default search action
Richard Clayton 0001
Person information
- affiliation (PhD): University of Cambridge, Computer Laboratory, UK
Other persons with the same name
- Richard Clayton — disambiguation page
- Richard Clayton 0002 — Georgia Institute of Technology, Atlanta, GA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2018
- [j1]Rainer Böhme, Richard Clayton, Jens Grossklags, Katrina Ligett, Patrick Loiseau, Galina Schwartz:
Special Issue on the Economics of Security and Privacy: Guest Editors' Introduction. ACM Trans. Internet Techn. 18(4): 47:1-47:3 (2018)
Conference and Workshop Papers
- 2024
- [c41]Anh V. Vu, Daniel R. Thomas, Ben Collier, Alice Hutchings, Richard Clayton, Ross J. Anderson:
Getting Bored of Cyberwar: Exploring the Role of Low-level Cybercrime Actors in the Russia-Ukraine Conflict. WWW 2024: 1596-1607 - 2020
- [c40]Geoffrey Simpson, Tyler Moore, Richard Clayton:
Ten years of attacks on companies using visual impersonation of domain names. eCrime 2020: 1-12 - 2019
- [c39]Alexander Vetterl, Richard Clayton:
Honware: A Virtual Honeypot Framework for Capturing CPE and IoT Zero Days. eCrime 2019: 1-13 - [c38]Ben Collier, Daniel R. Thomas, Richard Clayton, Alice Hutchings:
Booting the Booters: Evaluating the Effects of Police Interventions in the Market for Denial-of-Service Attacks. Internet Measurement Conference 2019: 50-64 - [c37]Alexander Vetterl, Richard Clayton, Ian Walden:
Counting Outdated Honeypots: Legal and Useful. IEEE Symposium on Security and Privacy Workshops 2019: 224-229 - 2018
- [c36]Alexander Vetterl, Richard Clayton:
Bitter Harvest: Systematically Fingerprinting Low- and Medium-interaction Honeypots at Internet Scale. WOOT @ USENIX Security Symposium 2018 - [c35]Sergio Pastrana, Daniel R. Thomas, Alice Hutchings, Richard Clayton:
CrimeBB: Enabling Cybercrime Research on Underground Forums at Scale. WWW 2018: 1845-1854 - 2017
- [c34]Alice Hutchings, Richard Clayton:
Configuring Zeus: A case study of online crime target selection and knowledge transmission. eCrime 2017: 33-40 - [c33]Daniel R. Thomas, Richard Clayton, Alastair R. Beresford:
1000 days of UDP amplification DDoS attacks. eCrime 2017: 79-84 - [c32]Daniel R. Thomas, Sergio Pastrana, Alice Hutchings, Richard Clayton, Alastair R. Beresford:
Ethical issues in research using datasets of illicit origin. Internet Measurement Conference 2017: 445-462 - 2016
- [c31]Alice Hutchings, Richard Clayton, Ross J. Anderson:
Taking down websites to prevent crime. eCrime 2016: 102-111 - 2015
- [c30]Tyler Moore, Richard Clayton:
Which malware lures work best? Measurements from a large instant messaging worm. eCrime 2015: 69-78 - [c29]Richard Clayton, Tyler Moore, Nicolas Christin:
Concentrating Correctly on Cybercrime Concentration. WEIS 2015 - 2014
- [c28]Jens Neisius, Richard Clayton:
Orchestrated crime: The high yield investment fraud ecosystem. eCrime 2014: 48-58 - [c27]Tyler Moore, Richard Clayton:
The Ghosts of Banking Past: Empirical Analysis of Closed Bank Websites. Financial Cryptography 2014: 33-48 - 2012
- [c26]Tyler Moore, Richard Clayton:
Discovering phishing dropboxes using email metadata. eCrime Researchers Summit 2012: 1-9 - [c25]Tyler Moore, Jie Han, Richard Clayton:
The Postmodern Ponzi Scheme: Empirical Analysis of High-Yield Investment Programs. Financial Cryptography 2012: 41-56 - [c24]Ross J. Anderson, Chris Barton, Rainer Böhme, Richard Clayton, Michel van Eeten, Michael Levi, Tyler Moore, Stefan Savage:
Measuring the Cost of Cybercrime. WEIS 2012 - 2011
- [c23]Tyler Moore, Richard Clayton:
Ethical Dilemmas in Take-Down Research. Financial Cryptography Workshops 2011: 154-168 - [c22]Chris Hall, Ross J. Anderson, Richard Clayton, Evangelos Ouzounis, Panagiotis Trimintzios:
Resilience of the Internet Interconnection Ecosystem. WEIS 2011 - [c21]Chris Hall, Ross J. Anderson, Richard Clayton, Evangelos Ouzounis, Panagiotis Trimintzios:
Resilience of the Internet Interconnection Ecosystem. WEIS (Springer Volume) 2011: 119-148 - 2009
