|
Tyler Moore and Richard Clayton.
Discovering phishing dropboxes using email metadata.
In 7th APWG eCrime Researchers Summit (eCrime), Las Croabas,
PR, October 2012.
[ bib |
paper |
presentation ]
|
|
Rainer Böhme and Tyler Moore.
How do consumers react to cybercrime?
In APWG eCrime Researchers Summit (eCrime), Las Croabas, PR,
October 2012.
[ bib |
paper |
presentation ]
|
|
William Casper and Stephen Papa.
A multi-disciplined security engineering education approach.
In Conference on Security and Management (SAM), July
2012.
[ bib |
publisher ]
|
|
John Impagliazzo, Susan Conry, Eric Durant, Andrew D. McGettrick, Mitchell A.
Thornton, and Timothy Wilson.
Computer engineering review task force report.
In Laurie A. Smith King, David R. Musicant, Tracy Camp, and Paul T.
Tymann, editors, SIGCSE, pages 401-402. ACM, February 2012.
[ bib |
paper |
publisher ]
|
|
Jennifer Dworak, Kundan Nepal, Nuno Alves, Yiwen Shi, Nicholas Imbriglia, and
R. Iris Bahar.
Using implications to choose tests through suspect fault
identification.
ACM Transactions on Design Automation of Electronic Systems,
18(1):14, 2012.
[ bib |
publisher ]
|
|
Elif Alpaslan, Bram Kruseman, Ananta K. Majhi, Wilmar M. Heuvelman, and
Jennifer Dworak.
NIM-X: A Noise Index Model-based X-filling technique
to overcome the power supply switching noise effects on path delay test.
IEEE Trans. on CAD of Integrated Circuits and Systems,
31(5):809-813, 2012.
[ bib |
publisher ]
|
|
Theodore W. Manikas.
Integrated circuit channel routing using a pareto-optimal genetic
algorithm.
Journal of Circuits, Systems, and Computers, 21(5), 2012.
[ bib |
publisher ]
|
|
Theodore W. Manikas, David Y. Feinstein, and Mitchell A. Thornton.
Modeling medical system threats with conditional probabilities using
multiple-valued logic decision diagrams.
In D. Michael Miller and Vincent C. Gaudet, editors, ISMVL,
pages 244-249. IEEE, 2012.
[ bib |
paper |
publisher ]
|
|
Susan Landau and Tyler Moore.
Economic tussles in federated identity management.
First Monday, 17(10), 2012.
[ bib |
publisher |
presentation ]
|
|
Benjamin Edwards, Tyler Moore, George Stelle, Steven A. Hofmeyr, and Stephanie
Forrest.
Beyond the blacklist: Modeling malware spread and the effect of
interventions.
In Proceedings of the New Security Paradigms Workshop,
Bertinoro, Italy, September 19-21, 2012. ACM, 2012.
[ bib |
paper ]
|
|
Marie Vasek and Tyler Moore.
Do malware reports expedite cleanup? An experimental study.
In Proceedings of the 5th USENIX conference on Cyber Security
Experimentation and Test, CSET'12, Berkeley, CA, USA, 2012. USENIX
Association.
[ bib |
paper |
publisher |
presentation ]
|
|
Ross Anderson, Chris Barton, Rainer Böhme, Richard Clayton, Michael van
Eeten, Michael Levi, Tyler Moore, and Stefan Savage.
Measuring the cost of cybercrime.
In WEIS, 2012.
[ bib |
paper |
presentation ]
|
|
Tyler Moore and Ross Anderson.
Internet security.
In Martin Peitz and Joel Waldfogel, editors, The Oxford Handbook
of the Digital Economy, pages 572-599. Oxford University Press, 2012.
[ bib |
paper |
publisher ]
|
|
Tyler Moore, Jie Han, and Richard Clayton.
The postmodern Ponzi scheme: Empirical analysis of high-yield
investment programs.
In Angelos D. Keromytis, editor, Financial Cryptography, volume
7397 of Lecture Notes in Computer Science, pages 41-56. Springer,
2012.
[ bib |
paper |
publisher |
presentation ]
|
|
Mitchell A. Thornton.
Professional licensure for software engineers: An update.
Computing in Science and Engineering, 14(5):85-87, 2012.
[ bib |
paper |
publisher ]
|
|
David Y. Feinstein and Mitchell A. Thornton.
Reversible logic synthesis based on decision diagram variable
ordering.
Multiple-Valued Logic and Soft Computing, 19(4):325-339, 2012.
[ bib |
paper |
publisher ]
|
|
Robert B. Reese, Scott C. Smith, and Mitchell A. Thornton.
Uncle - an RTL approach to asynchronous design.
In Jens Sparsø, Montek Singh, and Pascal Vivet, editors,
ASYNC, pages 65-72. IEEE Computer Society, May 2012.
[ bib |
paper |
publisher ]
|
|
Rohit P. Menon and Mitchell A. Thornton.
Global multiple-valued clock approach for high-performance
multi-phase clock integrated circuits.
In D. Michael Miller and Vincent C. Gaudet, editors, ISMVL,
pages 19-24. IEEE, 2012.
[ bib |
paper |
publisher ]
|
|
David Y. Feinstein and Mitchell A. Thornton.
Using the asynchronous paradigm for reversible sequential circuit
implementation.
In D. Michael Miller and Vincent C. Gaudet, editors, ISMVL,
pages 305-310. IEEE, 2012.
[ bib |
paper |
publisher ]
|