Gandal, JT Hamrick, Tyler Moore, and Tali Oberman.
Price manipulation in the Bitcoin ecosystem.
In 16th Workshop on the Economics of Information Security
(WEIS), 2017.
[ bib |
paper |
presentation ]
|
[37]
|
Jake Drew, Michael Hahsler, and Tyler Moore.
Polymorphic malware detection using sequence classification methods.
In Workshop on Bio-inspired Security, Trust, Assurance and
Resilience (BioStar), IEEE Security and Privacy Workshops (SPW), pages
81--87. IEEE, May 2016.
[ bib |
DOI |
paper ]
|
[38]
|
Marie Vasek, Matthew Weeden, and Tyler Moore.
Measuring the impact of sharing abuse data with web hosting
providers.
In ACM Workshop on Information Sharing and Collaborative
Security, pages 71--80. ACM, 2016.
[ bib |
paper |
publisher |
presentation ]
|
[39]
|
Amir Feder, Neil Gandal, JT Hamrick, and Tyler Moore.
The impact of DDoS and other security shocks on Bitcoin currency
exchanges: Evidence from Mt. Gox.
In 15th Workshop on the Economics of Information Security
(WEIS), 2016.
[ bib |
paper |
presentation ]
|
[40]
|
Tyler Moore, Scott Dynes, and Frederick Chang.
Identifying how firms manage cybersecurity investment.
In 15th Workshop on the Economics of Information Security
(WEIS), 2016.
[ bib |
paper |
presentation ]
|
[41]
|
Marie Vasek, Joseph Bonneau, Ryan Castellucci, Cameron Keith, and Tyler Moore.
The Bitcoin brain drain: Examining the use and abuse of Bitcoin
brain wallets.
In Jens Grossklags and Bart Preneel, editors, Financial
Cryptography and Data Security, volume 9603 of Lecture Notes in
Computer Science, pages 609--618. Springer, 2016.
[ bib |
paper |
publisher |
presentation ]
|
[42]
|
John Wadleigh, Jake Drew, and Tyler Moore.
The e-commerce market for “lemons”: Identification and analysis of
websites selling counterfeit goods.
In International World Wide Web Conference (Security and Privacy
Track), pages 1188--1197. ACM, May 2015.
[ bib |
paper |
publisher ]
|
[43]
|
Marie Vasek and Tyler Moore.
There's no free lunch, even using Bitcoin: Tracking the popularity
and profits of virtual currency scams.
In Rainer Böhme and Tatsuaki Okamoto, editors, Financial
Cryptography and Data Security, volume 8975 of Lecture Notes in
Computer Science, pages 44--61. Springer, January 2015.
[ bib |
DOI |
paper |
publisher |
presentation ]
|
[44]
|
Tyler Moore and Richard Clayton.
Which malware lures work best? measurements from a large instant
messaging worm.
In APWG Symposium on Electronic Crime Research (eCrime),
pages 69--78. IEEE, 2015.
[ bib |
DOI |
paper ]
|
[45]
|
Orcun Cetin, Mohammad Hanif Jhaveri, Carlos Gañán, Michel van Eeten,
and Tyler Moore.
Understanding the role of sender reputation in abuse reporting and
cleanup.
In 14th Workshop on the Economics of Information Security,
2015.
[ bib |
paper ]
|
[46]
|
Richard Clayton, Tyler Moore, and Nicolas Christin.
Concentrating correctly on cybercrime concentration.
In 14th Workshop on the Economics of Information Security,
2015.
[ bib |
paper |
publisher ]
|
[47]
|
Marie Vasek and Tyler Moore.
Identifying risk factors for webserver compromise.
In Financial Cryptography and Data Security, volume 8437 of
Lecture Notes in Computer Science, pages 326--345. Springer, March
2014.
[ bib |
data |
paper |
publisher |
presentation ]
|
[48]
|
Tyler Moore and Richard Clayton.
The ghosts of banking past: Empirical analysis of closed bank
websites.
In Financial Cryptography and Data Security, volume 8437 of
Lecture Notes in Computer Science, pages 33--48. Springer, March 2014.
[ bib |
data |
paper |
publisher |
presentation ]
|
[49]
|
Benjamin Johnson, Aron Laszka, Jens Grossklags, Marie Vasek, and Tyler Moore.
Game-theoretic analysis of DDoS attacks against Bitcoin mining
pools.
In 1st Workshop on Bitcoin Research, volume 8438 of
Lecture Notes in Computer Science, pages 72--86. Springer, March 2014.
[ bib |
paper |
publisher ]
|
[50]
|
Marie Vasek, Micah Thornton, and Tyler Moore.