- [c20]Tyler Moore, Richard Clayton:
Evil Searching: Compromise and Recompromise of Internet Hosts for Phishing. Financial Cryptography 2009: 256-272 - [c19]Tyler Moore, Richard Clayton:
Temporal Correlations between Spam and Phishing Websites. LEET 2009 - 2008
- [c18]Tyler Moore, Richard Clayton:
The consequence of non-cooperation in the fight against phishing. eCrime 2008: 1-14 - [c17]Tyler Moore, Richard Clayton:
Evaluating the Wisdom of Crowds in Assessing Phishing Websites. Financial Cryptography 2008: 16-30 - [c16]Ross J. Anderson, Rainer Böhme, Richard Clayton, Tyler Moore:
Security Economics and European Policy. ISSE 2008: 57-76 - [c15]Frank Stajano, Richard Clayton:
Cyberdice: Peer-to-Peer Gambling in the Presence of Cheaters. Security Protocols Workshop 2008: 54-70 - [c14]Ross J. Anderson, Rainer Böhme, Richard Clayton, Tyler Moore:
Security Economics and European Policy. WEIS 2008 - [c13]Tyler Moore, Richard Clayton:
The Impact of Incentives on Notice and Take-down. WEIS 2008 - 2007
- [c12]Tyler Moore, Richard Clayton:
Examining the impact of website take-down on phishing. eCrime Researchers Summit 2007: 1-13 - [c11]Tyler Moore, Richard Clayton:
An Empirical Analysis of the Current State of Phishing Attack and Defence. WEIS 2007 - 2006
- [c10]George Danezis, Richard Clayton:
Route Fingerprinting in Anonymous Communications. Peer-to-Peer Computing 2006: 69-72 - [c9]Richard Clayton, Steven J. Murdoch, Robert N. M. Watson:
Ignoring the Great Firewall of China. Privacy Enhancing Technologies 2006: 20-35 - 2005
- [c8]Richard Clayton, Drew Dean, Markus Jakobsson, Steven A. Myers, Stuart G. Stubblebine, Michael Szydlo:
A Chat at the Old Phishin' Hole. Financial Cryptography 2005: 88 - [c7]Richard Clayton:
Who'd Phish from the Summit of Kilimanjaro?. Financial Cryptography 2005: 91-92 - [c6]Richard Clayton:
Failures in a Hybrid Content Blocking System. Privacy Enhancing Technologies 2005: 78-92 - [c5]Richard Clayton:
Insecure Real-World Authentication Protocols (or Why Phishing Is So Profitable). Security Protocols Workshop 2005: 82-88 - [c4]Andrei Serjantov, Richard Clayton:
Modeling Incentives for Email Blocking Strategies. WEIS 2005 - 2002
- [c3]Richard Clayton, Mike Bond:
Experience Using a Low-Cost FPGA Design to Crack DES Keys. CHES 2002: 579-592 - [c2]Richard Clayton, George Danezis:
Chaffinch: Confidentiality in the Face of Legal Threats. Information Hiding 2002: 70-86 - 2001
- [c1]Richard Clayton, George Danezis, Markus G. Kuhn:
Real World Patterns of Failure in Anonymity Systems. Information Hiding 2001: 230-244
Parts in Books or Collections
- 2013
- [p3]Ross J. Anderson, Chris Barton, Rainer Böhme, Richard Clayton, Michel J. G. van Eeten, Michael Levi, Tyler Moore, Stefan Savage:
Measuring the Cost of Cybercrime. The Economics of Information Security and Privacy 2013: 265-300 - 2009
- [p2]Ross J. Anderson, Rainer Böhme, Richard Clayton, Tyler Moore:
Security Economics and European Policy. Managing Information Risk and the Economics of Security 2009: 55-80 - [p1]Tyler Moore, Richard Clayton:
The Impact of Incentives on Notice and Take-down. Managing Information Risk and the Economics of Security 2009: 199-223
Informal and Other Publications
- 2022
- [i4]Anh V. Vu, Daniel R. Thomas, Ben Collier, Alice Hutchings, Richard Clayton, Ross J. Anderson:
Getting Bored of Cyberwar: Exploring the Role of the Cybercrime Underground in the Russia-Ukraine Conflict. CoRR abs/2208.10629 (2022) - 2020
- [i3]Maria Bada, Richard Clayton:
Online Suicide Games: A Form of Digital Self-harm or A Myth? CoRR abs/2012.00530 (2020) - 2019
- [i2]Sophie van der Zee, Richard Clayton, Ross J. Anderson:
The gift of the gab: Are rental scammers skilled at the art of persuasion? CoRR abs/1911.08253 (2019) - 2012
- [i1]Richard Clayton, Murray S. Kucherawy:
Source Ports in Abuse Reporting Format (ARF) Reports. RFC 6692: 1-5 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint