Josiah Dykstra
Josiah Dykstra
U.S. Department of Defense
Verified email at - Homepage
Cited by
Cited by
Acquiring Forensic Evidence from Infrastructure-as-a-Service Cloud Computing
J Dykstra, AT Sherman
Digital Investigation 9, S90-S98, 2012
Design and Implementation of FROST: Digital Forensic Tools for the OpenStack Cloud Computing Platform
J Dykstra, AT Sherman
13th Annual Digital Forensics Research Workshop (DFRWS) 10, S87–S95, 2013
Correlating Human Traits and Cybersecurity Behavior Intentions
M Gratian, S Bandi, M Cukier, J Dykstra, A Ginther
Computers & Security 73, 345–358, 2017
Understanding Issues in Cloud Forensics: Two Hypothetical Case Studies
J Dykstra, AT Sherman
Journal of Network Forensics 3 (1), 19-31, 2011
Cyber Operations Stress Survey (COSS): Studying fatigue, frustration, and cognitive workload in cybersecurity operations
J Dykstra, CL Paul
11th USENIX Workshop on Cyber Security Experimentation and Test, 2018
Seizing electronic evidence from cloud computing environments
J Dykstra
Cloud Technology: Concepts, Methodologies, Tools, and Applications, 2033-2062, 2015
Forensic Collection of Electronic Evidence from Infrastructure-As-a-Service Cloud Computing
J Dykstra, D Riehl
Richmond Journal of Law and Technology 19 (1), 47, 2012
Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems
J Dykstra
O’Reilly Media, 2015
Acting in the Unknown: The Cynefin Framework for Managing Cybersecurity Risk in Dynamic Decision Making
J Dykstra, SR Orr
International Conference on Cyber Conflict (CyCon U.S.), 2016
Exploring 3d cybersecurity visualization with the microsoft hololens
S Beitzel, J Dykstra, P Toliver, J Youzwak
International Conference on Applied Human Factors and Ergonomics, 197-207, 2017
Compliance Cautions: Investigating Security Issues Associated with U.S. Digital-Security Standards
R Stevens, J Dykstra, W Knox Everette, J Chapman, G Bladow, A Farmer, ...
Network and Distributed Systems Security (NDSS) Symposium 2020, 2020
Identifying Infected Users via Network Traffic
M Gratian, D Bhansali, M Cukier, J Dykstra
Computers & Security 80 (January 2019), 306-316, 2018
Design and implementation of FROST: Digital forensic tools for the OpenStack cloud computing platform. Digit. Invest
J Dykstra, AT Sherman
S87–S95, 2013
The Case for Disappearing Cyber Security
J Dykstra, EH Spafford
Communications of the ACM 61 (7), 40-42, 2018
Understanding Operator Fatigue, Frustration, and Cognitive Workload in Tactical Cybersecurity Operations
CL Paul, J Dykstra
Journal of Information Warfare 16 (2), 1-11, 2017
Gaps and opportunities in situational awareness for cybersecurity
R Gutzwiller, J Dykstra, B Payne
Digital Threats: Research and Practice 1 (3), 1-6, 2020
Cognitive Performance Impact of Augmented Reality for Network Operations Tasks
S Beitzel, J Dykstra, S Huver, M Kaplan, M Loushine, J Youzwak
Advances in Human Factors in Cybersecurity: Proceedings of the AHFE 2016 …, 2016
The CATS Hackathon: Creating and Refining Test Items for Cybersecurity Concept Inventories
AT Sherman, L Oliva, E Golaszewski, D Phatak, T Scheponik, GL Herman, ...
Security & Privacy 17 (6), 77-83, 2019
The CATS Hackathon: Creating and Refining Test Items for Cybersecurity Concept Inventories
AT Sherman, L Oliva, E Golaszewski, D Phatak, T Scheponik, GL Herman, ...
arXiv preprint arXiv:1901.09286, 2019
Stress and the Cyber Warrior: Cognitive Workload in a Computer Operations Center
J Dykstra, CL Paul
Journal of Sensitive Cyber Research and Engineering 3 (1), 1-23, 2015
The system can't perform the operation now. Try again later.
Articles 1–20