Tyler Moore

Orcid: 0000-0002-8771-8191

Affiliations:
  • The University of Tulsa, OK, USA
  • Southern Methodist University, TX, USA (former)
  • University of Cambridge, UK (former)


According to our database1, Tyler Moore authored at least 98 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Identifying Subdomain Doppelganger Attacks against Companies.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

Leveraging Situational Judgment Tests to Measure Behavioral Information Security.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

Construction and Analysis of a Large-Scale Firm-Level Cybersecurity Posture Dataset.
Proceedings of the 30th Americas Conference on Information Systems: Elevating Life through Digital Social Entrepreneurship, 2024

2023
Empirically evaluating the effect of security precautions on cyber incidents.
Comput. Secur., October, 2023

How Cryptocurrency Exchange Interruptions Create Arbitrage Opportunities.
Proceedings of the IEEE European Symposium on Security and Privacy, 2023

On Gaps in Enterprise Cyber Attack Reporting.
Proceedings of the IEEE European Symposium on Security and Privacy, 2023

2022
Longitudinal Study of Internet-Facing OpenSSH Update Patterns.
Proceedings of the Passive and Active Measurement - 23rd International Conference, 2022

"Invest in crypto!": An analysis of investment scam advertisements found in Bitcointalk.
Proceedings of the APWG Symposium on Electronic Crime Research, 2022

Cryptocurrency Exchange Closure Revisited (Again).
Proceedings of the APWG Symposium on Electronic Crime Research, 2022

Towards Cost-Balanced Intrusion Detection in OT Environments.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022

2021
An examination of the cryptocurrency pump-and-dump ecosystem.
Inf. Process. Manag., 2021

The County Fair Cyber Loss Distribution: Drawing Inferences from Insurance Prices.
DTRAP, 2021

Detecting Text Reuse in Cryptocurrency Whitepapers.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2021

SoK: A Framework for Asset Discovery: Systematizing Advances in Network Measurements for Protecting Organizations.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

Analyzing Target-Based Cryptocurrency Pump and Dump Schemes.
Proceedings of the DeFi '21: Proceedings of the 2021 ACM CCS Workshop on Decentralized Finance and Security, 2021

2020
Does Insurance Have a Future in Governing Cybersecurity?
IEEE Secur. Priv., 2020

Cyber warranties: market fix or marketing trick?
Commun. ACM, 2020

Responsible vulnerability disclosure in cryptocurrencies.
Commun. ACM, 2020

Ten years of attacks on companies using visual impersonation of domain names.
Proceedings of the APWG Symposium on Electronic Crime Research, 2020

Empirical Analysis of Losses from Business-Email Compromise.
Proceedings of the APWG Symposium on Electronic Crime Research, 2020

2018
Revisiting the Risks of Bitcoin Currency Exchange Closure.
ACM Trans. Internet Techn., 2018

Cybersecurity Research Datasets: Taxonomy and Empirical Analysis.
Proceedings of the 11th USENIX Workshop on Cyber Security Experimentation and Test, 2018

Economic Analyses of Security Investments on Cryptocurrency Exchanges.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

Analyzing the Bitcoin Ponzi Scheme Ecosystem.
Proceedings of the Financial Cryptography and Data Security, 2018

2017
On the harms arising from the Equifax data breach of 2017.
Int. J. Crit. Infrastructure Prot., 2017

Polymorphic malware detection using sequence classification methods and ensembles.
EURASIP J. Inf. Secur., 2017

The impact of DDoS and other security shocks on Bitcoin currency exchanges: evidence from Mt. Gox.
J. Cybersecur., 2017

Abuse Reporting and the Fight Against Cybercrime.
ACM Comput. Surv., 2017

Practicing a Science of Security: A Philosophy of Science Perspective.
Proceedings of the 2017 New Security Paradigms Workshop, 2017

Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Hacking Is Not Random: A Case-Control Study of Webserver-Compromise Risk.
IEEE Trans. Dependable Secur. Comput., 2016