Empirical analysis of denial-of-service attacks in the Bitcoin
ecosystem.
In 1st Workshop on Bitcoin Research, volume 8438 of
Lecture Notes in Computer Science, pages 57--71. Springer, March 2014.
[ bib |
data |
paper |
publisher |
presentation ]
|
[51]
|
Nektarios Leontiadis, Tyler Moore, and Nicolas Christin.
A nearly four-year longitudinal study of search-engine poisoning.
In Proceedings of the 2014 ACM SIGSAC Conference on Computer and
Communications Security, CCS '14, pages 930--941. ACM, 2014.
[ bib |
DOI |
paper |
publisher ]
|
[52]
|
Jake Drew and Tyler Moore.
Automatic identification of replicated criminal websites using
combined clustering.
In International Workshop on Cyber Crime (IWCC), IEEE Security
and Privacy Workshops. IEEE, 2014.
[ bib |
paper ]
|
[53]
|
Markus Riek, Rainer Böhme, and Tyler Moore.
Understanding the influence of cybercrime risk on the e-service
adoption of European Internet users.
In 13th Workshop on the Economics of Information Security
(WEIS), 2014.
[ bib |
paper ]
|
[54]
|
Marie Vasek and Tyler Moore.
Empirical analysis of factors affecting malware URL detection.
In 8th APWG eCrime Researchers Summit (eCrime), September 2013.
[ bib |
paper |
presentation ]
|
[55]
|
Nektarios Leontiadis, Tyler Moore, and Nicolas Christin.
Pick your poison: Pricing and inventories at unlicensed online
pharmacies.
In ACM Conference on Electronic Commerce (EC), pages 621--638.
ACM, June 2013.
[ bib |
paper |
publisher ]
|
[56]
|
Tyler Moore and Nicolas Christin.
Beware the middleman: Empirical analysis of Bitcoin-exchange risk.
In Financial Cryptography and Data Security, volume 7859 of
Lecture Notes in Computer Science, pages 25--33. Springer, April 2013.
[ bib |
data |
paper |
publisher |
presentation ]
|
[57]
|
Rainer Böhme and Tyler Moore.
How do consumers react to cybercrime?
In APWG eCrime Researchers Summit (eCrime), October 2012.
[ bib |
paper |
presentation ]
|
[58]
|
Tyler Moore and Richard Clayton.
Discovering phishing dropboxes using email metadata.
In 7th APWG eCrime Researchers Summit (eCrime), October 2012.
[ bib |
paper |
presentation ]
|
[59]
|
Tyler Moore, Jie Han, and Richard Clayton.
The postmodern Ponzi scheme: Empirical analysis of high-yield
investment programs.
In Angelos D. Keromytis, editor, Financial Cryptography and Data
Security, volume 7397 of Lecture Notes in Computer Science, pages
41--56. Springer, 2012.
[ bib |
paper |
publisher |
presentation ]
|
[60]
|
Ross Anderson, Chris Barton, Rainer Böhme, Richard Clayton, Michael van
Eeten, Michael Levi, Tyler Moore, and Stefan Savage.
Measuring the cost of cybercrime.
In 11th Workshop on the Economics of Information Security
(WEIS), 2012.
[ bib |
paper |
presentation ]
|
[61]
|
Marie Vasek and Tyler Moore.
Do malware reports expedite cleanup? An experimental study.
In Proceedings of the 5th USENIX Workshop on Cyber Security
Experimentation and Test, CSET'12, Berkeley, CA, USA, 2012. USENIX
Association.
[ bib |
data |
paper |
publisher |
presentation ]
|
[62]
|
Benjamin Edwards, Tyler Moore, George Stelle, Steven A. Hofmeyr, and Stephanie
Forrest.
Beyond the blacklist: Modeling malware spread and the effect of
interventions.
In Proceedings of the New Security Paradigms Workshop,
Bertinoro, Italy, September 19-21, 2012. ACM, 2012.
[ bib |
paper ]
|
[63]
|
Tyler Moore and Richard Clayton.
Ethical dilemmas in take-down research.
In George Danezis, Sven Dietrich, and Kazue Sako, editors,
Workshop on the Ethics of Computer Security Research (Financial Cryptography
Workshops), volume 7126 of Lecture Notes in Computer Science, pages
154--168. Springer, 2011.
[ bib |
paper |
publisher |
presentation ]
|
[64]
|
Susan Landau and Tyler Moore.
Economic tussles in federated identity management.
In 10th Workshop on the Economics of Information Security
(WEIS), 2011.
[ bib |
publisher |
presentation ]
|
[65]
|
Steven A. Hofmeyr, Tyler Moore, Stephanie Forrest, Benjamin Edwards, and George
Stelle.
