Measuring the cost of cybercrime R Anderson, C Barton, R Böhme, R Clayton, MJG Van Eeten, M Levi, ... The economics of information security and privacy, 265-300, 2013 | 827 | 2013 |
The economics of online crime T Moore, R Clayton, R Anderson Journal of Economic Perspectives 23 (3), 3-20, 2009 | 409 | 2009 |
Ignoring the great firewall of china R Clayton, SJ Murdoch, RNM Watson Privacy Enhancing Technologies: 6th International Workshop, PET 2006 …, 2006 | 369 | 2006 |
Examining the impact of website take-down on phishing T Moore, R Clayton Proceedings of the anti-phishing working groups 2nd annual eCrime …, 2007 | 303 | 2007 |
Proof-of-work proves not to work; version 0.2 B Laurie, R Clayton Workshop on economics and information, security, 2004 | 252 | 2004 |
Security economics and the internal market R Anderson, R Böhme, R Clayton, T Moore Study commissioned by ENISA, 2008 | 167 | 2008 |
Measuring the changing cost of cybercrime R Anderson, C Barton, R Bölme, R Clayton, C Ganán, T Grasso, M Levi, ... | 160 | 2019 |
Crimebb: Enabling cybercrime research on underground forums at scale S Pastrana, DR Thomas, A Hutchings, R Clayton Proceedings of the 2018 World Wide Web Conference, 1845-1854, 2018 | 148 | 2018 |
An Empirical Analysis of the Current State of Phishing Attack and Defence. T Moore, R Clayton WEIS, 2007 | 128 | 2007 |
Exploring the provision of online booter services A Hutchings, R Clayton Deviant Behavior 37 (10), 1163-1178, 2016 | 123 | 2016 |
Evaluating the wisdom of crowds in assessing phishing websites T Moore, R Clayton Financial Cryptography and Data Security: 12th International Conference, FC …, 2008 | 117 | 2008 |
The postmodern Ponzi scheme: Empirical analysis of high-yield investment programs T Moore, J Han, R Clayton Financial Cryptography and Data Security: 16th International Conference, FC …, 2012 | 116 | 2012 |
The impact of incentives on notice and take-down T Moore, R Clayton Managing Information Risk and the Economics of Security, 199-223, 2008 | 107 | 2008 |
Evil searching: Compromise and recompromise of internet hosts for phishing T Moore, R Clayton Financial Cryptography and Data Security: 13th International Conference, FC …, 2009 | 105 | 2009 |
Experience using a low-cost FPGA design to crack DES keys R Clayton, M Bond Cryptographic Hardware and Embedded Systems-CHES 2002: 4th International …, 2003 | 86 | 2003 |
Security economics and European policy R Anderson, R Böhme, R Clayton, T Moore Managing information risk and the economics of security, 55-80, 2009 | 80 | 2009 |
Introducing traffic analysis G Danezis, R Clayton Digital Privacy, 117-138, 2007 | 79 | 2007 |
Ethical issues in research using datasets of illicit origin DR Thomas, S Pastrana, A Hutchings, R Clayton, AR Beresford Proceedings of the 2017 Internet Measurement Conference, 445-462, 2017 | 78 | 2017 |
Stopping Spam by Extrusion Detection. R Clayton CEAS, 2004 | 74 | 2004 |
1000 days of UDP amplification DDoS attacks DR Thomas, R Clayton, AR Beresford 2017 APWG Symposium on electronic crime research (eCrime), 79-84, 2017 | 72 | 2017 |