Follow
Josiah Dykstra
Josiah Dykstra
Trail of Bits
Verified email at trailofbits.com - Homepage
Title
Cited by
Cited by
Year
Acquiring Forensic Evidence from Infrastructure-as-a-Service Cloud Computing
J Dykstra, AT Sherman
Digital Investigation 9, S90-S98, 2012
3812012
Correlating Human Traits and Cybersecurity Behavior Intentions
M Gratian, S Bandi, M Cukier, J Dykstra, A Ginther
Computers & Security 73, 345–358, 2017
3072017
Design and Implementation of FROST: Digital Forensic Tools for the OpenStack Cloud Computing Platform
J Dykstra, AT Sherman
13th Annual Digital Forensics Research Workshop (DFRWS) 10, S87–S95, 2013
2432013
Understanding Issues in Cloud Forensics: Two Hypothetical Case Studies
J Dykstra, AT Sherman
Journal of Network Forensics 3 (1), 19-31, 2011
1292011
Cyber Operations Stress Survey (COSS): Studying fatigue, frustration, and cognitive workload in cybersecurity operations
J Dykstra, CL Paul
11th USENIX Workshop on Cyber Security Experimentation and Test, 2018
572018
Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems
J Dykstra
O’Reilly Media, 2015
422015
Seizing electronic evidence from cloud computing environments
J Dykstra
Cloud Technology: Concepts, Methodologies, Tools, and Applications, 2033-2062, 2015
422015
Forensic Collection of Electronic Evidence from Infrastructure-As-a-Service Cloud Computing
J Dykstra, D Riehl
Richmond Journal of Law and Technology 19 (1), 47, 2012
392012
Gaps and opportunities in situational awareness for cybersecurity
R Gutzwiller, J Dykstra, B Payne
Digital Threats: Research and Practice 1 (3), 1-6, 2020
332020
Understanding Operator Fatigue, Frustration, and Cognitive Workload in Tactical Cybersecurity Operations
CL Paul, J Dykstra
Journal of Information Warfare 16 (2), 1-11, 2017
232017
Acting in the Unknown: The Cynefin Framework for Managing Cybersecurity Risk in Dynamic Decision Making
J Dykstra, SR Orr
International Conference on Cyber Conflict (CyCon U.S.), 2016
232016
Compliance Cautions: Investigating Security Issues Associated with U.S. Digital-Security Standards
R Stevens, J Dykstra, W Knox Everette, J Chapman, G Bladow, A Farmer, ...
Network and Distributed Systems Security (NDSS) Symposium 2020, 2020
182020
Exploring 3d cybersecurity visualization with the microsoft hololens
S Beitzel, J Dykstra, P Toliver, J Youzwak
Advances in Human Factors in Cybersecurity: Proceedings of the AHFE 2017 …, 2018
182018
Identifying Infected Users via Network Traffic
M Gratian, D Bhansali, M Cukier, J Dykstra
Computers & Security 80 (January 2019), 306-316, 2018
162018
The Case for Disappearing Cyber Security
J Dykstra, EH Spafford
Communications of the ACM 61 (7), 40-42, 2018
152018
Design and implementation of FROST: Digital forensic tools for the OpenStack cloud computing platform. Digit. Invest
J Dykstra, AT Sherman
S87–S95, 2013
142013
How ready is your ready? assessing the usability of incident response playbook frameworks
R Stevens, D Votipka, J Dykstra, F Tomlinson, E Quartararo, C Ahern, ...
Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems …, 2022
122022
The CATS Hackathon: Creating and Refining Test Items for Cybersecurity Concept Inventories
AT Sherman, L Oliva, E Golaszewski, D Phatak, T Scheponik, GL Herman, ...
Security & Privacy 17 (6), 77-83, 2019
122019
The CATS Hackathon: Creating and Refining Test Items for Cybersecurity Concept Inventories
AT Sherman, L Oliva, E Golaszewski, D Phatak, T Scheponik, GL Herman, ...
arXiv preprint arXiv:1901.09286, 2019
122019
Cognitive Performance Impact of Augmented Reality for Network Operations Tasks
S Beitzel, J Dykstra, S Huver, M Kaplan, M Loushine, J Youzwak
Advances in Human Factors in Cybersecurity: Proceedings of the AHFE 2016 …, 2016
112016
The system can't perform the operation now. Try again later.
Articles 1–20