Modeling internet-scale policies for cleaning up malware.
In 10th Workshop on the Economics of Information Security
(WEIS), 2011.
[ bib |
paper |
publisher ]
|
[66]
|
Nektarios Leontiadis, Tyler Moore, and Nicolas Christin.
Measuring and analyzing search-redirection attacks in the illicit
online prescription drug trade.
In USENIX Security Symposium. USENIX Association, 2011.
[ bib |
paper |
publisher ]
|
[67]
|
Tyler Moore, Nektarios Leontiadis, and Nicolas Christin.
Fashion crimes: trending-term exploitation on the web.
In Yan Chen, George Danezis, and Vitaly Shmatikov, editors, ACM
Conference on Computer and Communications Security (CCS), pages 455--466.
ACM, 2011.
[ bib |
paper |
publisher |
presentation ]
|
[68]
|
Tyler Moore and Benjamin Edelman.
Measuring the perpetrators and funders of typosquatting.
In Radu Sion, editor, Financial Cryptography and Data Security,
volume 6052 of Lecture Notes in Computer Science, pages 175--191.
Springer, 2010.
[ bib |
data |
paper |
publisher |
presentation ]
|
[69]
|
Tal Moran and Tyler Moore.
The phish-market protocol: Securely sharing attack data between
competitors.
In Radu Sion, editor, Financial Cryptography and Data Security,
volume 6052 of Lecture Notes in Computer Science, pages 222--237.
Springer, 2010.
[ bib |
paper |
publisher |
presentation ]
|
[70]
|
Tyler Moore, Allan Friedman, and Ariel D. Procaccia.
Would a 'cyber warrior' protect us: exploring trade-offs between
attack and defense of information systems.
In Angelos D. Keromytis, Sean Peisert, Richard Ford, and Carrie
Gates, editors, New Security Paradigms Workshop (NSPW), pages 85--94.
ACM, 2010.
[ bib |
paper |
publisher ]
|
[71]
|
Tyler Moore and Richard Clayton.
Evil searching: Compromise and recompromise of internet hosts for
phishing.
In Roger Dingledine and Philippe Golle, editors, Financial
Cryptography and Data Security, volume 5628 of Lecture Notes in
Computer Science, pages 256--272. Springer, 2009.
[ bib |
paper |
publisher |
presentation ]
|
[72]
|
Tyler Moore, Richard Clayton, and Henry Stern.
Temporal correlations between spam and phishing websites.
In Proceedings of the 2nd USENIX conference on Large-scale
exploits and emergent threats: botnets, spyware, worms, and more, LEET'09,
Berkeley, CA, USA, 2009. USENIX Association.
[ bib |
paper |
publisher |
presentation ]
|
[73]
|
Rainer Böhme and Tyler Moore.
The iterated weakest link - a model of adaptive security investment.
In 8th Workshop on the Economics of Information Security
(WEIS), 2009.
[ bib |
paper |
publisher |
presentation ]
|
[74]
|
Tyler Moore and Richard Clayton.
Evaluating the wisdom of crowds in assessing phishing websites.
In Gene Tsudik, editor, Financial Cryptography and Data
Security, volume 5143 of Lecture Notes in Computer Science, pages
16--30. Springer, 2008.
[ bib |
paper |
publisher |
presentation ]
|
[75]
|
Tyler Moore and Richard Clayton.
The consequence of non-cooperation in the fight against phishing.
In APWG eCrime Researchers Summit, pages 1--14. IEEE, 2008.
[ bib |
paper |
publisher |
presentation ]
|
[76]
|
Tyler Moore, Maxim Raya, Jolyon Clulow, Panagiotis Papadimitratos, Ross
Anderson, and Jean-Pierre Hubaux.
Fast exclusion of errant devices from vehicular networks.
In Proceedings of the Fifth Annual IEEE Communications Society
Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON),
pages 135--143, 2008.
[ bib |
paper |
publisher ]
|
[77]
|
Tyler Moore and Richard Clayton.
An empirical analysis of the current state of phishing attack and
defence.
In 6th Workshop on the Economics of Information Security
(WEIS), 2007.
[ bib |
paper |
publisher |
presentation ]
|
[78]
|
Tyler Moore and Richard Clayton.
Examining the impact of website take-down on phishing.
In Lorrie Faith Cranor, editor, APWG eCrime Researchers Summit,
volume 269 of ACM International Conference Proceeding Series, pages
1--13. ACM, 2007.
[ bib |
paper |
publisher |
presentation ]
|
[79]
|
Tyler Moore and Jolyon Clulow.
