Follow
Richard Clayton
Richard Clayton
Verified email at cam.ac.uk
Title
Cited by
Cited by
Year
Measuring the cost of cybercrime
R Anderson, C Barton, R Böhme, R Clayton, MJG Van Eeten, M Levi, ...
The economics of information security and privacy, 265-300, 2013
7782013
The economics of online crime
T Moore, R Clayton, R Anderson
Journal of Economic Perspectives 23 (3), 3-20, 2009
3852009
Ignoring the great firewall of china
R Clayton, SJ Murdoch, RNM Watson
Privacy Enhancing Technologies: 6th International Workshop, PET 2006 …, 2006
3502006
Examining the impact of website take-down on phishing
T Moore, R Clayton
Proceedings of the anti-phishing working groups 2nd annual eCrime …, 2007
2872007
Proof-of-work proves not to work; version 0.2
B Laurie, R Clayton
Workshop on economics and information, security, 2004
2482004
Security economics and the internal market
R Anderson, R Böhme, R Clayton, T Moore
Study commissioned by ENISA, 2008
1612008
Measuring the changing cost of cybercrime
R Anderson, C Barton, R Bölme, R Clayton, C Ganán, T Grasso, M Levi, ...
1252019
An Empirical Analysis of the Current State of Phishing Attack and Defence.
T Moore, R Clayton
WEIS, 2007
1252007
Crimebb: Enabling cybercrime research on underground forums at scale
S Pastrana, DR Thomas, A Hutchings, R Clayton
Proceedings of the 2018 World Wide Web Conference, 1845-1854, 2018
1232018
Exploring the provision of online booter services
A Hutchings, R Clayton
Deviant Behavior 37 (10), 1163-1178, 2016
1172016
Evaluating the wisdom of crowds in assessing phishing websites
T Moore, R Clayton
Financial Cryptography and Data Security: 12th International Conference, FC …, 2008
1122008
Evil searching: Compromise and recompromise of internet hosts for phishing
T Moore, R Clayton
Financial Cryptography and Data Security: 13th International Conference, FC …, 2009
1042009
The postmodern Ponzi scheme: Empirical analysis of high-yield investment programs
T Moore, J Han, R Clayton
Financial Cryptography and Data Security: 16th International Conference, FC …, 2012
1022012
The impact of incentives on notice and take-down
T Moore, R Clayton
Managing Information Risk and the Economics of Security, 199-223, 2008
992008
Experience using a low-cost FPGA design to crack DES keys
R Clayton, M Bond
Cryptographic Hardware and Embedded Systems-CHES 2002: 4th International …, 2003
862003
Introducing traffic analysis
G Danezis, R Clayton
Digital Privacy, 117-138, 2007
802007
Security economics and European policy
R Anderson, R Böhme, R Clayton, T Moore
Managing information risk and the economics of security, 55-80, 2009
772009
Stopping Spam by Extrusion Detection.
R Clayton
CEAS, 2004
742004
Failures in a hybrid content blocking system
R Clayton
Privacy Enhancing Technologies: 5th International Workshop, PET 2005, Cavtat …, 2006
722006
The consequence of non-cooperation in the fight against phishing
T Moore, R Clayton
2008 eCrime Researchers Summit, 1-14, 2008
692008
The system can't perform the operation now. Try again later.
Articles 1–20