Measuring the Influence of Perceived Cybercrime Risk on Online Service Avoidance.
IEEE Trans. Dependable Secur. Comput., 2016

The dangers of cyber security folk wisdom.
Int. J. Crit. Infrastructure Prot., 2016

Assessing ICT Security Risks in Socio-Technical Systems (Dagstuhl Seminar 16461).
Dagstuhl Reports, 2016

Introduction.
J. Cybersecur., 2016

Editorial.
J. Cybersecur., 2016

Understanding the role of sender reputation in abuse reporting and cleanup.
J. Cybersecur., 2016

Polymorphic Malware Detection Using Sequence Classification Methods.
Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016

The Bitcoin Brain Drain: Examining the Use and Abuse of Bitcoin Brain Wallets.
Proceedings of the Financial Cryptography and Data Security, 2016

Measuring the Impact of Sharing Abuse Data with Web Hosting Providers.
Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security, 2016

2015
Welcome from the Editors-in-Chief.
J. Cybersecur., 2015

The E-Commerce Market for "Lemons": Identification and Analysis of Websites Selling Counterfeit Goods.
Proceedings of the 24th International Conference on World Wide Web, 2015

Concentrating Correctly on Cybercrime Concentration.
Proceedings of the 14th Annual Workshop on the Economics of Information Security, 2015

There's No Free Lunch, Even Using Bitcoin: Tracking the Popularity and Profits of Virtual Currency Scams.
Proceedings of the Financial Cryptography and Data Security, 2015

Which malware lures work best? Measurements from a large instant messaging worm.
Proceedings of the 2015 APWG Symposium on Electronic Crime Research, 2015

2014
Optimized combined-clustering methods for finding replicated criminal websites.
EURASIP J. Inf. Secur., 2014

Automatic Identification of Replicated Criminal Websites Using Combined Clustering.
Proceedings of the 35. IEEE Security and Privacy Workshops, 2014

Empirical Analysis of Denial-of-Service Attacks in the Bitcoin Ecosystem.
Proceedings of the Financial Cryptography and Data Security, 2014

Identifying Risk Factors for Webserver Compromise.
Proceedings of the Financial Cryptography and Data Security, 2014

The Ghosts of Banking Past: Empirical Analysis of Closed Bank Websites.
Proceedings of the Financial Cryptography and Data Security, 2014

Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools.
Proceedings of the Financial Cryptography and Data Security, 2014

A Nearly Four-Year Longitudinal Study of Search-Engine Poisoning.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Securing wastewater facilities from accidental and intentional harm: A cost-benefit analysis.
Int. J. Crit. Infrastructure Prot., 2013

The promise and perils of digital currencies.
Int. J. Crit. Infrastructure Prot., 2013

Pick your poison: pricing and inventories at unlicensed online pharmacies.
Proceedings of the fourteenth ACM Conference on Electronic Commerce, 2013

Beware the Middleman: Empirical Analysis of Bitcoin-Exchange Risk.
Proceedings of the Financial Cryptography and Data Security, 2013

Empirical analysis of factors affecting malware URL detection.
Proceedings of the 2013 APWG eCrime Researchers Summit, 2013

Measuring the Cost of Cybercrime.
Proceedings of the Economics of Information Security and Privacy, 2013

2012
Economic tussles in federated identity management.
First Monday, 2012

Measuring the Cost of Cybercrime.
Proceedings of the 11th Annual Workshop on the Economics of Information Security, 2012

Do Malware Reports Expedite Cleanup? An Experimental Study.
Proceedings of the 5th Workshop on Cyber Security Experimentation and Test, 2012

Beyond the blacklist: modeling malware spread and the effect of interventions.
Proceedings of the New Security Paradigms Workshop, 2012

The Postmodern Ponzi Scheme: Empirical Analysis of High-Yield Investment Programs.
Proceedings of the Financial Cryptography and Data Security, 2012