Secure path-key revocation for symmetric key pre-distribution schemes
in sensor networks.
In Hein S. Venter, Mariki M. Eloff, Les Labuschagne, Jan H. P. Eloff,
and Rossouw von Solms, editors, Proceedings of the IFIP TC-11 22nd
International Information Security Conference (IFIP SEC), volume 232 of
IFIP, pages 157--168. Springer, 2007.
[ bib |
paper |
publisher |
presentation ]
|
[80]
|
Tyler Moore, Jolyon Clulow, Shishir Nagaraja, and Ross Anderson.
New strategies for revocation in ad-hoc networks.
In Frank Stajano, Catherine Meadows, Srdjan Capkun, and Tyler Moore,
editors, 4th European Workshop on Security and Privacy in Ad-hoc and
Sensor Networks (ESAS), volume 4572 of Lecture Notes in Computer
Science, pages 232--246. Springer, 2007.
[ bib |
paper |
publisher |
presentation ]
|
[81]
|
Tyler Moore.
The economics of digital forensics.
In 5th Workshop on the Economics of Information Security
(WEIS), 2006.
[ bib |
paper |
publisher ]
|
[82]
|
Tyler Moore.
A collusion attack on pairwise key predistribution schemes for
distributed sensor networks.
In 4th IEEE Conference on Pervasive Computing and Communications
Security (PerSec), pages 251--255. IEEE Computer Society, 2006.
[ bib |
paper |
publisher |
presentation ]
|
[83]
|
Jolyon Clulow, Gerhard P. Hancke, Markus G. Kuhn, and Tyler Moore.
So near and yet so far: Distance-bounding attacks in wireless
networks.
In Levente Buttyán, Virgil D. Gligor, and Dirk Westhoff, editors,
3rd European Workshop on Security and Privacy in Ad-hoc and Sensor
Networks (ESAS), volume 4357 of Lecture Notes in Computer Science,
pages 83--97. Springer, 2006.
[ bib |
paper |
publisher |
presentation ]
|
[84]
|
Tyler Moore.
Countering hidden-action attacks on networked systems.
In 4th Workshop on the Economics of Information Security
(WEIS), 2005.
[ bib |
paper |
publisher |
presentation ]
|
[85]
|
Gary Lorenz, Tyler Moore, Gavin Manes, John Hale, and Sujeet Shenoi.
Securing SS7 telecommunications networks.
In Second IEEE Systems, Man and Cybernetics Information
Assurance Workshop, June 2001.
[ bib ]
|
[1]
|
Neil Gandal, Tyler Moore, Michael Riordan, and Noa Barnir.
Empirically evaluating the effect of security precautions on cyber
incidents.
Computers & Security, 133:103380, October 2023.
[ bib |
paper |
publisher ]
|
[2]
|
Neil Gandal, J. T. Hamrick, Tyler Moore, and Marie Vasek.
The rise and fall of cryptocurrency coins and tokens.
Decisions in Economics and Finance, June 2021.
[ bib |
DOI |
publisher ]
|
[3]
|
Daniel W. Woods, Tyler Moore, and Andrew C. Simpson.
The county fair cyber loss distribution: Drawing inferences from
insurance prices.
Digital Threats: Research and Practice, 2(2), April 2021.
[ bib |
DOI |
paper |
publisher ]
|
[4]
|
J.T. Hamrick, Farhang Rouhi, Arghya Mukherjee, Amir Feder, Neil Gandal, Tyler
Moore, and Marie Vasek.
An examination of the cryptocurrency pump-and-dump ecosystem.
Information Processing & Management, 58(4):102506, 2021.
[ bib |
DOI |
paper |
publisher ]
|
[5]
|
Rainer Böhme, Lisa Eckey, Tyler Moore, Neha Narula, Tim Ruffing, and Aviv
Zohar.
Responsible vulnerability disclosure in cryptocurrencies.
Communications of the ACM, 63(10):62--71, 2020.
[ bib |
paper |
publisher ]
|
[6]
|
Daniel W. Woods and Tyler Moore.
Cyber warranties: market fix or marketing trick?
Communications of the ACM, 63(4):104--107, 2020.
[ bib |
paper |
publisher ]
|
[7]
|
Daniel W. Woods and Tyler Moore.
Does insurance have a future in governing cybersecurity?
IEEE Security & Privacy, 18(1), 2020.
[ bib |
paper ]
|
[8]
|
Tyler Moore, Nicolas Christin, and Janos Szurdi.
Revisiting the risks of bitcoin currency exchange closure.
ACM Transactions on Internet Technology, 18(4):50:1--50:18,
September 2018.
