Follow
Josiah Dykstra
Josiah Dykstra
Trail of Bits
Verified email at trailofbits.com - Homepage
Title
Cited by
Cited by
Year
Acquiring Forensic Evidence from Infrastructure-as-a-Service Cloud Computing
J Dykstra, AT Sherman
Digital Investigation 9, S90-S98, 2012
3962012
Correlating Human Traits and Cybersecurity Behavior Intentions
M Gratian, S Bandi, M Cukier, J Dykstra, A Ginther
Computers & Security 73, 345–358, 2017
3382017
Design and Implementation of FROST: Digital Forensic Tools for the OpenStack Cloud Computing Platform
J Dykstra, AT Sherman
13th Annual Digital Forensics Research Workshop (DFRWS) 10, S87–S95, 2013
2482013
Understanding Issues in Cloud Forensics: Two Hypothetical Case Studies
J Dykstra, AT Sherman
Journal of Network Forensics 3 (1), 19-31, 2011
1332011
Will UML 2.0 be agile or awkward?
C Kobryn
Communications of the ACM 45 (1), 107-110, 2002
942002
Cyber Operations Stress Survey (COSS): Studying fatigue, frustration, and cognitive workload in cybersecurity operations
J Dykstra, CL Paul
11th USENIX Workshop on Cyber Security Experimentation and Test, 2018
692018
Gaps and opportunities in situational awareness for cybersecurity
R Gutzwiller, J Dykstra, B Payne
Digital Threats: Research and Practice 1 (3), 1-6, 2020
482020
Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems
J Dykstra
O’Reilly Media, 2015
462015
Seizing electronic evidence from cloud computing environments
J Dykstra
Cloud Technology: Concepts, Methodologies, Tools, and Applications, 2033-2062, 2015
452015
Forensic Collection of Electronic Evidence from Infrastructure-As-a-Service Cloud Computing
J Dykstra, D Riehl
Richmond Journal of Law and Technology 19 (1), 47, 2012
422012
Compliance Cautions: Investigating Security Issues Associated with U.S. Digital-Security Standards
R Stevens, J Dykstra, W Knox Everette, J Chapman, G Bladow, A Farmer, ...
Network and Distributed Systems Security (NDSS) Symposium 2020, 2020
272020
Understanding Operator Fatigue, Frustration, and Cognitive Workload in Tactical Cybersecurity Operations
CL Paul, J Dykstra
Journal of Information Warfare 16 (2), 1-11, 2017
272017
Acting in the Unknown: The Cynefin Framework for Managing Cybersecurity Risk in Dynamic Decision Making
J Dykstra, SR Orr
International Conference on Cyber Conflict (CyCon U.S.), 2016
262016
Exploring 3d cybersecurity visualization with the microsoft hololens
S Beitzel, J Dykstra, P Toliver, J Youzwak
Advances in Human Factors in Cybersecurity: Proceedings of the AHFE 2017 …, 2018
222018
How ready is your ready? assessing the usability of incident response playbook frameworks
R Stevens, D Votipka, J Dykstra, F Tomlinson, E Quartararo, C Ahern, ...
Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems …, 2022
202022
The Case for Disappearing Cyber Security
J Dykstra, EH Spafford
Communications of the ACM 61 (7), 40-42, 2018
182018
Identifying Infected Users via Network Traffic
M Gratian, D Bhansali, M Cukier, J Dykstra
Computers & Security 80 (January 2019), 306-316, 2018
172018
Sok: Evaluating privacy and security vulnerabilities of patients’ data in healthcare
F Tazi, J Dykstra, P Rajivan, S Das
International workshop on socio-technical aspects in security, 153-181, 2022
152022
Design and implementation of FROST: Digital forensic tools for the OpenStack cloud computing platform. Digit. Invest
J Dykstra, AT Sherman
S87–S95, 2013
142013
The CATS Hackathon: Creating and Refining Test Items for Cybersecurity Concept Inventories
AT Sherman, L Oliva, E Golaszewski, D Phatak, T Scheponik, GL Herman, ...
Security & Privacy 17 (6), 77-83, 2019
122019
The system can't perform the operation now. Try again later.
Articles 1–20