Richard Clayton

Affiliations:
  • University of Cambridge, Computer Laboratory, UK (PhD)


According to our database1, Richard Clayton authored at least 46 papers between 2001 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Getting Bored of Cyberwar: Exploring the Role of the Cybercrime Underground in the Russia-Ukraine Conflict.
CoRR, 2022

2020
Online Suicide Games: A Form of Digital Self-harm or A Myth?
CoRR, 2020

Ten years of attacks on companies using visual impersonation of domain names.
Proceedings of the APWG Symposium on Electronic Crime Research, 2020

2019
The gift of the gab: Are rental scammers skilled at the art of persuasion?
CoRR, 2019

Counting Outdated Honeypots: Legal and Useful.
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019

Booting the Booters: Evaluating the Effects of Police Interventions in the Market for Denial-of-Service Attacks.
Proceedings of the Internet Measurement Conference, 2019

Honware: A Virtual Honeypot Framework for Capturing CPE and IoT Zero Days.
Proceedings of the 2019 APWG Symposium on Electronic Crime Research, 2019

2018
Special Issue on the Economics of Security and Privacy: Guest Editors' Introduction.
ACM Trans. Internet Techn., 2018

CrimeBB: Enabling Cybercrime Research on Underground Forums at Scale.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018

Bitter Harvest: Systematically Fingerprinting Low- and Medium-interaction Honeypots at Internet Scale.
Proceedings of the 12th USENIX Workshop on Offensive Technologies, 2018

2017
Ethical issues in research using datasets of illicit origin.
Proceedings of the 2017 Internet Measurement Conference, 2017

1000 days of UDP amplification DDoS attacks.
Proceedings of the 2017 APWG Symposium on Electronic Crime Research, 2017

Configuring Zeus: A case study of online crime target selection and knowledge transmission.
Proceedings of the 2017 APWG Symposium on Electronic Crime Research, 2017

2016
Taking down websites to prevent crime.
Proceedings of the 2016 APWG Symposium on Electronic Crime Research, 2016

2015
Concentrating Correctly on Cybercrime Concentration.
Proceedings of the 14th Annual Workshop on the Economics of Information Security, 2015

Which malware lures work best? Measurements from a large instant messaging worm.
Proceedings of the 2015 APWG Symposium on Electronic Crime Research, 2015

2014
The Ghosts of Banking Past: Empirical Analysis of Closed Bank Websites.
Proceedings of the Financial Cryptography and Data Security, 2014

Orchestrated crime: The high yield investment fraud ecosystem.
Proceedings of the 2014 APWG Symposium on Electronic Crime Research, 2014

2013
Measuring the Cost of Cybercrime.
Proceedings of the Economics of Information Security and Privacy, 2013

2012
Source Ports in Abuse Reporting Format (ARF) Reports.
RFC, July, 2012

Measuring the Cost of Cybercrime.
Proceedings of the 11th Annual Workshop on the Economics of Information Security, 2012

The Postmodern Ponzi Scheme: Empirical Analysis of High-Yield Investment Programs.
Proceedings of the Financial Cryptography and Data Security, 2012

Discovering phishing dropboxes using email metadata.
Proceedings of the 2012 eCrime Researchers Summit, 2012

2011
Resilience of the Internet Interconnection Ecosystem.
Proceedings of the Economics of Information Security and Privacy III [papers from the Tenth Workshop on Economics and Information Security, 2011

Ethical Dilemmas in Take-Down Research.
Proceedings of the Financial Cryptography and Data Security, 2011

2009
Temporal Correlations between Spam and Phishing Websites.
Proceedings of the 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2009

Evil Searching: Compromise and Recompromise of Internet Hosts for Phishing.
Proceedings of the Financial Cryptography and Data Security, 2009

The Impact of Incentives on Notice and Take-down.
Proceedings of the Managing Information Risk and the Economics of Security, 2009

Security Economics and European Policy.
Proceedings of the Managing Information Risk and the Economics of Security, 2009

2008
The Impact of Incentives on Notice and Take-down.
Proceedings of the 7th Annual Workshop on the Economics of Information Security, 2008

Security Economics and European Policy.
Proceedings of the 7th Annual Workshop on the Economics of Information Security, 2008

Cyberdice: Peer-to-Peer Gambling in the Presence of Cheaters.
Proceedings of the Security Protocols XVI, 2008

Evaluating the Wisdom of Crowds in Assessing Phishing Websites.
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008

The consequence of non-cooperation in the fight against phishing.
Proceedings of the 2008 eCrime Researchers Summit, 2008

2007
An Empirical Analysis of the Current State of Phishing Attack and Defence.
Proceedings of the 6th Annual Workshop on the Economics of Information Security, 2007

Examining the impact of website take-down on phishing.
Proceedings of the Anti-Phishing Working Groups 2nd Annual eCrime Researchers Summit 2007, 2007

2006
Ignoring the Great Firewall of China.
Proceedings of the Privacy Enhancing Technologies, 6th International Workshop, 2006

Route Fingerprinting in Anonymous Communications.
Proceedings of the Sixth IEEE International Conference on Peer-to-Peer Computing (P2P 2006), 2006

2005
Modeling Incentives for Email Blocking Strategies.
Proceedings of the 4th Annual Workshop on the Economics of Information Security, 2005

Insecure Real-World Authentication Protocols (or Why Phishing Is So Profitable).
Proceedings of the Security Protocols, 2005

Failures in a Hybrid Content Blocking System.
Proceedings of the Privacy Enhancing Technologies, 5th International Workshop, 2005

A Chat at the Old Phishin' Hole.
Proceedings of the Financial Cryptography and Data Security, 2005

Who'd Phish from the Summit of Kilimanjaro?.
Proceedings of the Financial Cryptography and Data Security, 2005

2002
Chaffinch: Confidentiality in the Face of Legal Threats.
Proceedings of the Information Hiding, 5th International Workshop, 2002

Experience Using a Low-Cost FPGA Design to Crack DES Keys.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2002

2001
Real World Patterns of Failure in Anonymity Systems.
Proceedings of the Information Hiding, 4th International Workshop, 2001


  Loading...