[ bib |
DOI |
paper |
publisher ]
|
[9]
|
Neil Gandal, JT Hamrick, Tyler Moore, and Tali Obermann.
Price manipulation in the Bitcoin ecosystem.
Journal of Monetary Economics, 95:86--96, May 2018.
[ bib |
DOI |
appendix |
paper ]
|
[10]
|
Joshua Rovner and Tyler Moore.
Does the internet need a hegemon?
Journal of Global Security Studies, 2(3):184--203, 2017.
[ bib |
DOI |
paper ]
|
[11]
|
Jake Drew, Michael Hahsler, and Tyler Moore.
Polymorphic malware detection using sequence classification methods
and ensembles.
EURASIP Journal on Information Security, 2017(1):2, 2017.
[ bib |
publisher ]
|
[12]
|
Mohammad Hanif Jhaveri, Orcun Cetin, Carlos Gañán, Tyler Moore, and
Michel Van Eeten.
Abuse reporting and the fight against cybercrime.
ACM Computing Surveys (CSUR), 49(4):68, 2017.
[ bib |
paper |
publisher ]
|
[13]
|
Orcun Cetin, Mohammad Hanif Jhaveri, Carlos Gañán, Michel van Eeten,
and Tyler Moore.
Understanding the role of sender reputation in abuse reporting and
cleanup.
Journal of Cybersecurity, 2(1):83--98, 2016.
[ bib |
publisher ]
|
[14]
|
Rainer Böhme and Tyler Moore.
The “iterated weakest link” model of adaptive security investment.
Journal of Information Security, 7(2):81--102, 2016.
[ bib |
paper |
publisher ]
|
[15]
|
Markus Riek, Rainer Böhme, and Tyler Moore.
Measuring the influence of perceived cybercrime risk on online
service avoidance.
IEEE Transactions on Dependable and Secure Computing,
13(2):261--273, 2016.
[ bib |
paper |
publisher ]
|
[16]
|
Marie Vasek, John Wadleigh, and Tyler Moore.
Hacking is not random: a case-control study of webserver-compromise
risk.
IEEE Transactions on Dependable and Secure Computing,
13(2):206--219, 2016.
[ bib |
paper |
publisher ]
|
[17]
|
Rainer Böhme, Nicolas Christin, Benjamin Edelman, and Tyler Moore.
Bitcoin: Economics, technology, and governance.
Journal of Economic Perspectives, 29(2):213--38, 2015.
[ bib |
DOI |
publisher ]
|
[18]
|
Jake Drew and Tyler Moore.
Optimized combined clustering methods for finding replicated criminal
websites.
EURASIP Journal on Information Security, 2014(14), 2014.
[ bib |
paper ]
|
[19]
|
Steve Papa, William Casper, and Tyler Moore.
Securing wastewater facilities from accidental and intentional harm:
a cost-benefit analysis.
International Journal of Critical Infrastructure Protection,
6(2):96--106, 2013.
[ bib |
paper |
publisher ]
|
[20]
|
Susan Landau and Tyler Moore.
Economic tussles in federated identity management.
First Monday, 17(10), 2012.
[ bib |
publisher |
presentation ]
|
[21]
|
Tyler Moore and Richard Clayton.
The impact of public information on phishing attack and defense.
Communications & Strategies, 1(81):45--68, 1st quart 2011.
[ bib |
paper |
publisher ]
|
[22]
|
Tal Moran and Tyler Moore.
The phish-market protocol: Secure sharing between competitors.
IEEE Security & Privacy, 8(4):40--45, 2010.
[ bib |
paper |
publisher ]
|
[23]
|
Rainer Böhme and Tyler Moore.
The iterated weakest link.
IEEE Security & Privacy, 8(1):53--55, 2010.
[ bib |
paper |
publisher ]
|
[24]
|
Tyler Moore.
The economics of cybersecurity: Principles and policy options.
International Journal of Critical Infrastructure Protection,
3(3--4):103 -- 117, 2010.
[ bib |
DOI |
paper |
publisher ]
|
[25]
|
Tyler Moore, Richard Clayton, and Ross Anderson.
The economics of online crime.
Journal of Economic Perspectives, 23(3):3--20, Summer 2009.
[ bib |
paper |
publisher ]
|
[26]
|
Ross Anderson and Tyler Moore.
The economics of information security.
Science, 314(5799):610--613, 2006.
[ bib |
DOI |
paper |
publisher ]
|
[27]
|
Jolyon Clulow and Tyler Moore.
Suicide for the common good: a new strategy for credential revocation
in self-organizing systems.
Operating Systems Review, 40(3):18--21, 2006.
[ bib |
publisher ]
|