Tyler Moore
Orcid: 0000-0002-8771-8191Affiliations:
- The University of Tulsa, OK, USA
- Southern Methodist University, TX, USA (former)
- University of Cambridge, UK (former)
According to our database1,
Tyler Moore
authored at least 98 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on smu.edu
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024
Proceedings of the 30th Americas Conference on Information Systems: Elevating Life through Digital Social Entrepreneurship, 2024
2023
Comput. Secur., October, 2023
Proceedings of the IEEE European Symposium on Security and Privacy, 2023
Proceedings of the IEEE European Symposium on Security and Privacy, 2023
2022
Proceedings of the Passive and Active Measurement - 23rd International Conference, 2022
"Invest in crypto!": An analysis of investment scam advertisements found in Bitcointalk.
Proceedings of the APWG Symposium on Electronic Crime Research, 2022
Proceedings of the APWG Symposium on Electronic Crime Research, 2022
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022
2021
Inf. Process. Manag., 2021
DTRAP, 2021
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2021
SoK: A Framework for Asset Discovery: Systematizing Advances in Network Measurements for Protecting Organizations.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021
Proceedings of the DeFi '21: Proceedings of the 2021 ACM CCS Workshop on Decentralized Finance and Security, 2021
2020
Proceedings of the APWG Symposium on Electronic Crime Research, 2020
Proceedings of the APWG Symposium on Electronic Crime Research, 2020
2018
ACM Trans. Internet Techn., 2018
Proceedings of the 11th USENIX Workshop on Cyber Security Experimentation and Test, 2018
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018
Proceedings of the Financial Cryptography and Data Security, 2018
2017
Int. J. Crit. Infrastructure Prot., 2017
EURASIP J. Inf. Secur., 2017
The impact of DDoS and other security shocks on Bitcoin currency exchanges: evidence from Mt. Gox.
J. Cybersecur., 2017
Proceedings of the 2017 New Security Paradigms Workshop, 2017
Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
IEEE Trans. Dependable Secur. Comput., 2016
IEEE Trans. Dependable Secur. Comput., 2016
Dagstuhl Reports, 2016
J. Cybersecur., 2016
Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016
Proceedings of the Financial Cryptography and Data Security, 2016
Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security, 2016
2015
The E-Commerce Market for "Lemons": Identification and Analysis of Websites Selling Counterfeit Goods.
Proceedings of the 24th International Conference on World Wide Web, 2015
Proceedings of the 14th Annual Workshop on the Economics of Information Security, 2015
There's No Free Lunch, Even Using Bitcoin: Tracking the Popularity and Profits of Virtual Currency Scams.
Proceedings of the Financial Cryptography and Data Security, 2015
Proceedings of the 2015 APWG Symposium on Electronic Crime Research, 2015
2014
EURASIP J. Inf. Secur., 2014
Proceedings of the 35. IEEE Security and Privacy Workshops, 2014
Proceedings of the Financial Cryptography and Data Security, 2014
Proceedings of the Financial Cryptography and Data Security, 2014
Proceedings of the Financial Cryptography and Data Security, 2014
Proceedings of the Financial Cryptography and Data Security, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
Securing wastewater facilities from accidental and intentional harm: A cost-benefit analysis.
Int. J. Crit. Infrastructure Prot., 2013
Int. J. Crit. Infrastructure Prot., 2013
Proceedings of the fourteenth ACM Conference on Electronic Commerce, 2013
Proceedings of the Financial Cryptography and Data Security, 2013
Proceedings of the 2013 APWG eCrime Researchers Summit, 2013
Proceedings of the Economics of Information Security and Privacy, 2013
2012
Proceedings of the 11th Annual Workshop on the Economics of Information Security, 2012
Proceedings of the 5th Workshop on Cyber Security Experimentation and Test, 2012
Proceedings of the New Security Paradigms Workshop, 2012
Proceedings of the Financial Cryptography and Data Security, 2012
Proceedings of the 2012 eCrime Researchers Summit, 2012
Proceedings of the 2012 eCrime Researchers Summit, 2012
2011
Proceedings of the 10th Annual Workshop on the Economics of Information Security, 2011
Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade.
Proceedings of the 20th USENIX Security Symposium, 2011
Proceedings of the Financial Cryptography and Data Security, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
2010
Int. J. Crit. Infrastructure Prot., 2010
IEEE Secur. Priv., 2010
Would a 'cyber warrior' protect us: exploring trade-offs between attack and defense of information systems.
Proceedings of the 2010 Workshop on New Security Paradigms, 2010
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010
2009
Proceedings of the 8th Annual Workshop on the Economics of Information Security, 2009
Proceedings of the 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2009
Proceedings of the Financial Cryptography and Data Security, 2009
Proceedings of the Managing Information Risk and the Economics of Security, 2009
Proceedings of the Managing Information Risk and the Economics of Security, 2009
2008
Proceedings of the 7th Annual Workshop on the Economics of Information Security, 2008
Proceedings of the Fifth Annual IEEE Communications Society Conference on Sensor, 2008
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008
Proceedings of the 2008 eCrime Researchers Summit, 2008
2007
Proceedings of the 6th Annual Workshop on the Economics of Information Security, 2007
Secure Path-Key Revocation for Symmetric Key Pre-distribution Schemes in Sensor Networks.
Proceedings of the New Approaches for Security, 2007
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2007
Proceedings of the Anti-Phishing Working Groups 2nd Annual eCrime Researchers Summit 2007, 2007
Proceedings of the Advances in Cryptology, 2007
2006
Suicide for the common good: a new strategy for credential revocation in self-organizing systems.
ACM SIGOPS Oper. Syst. Rev., 2006
Proceedings of the 5th Annual Workshop on the Economics of Information Security, 2006
A Collusion Attack on Pairwise Key Predistribution Schemes for Distributed Sensor Networks.
Proceedings of the 4th IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2006 Workshops), 2006
Proceedings of the Advances in Digital Forensics II - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 29, 2006
Proceedings of the Security and Privacy in Ad-Hoc and Sensor Networks, 2006
2005
Proceedings of the 4th Annual Workshop on the Economics of Information Security, 2005
Proceedings of the Advances in Digital Forensics, 2005