Josiah Dykstra

Orcid: 0000-0002-3455-2562

Affiliations:
  • National Security Agency, MD, USA


According to our database1, Josiah Dykstra authored at least 29 papers between 2001 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Adversarial Knapsack and Secondary Effects of Common Information for Cyber Operations.
CoRR, 2024

2023
Opportunity Cost and Missed Chances in Optimizing Cybersecurity.
Commun. ACM, July, 2023

Maximizing the benefits from sharing cyber threat intelligence by government agencies and departments.
J. Cybersecur., January, 2023

Opportunity Cost and Missed Chances in Optimizing Cybersecurity: The loss of potential gain from other alternatives when one alternative is chosen.
ACM Queue, 2023

Emergent (In)Security of Multi-Cloud Environments.
CoRR, 2023

SoK: Analysis of User-Centered Studies Focusing on Healthcare Privacy & Security.
CoRR, 2023

Privacy, Security, and Usability Tradeoffs of Telehealth from Practitioners' Perspectives.
CoRR, 2023

Systemic Risk and Vulnerability Analysis of Multi-cloud Environments.
CoRR, 2023

Battle Ground: Data Collection and Labeling of CTF Games to Understand Human Cyber Operators.
Proceedings of the 2023 Cyber Security Experimentation and Test Workshop, 2023

2022
Action Bias and the Two Most Dangerous Words in Cybersecurity Incident Response: An Argument for More Measured Incident Response.
IEEE Secur. Priv., 2022

Sludge for Good: Slowing and Imposing Costs on Cyber Attackers.
CoRR, 2022

How Ready is Your Ready? Assessing the Usability of Incident Response Playbook Frameworks.
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022

2021
SOK: Evaluating Privacy and Security Vulnerabilities of Patients' Data in Healthcare.
Proceedings of the Socio-Technical Aspects in Security - 11th International Workshop, 2021

2020
It Lurks Within: A Look at the Unexpected Security Implications of Compliance Programs.
IEEE Secur. Priv., 2020

Compliance Cautions: Investigating Security Issues Associated with U.S. Digital-Security Standards.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

Cybersecurity in Medical Private Practice: Results of a Survey in Audiology.
Proceedings of the 6th IEEE International Conference on Collaboration and Internet Computing, 2020

Invisible Security: Protecting Users with No Time to Spare.
Proceedings of the 6th IEEE International Conference on Collaboration and Internet Computing, 2020

2019
The CATS Hackathon: Creating and Refining Test Items for Cybersecurity Concept Inventories.
IEEE Secur. Priv., 2019

Identifying infected users via network traffic.
Comput. Secur., 2019

Lessons from Using the I-Corps Methodology to Understand Cyber Threat Intelligence Sharing.
Proceedings of the 12th USENIX Workshop on Cyber Security Experimentation and Test, 2019

2018
Correlating human traits and cyber security behavior intentions.
Comput. Secur., 2018

The case for disappearing cyber security.
Commun. ACM, 2018

Cyber Operations Stress Survey (COSS): Studying fatigue, frustration, and cognitive workload in cybersecurity operations.
Proceedings of the 11th USENIX Workshop on Cyber Security Experimentation and Test, 2018

2017
Exploring 3D Cybersecurity Visualization with the Microsoft HoloLens.
Proceedings of the Advances in Human Factors in Cybersecurity, 2017

2016
Acting in the unknown: the cynefin framework for managing cybersecurity risk in dynamic decision making.
Proceedings of the 2016 International Conference on Cyber Conflict, 2016

2013
Design and implementation of FROST: Digital forensic tools for the OpenStack cloud computing platform.
Digit. Investig., 2013

2012
Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques.
Digit. Investig., 2012

2002
Software verification and validation with destiny: a parallel approach to automated theorem proving.
XRDS, 2002

2001
Using apache as a caching proxy server.
XRDS, 2001


  Loading...