Discovering phishing dropboxes using email metadata.
Proceedings of the 2012 eCrime Researchers Summit, 2012

How do consumers react to cybercrime?
Proceedings of the 2012 eCrime Researchers Summit, 2012

2011
Modeling Internet-Scale Policies for Cleaning up Malware.
Proceedings of the 10th Annual Workshop on the Economics of Information Security, 2011

Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade.
Proceedings of the 20th USENIX Security Symposium, 2011

Ethical Dilemmas in Take-Down Research.
Proceedings of the Financial Cryptography and Data Security, 2011

Fashion crimes: trending-term exploitation on the web.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
The economics of cybersecurity: Principles and policy options.
Int. J. Crit. Infrastructure Prot., 2010

The Phish-Market Protocol: Secure Sharing Between Competitors.
IEEE Secur. Priv., 2010

The Iterated Weakest Link.
IEEE Secur. Priv., 2010

Would a 'cyber warrior' protect us: exploring trade-offs between attack and defense of information systems.
Proceedings of the 2010 Workshop on New Security Paradigms, 2010

The Phish-Market Protocol: Securely Sharing Attack Data between Competitors.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

Measuring the Perpetrators and Funders of Typosquatting.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

2009
The Iterated Weakest Link - A Model of Adaptive Security Investment.
Proceedings of the 8th Annual Workshop on the Economics of Information Security, 2009

Temporal Correlations between Spam and Phishing Websites.
Proceedings of the 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2009

Evil Searching: Compromise and Recompromise of Internet Hosts for Phishing.
Proceedings of the Financial Cryptography and Data Security, 2009

The Impact of Incentives on Notice and Take-down.
Proceedings of the Managing Information Risk and the Economics of Security, 2009

Security Economics and European Policy.
Proceedings of the Managing Information Risk and the Economics of Security, 2009

2008
Cooperative attack and defense in distributed networks.
PhD thesis, 2008

The Impact of Incentives on Notice and Take-down.
Proceedings of the 7th Annual Workshop on the Economics of Information Security, 2008

Fast Exclusion of Errant Devices from Vehicular Networks.
Proceedings of the Fifth Annual IEEE Communications Society Conference on Sensor, 2008

Security Economics and European Policy.
Proceedings of the ISSE 2008, 2008

Evaluating the Wisdom of Crowds in Assessing Phishing Websites.
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008

The consequence of non-cooperation in the fight against phishing.
Proceedings of the 2008 eCrime Researchers Summit, 2008

2007
An Empirical Analysis of the Current State of Phishing Attack and Defence.
Proceedings of the 6th Annual Workshop on the Economics of Information Security, 2007

Secure Path-Key Revocation for Symmetric Key Pre-distribution Schemes in Sensor Networks.
Proceedings of the New Approaches for Security, 2007

New Strategies for Revocation in Ad-Hoc Networks.
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2007

Examining the impact of website take-down on phishing.
Proceedings of the Anti-Phishing Working Groups 2nd Annual eCrime Researchers Summit 2007, 2007

Information Security Economics - and Beyond.
Proceedings of the Advances in Cryptology, 2007

2006
Suicide for the common good: a new strategy for credential revocation in self-organizing systems.
ACM SIGOPS Oper. Syst. Rev., 2006

The Economics of Digital Forensics.
Proceedings of the 5th Annual Workshop on the Economics of Information Security, 2006

A Collusion Attack on Pairwise Key Predistribution Schemes for Distributed Sensor Networks.
Proceedings of the 4th IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2006 Workshops), 2006

GSM Cell Site Forensics.
Proceedings of the Advances in Digital Forensics II - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 29, 2006

So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks.
Proceedings of the Security and Privacy in Ad-Hoc and Sensor Networks, 2006

2005
Countering Hidden-Action Attacks on Networked Systems.
Proceedings of the 4th Annual Workshop on the Economics of Information Security, 2005

Using Signaling Information in Telecom Network Forensics.
Proceedings of the Advances in Digital Forensics, 2005


  Loading...