Acquiring Forensic Evidence from Infrastructure-as-a-Service Cloud Computing J Dykstra, AT Sherman Digital Investigation 9, S90-S98, 2012 | 385 | 2012 |
Correlating Human Traits and Cybersecurity Behavior Intentions M Gratian, S Bandi, M Cukier, J Dykstra, A Ginther Computers & Security 73, 345–358, 2017 | 321 | 2017 |
Design and Implementation of FROST: Digital Forensic Tools for the OpenStack Cloud Computing Platform J Dykstra, AT Sherman 13th Annual Digital Forensics Research Workshop (DFRWS) 10, S87–S95, 2013 | 243 | 2013 |
Understanding Issues in Cloud Forensics: Two Hypothetical Case Studies J Dykstra, AT Sherman Journal of Network Forensics 3 (1), 19-31, 2011 | 134 | 2011 |
Will UML 2.0 be agile or awkward? C Kobryn Communications of the ACM 45 (1), 107-110, 2002 | 93 | 2002 |
Cyber Operations Stress Survey (COSS): Studying fatigue, frustration, and cognitive workload in cybersecurity operations J Dykstra, CL Paul 11th USENIX Workshop on Cyber Security Experimentation and Test, 2018 | 63 | 2018 |
Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems J Dykstra O’Reilly Media, 2015 | 44 | 2015 |
Seizing electronic evidence from cloud computing environments J Dykstra Cloud Technology: Concepts, Methodologies, Tools, and Applications, 2033-2062, 2015 | 42 | 2015 |
Gaps and opportunities in situational awareness for cybersecurity R Gutzwiller, J Dykstra, B Payne Digital Threats: Research and Practice 1 (3), 1-6, 2020 | 41 | 2020 |
Forensic Collection of Electronic Evidence from Infrastructure-As-a-Service Cloud Computing J Dykstra, D Riehl Richmond Journal of Law and Technology 19 (1), 47, 2012 | 40 | 2012 |
Understanding Operator Fatigue, Frustration, and Cognitive Workload in Tactical Cybersecurity Operations CL Paul, J Dykstra Journal of Information Warfare 16 (2), 1-11, 2017 | 26 | 2017 |
Acting in the Unknown: The Cynefin Framework for Managing Cybersecurity Risk in Dynamic Decision Making J Dykstra, SR Orr International Conference on Cyber Conflict (CyCon U.S.), 2016 | 24 | 2016 |
Exploring 3d cybersecurity visualization with the microsoft hololens S Beitzel, J Dykstra, P Toliver, J Youzwak Advances in Human Factors in Cybersecurity: Proceedings of the AHFE 2017 …, 2018 | 20 | 2018 |
Compliance Cautions: Investigating Security Issues Associated with U.S. Digital-Security Standards R Stevens, J Dykstra, W Knox Everette, J Chapman, G Bladow, A Farmer, ... Network and Distributed Systems Security (NDSS) Symposium 2020, 2020 | 19 | 2020 |
Identifying Infected Users via Network Traffic M Gratian, D Bhansali, M Cukier, J Dykstra Computers & Security 80 (January 2019), 306-316, 2018 | 17 | 2018 |
The Case for Disappearing Cyber Security J Dykstra, EH Spafford Communications of the ACM 61 (7), 40-42, 2018 | 16 | 2018 |
How ready is your ready? assessing the usability of incident response playbook frameworks R Stevens, D Votipka, J Dykstra, F Tomlinson, E Quartararo, C Ahern, ... Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems …, 2022 | 14 | 2022 |
Design and implementation of FROST: Digital forensic tools for the OpenStack cloud computing platform. Digit. Invest J Dykstra, AT Sherman S87–S95, 2013 | 14 | 2013 |
The CATS Hackathon: Creating and Refining Test Items for Cybersecurity Concept Inventories AT Sherman, L Oliva, E Golaszewski, D Phatak, T Scheponik, GL Herman, ... Security & Privacy 17 (6), 77-83, 2019 | 12 | 2019 |
The CATS Hackathon: Creating and Refining Test Items for Cybersecurity Concept Inventories AT Sherman, L Oliva, E Golaszewski, D Phatak, T Scheponik, GL Herman, ... arXiv preprint arXiv:1901.09286, 2019 | 12 | 2019 |