Follow
Richard Clayton
Richard Clayton
Verified email at cam.ac.uk
Title
Cited by
Cited by
Year
Measuring the cost of cybercrime
R Anderson, C Barton, R Böhme, R Clayton, MJG Van Eeten, M Levi, ...
The economics of information security and privacy, 265-300, 2013
8272013
The economics of online crime
T Moore, R Clayton, R Anderson
Journal of Economic Perspectives 23 (3), 3-20, 2009
4092009
Ignoring the great firewall of china
R Clayton, SJ Murdoch, RNM Watson
Privacy Enhancing Technologies: 6th International Workshop, PET 2006 …, 2006
3692006
Examining the impact of website take-down on phishing
T Moore, R Clayton
Proceedings of the anti-phishing working groups 2nd annual eCrime …, 2007
3032007
Proof-of-work proves not to work; version 0.2
B Laurie, R Clayton
Workshop on economics and information, security, 2004
2522004
Security economics and the internal market
R Anderson, R Böhme, R Clayton, T Moore
Study commissioned by ENISA, 2008
1672008
Measuring the changing cost of cybercrime
R Anderson, C Barton, R Bölme, R Clayton, C Ganán, T Grasso, M Levi, ...
1602019
Crimebb: Enabling cybercrime research on underground forums at scale
S Pastrana, DR Thomas, A Hutchings, R Clayton
Proceedings of the 2018 World Wide Web Conference, 1845-1854, 2018
1482018
An Empirical Analysis of the Current State of Phishing Attack and Defence.
T Moore, R Clayton
WEIS, 2007
1282007
Exploring the provision of online booter services
A Hutchings, R Clayton
Deviant Behavior 37 (10), 1163-1178, 2016
1232016
Evaluating the wisdom of crowds in assessing phishing websites
T Moore, R Clayton
Financial Cryptography and Data Security: 12th International Conference, FC …, 2008
1172008
The postmodern Ponzi scheme: Empirical analysis of high-yield investment programs
T Moore, J Han, R Clayton
Financial Cryptography and Data Security: 16th International Conference, FC …, 2012
1162012
The impact of incentives on notice and take-down
T Moore, R Clayton
Managing Information Risk and the Economics of Security, 199-223, 2008
1072008
Evil searching: Compromise and recompromise of internet hosts for phishing
T Moore, R Clayton
Financial Cryptography and Data Security: 13th International Conference, FC …, 2009
1052009
Experience using a low-cost FPGA design to crack DES keys
R Clayton, M Bond
Cryptographic Hardware and Embedded Systems-CHES 2002: 4th International …, 2003
862003
Security economics and European policy
R Anderson, R Böhme, R Clayton, T Moore
Managing information risk and the economics of security, 55-80, 2009
802009
Introducing traffic analysis
G Danezis, R Clayton
Digital Privacy, 117-138, 2007
792007
Ethical issues in research using datasets of illicit origin
DR Thomas, S Pastrana, A Hutchings, R Clayton, AR Beresford
Proceedings of the 2017 Internet Measurement Conference, 445-462, 2017
782017
Stopping Spam by Extrusion Detection.
R Clayton
CEAS, 2004
742004
1000 days of UDP amplification DDoS attacks
DR Thomas, R Clayton, AR Beresford
2017 APWG Symposium on electronic crime research (eCrime), 79-84, 2017
722017
The system can't perform the operation now. Try again later.
Articles 1–20