Richard Clayton
Richard Clayton
Verified email at
Cited by
Cited by
Measuring the cost of cybercrime
R Anderson, C Barton, R Böhme, R Clayton, MJG Van Eeten, M Levi, ...
The economics of information security and privacy, 265-300, 2013
The economics of online crime
T Moore, R Clayton, R Anderson
Journal of Economic Perspectives 23 (3), 3-20, 2009
Ignoring the great firewall of china
R Clayton, SJ Murdoch, RNM Watson
Privacy Enhancing Technologies: 6th International Workshop, PET 2006 …, 2006
Examining the impact of website take-down on phishing
T Moore, R Clayton
Proceedings of the anti-phishing working groups 2nd annual eCrime …, 2007
Proof-of-work proves not to work; version 0.2
B Laurie, R Clayton
Workshop on economics and information, security, 2004
Security economics and the internal market
R Anderson, R Böhme, R Clayton, T Moore
Study commissioned by ENISA, 2008
Measuring the changing cost of cybercrime
R Anderson, C Barton, R Bölme, R Clayton, C Ganán, T Grasso, M Levi, ...
Crimebb: Enabling cybercrime research on underground forums at scale
S Pastrana, DR Thomas, A Hutchings, R Clayton
Proceedings of the 2018 World Wide Web Conference, 1845-1854, 2018
An Empirical Analysis of the Current State of Phishing Attack and Defence.
T Moore, R Clayton
WEIS, 2007
Exploring the provision of online booter services
A Hutchings, R Clayton
Deviant Behavior 37 (10), 1163-1178, 2016
Evaluating the wisdom of crowds in assessing phishing websites
T Moore, R Clayton
Financial Cryptography and Data Security: 12th International Conference, FC …, 2008
Evil searching: Compromise and recompromise of internet hosts for phishing
T Moore, R Clayton
Financial Cryptography and Data Security: 13th International Conference, FC …, 2009
The postmodern Ponzi scheme: Empirical analysis of high-yield investment programs
T Moore, J Han, R Clayton
Financial Cryptography and Data Security: 16th International Conference, FC …, 2012
The impact of incentives on notice and take-down
T Moore, R Clayton
Managing Information Risk and the Economics of Security, 199-223, 2008
Experience using a low-cost FPGA design to crack DES keys
R Clayton, M Bond
Cryptographic Hardware and Embedded Systems-CHES 2002: 4th International …, 2003
Introducing traffic analysis
G Danezis, R Clayton
Digital Privacy, 117-138, 2007
Security economics and European policy
R Anderson, R Böhme, R Clayton, T Moore
Managing information risk and the economics of security, 55-80, 2009
Stopping Spam by Extrusion Detection.
R Clayton
CEAS, 2004
Failures in a hybrid content blocking system
R Clayton
Privacy Enhancing Technologies: 5th International Workshop, PET 2005, Cavtat …, 2006
Ethical issues in research using datasets of illicit origin
DR Thomas, S Pastrana, A Hutchings, R Clayton, AR Beresford
Proceedings of the 2017 Internet Measurement Conference, 445-462, 2017
The system can't perform the operation now. Try again later.
Articles 1–20