关注
Josiah Dykstra
Josiah Dykstra
Trail of Bits
在 trailofbits.com 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Acquiring Forensic Evidence from Infrastructure-as-a-Service Cloud Computing
J Dykstra, AT Sherman
Digital Investigation 9, S90-S98, 2012
3852012
Correlating Human Traits and Cybersecurity Behavior Intentions
M Gratian, S Bandi, M Cukier, J Dykstra, A Ginther
Computers & Security 73, 345–358, 2017
3212017
Design and Implementation of FROST: Digital Forensic Tools for the OpenStack Cloud Computing Platform
J Dykstra, AT Sherman
13th Annual Digital Forensics Research Workshop (DFRWS) 10, S87–S95, 2013
2432013
Understanding Issues in Cloud Forensics: Two Hypothetical Case Studies
J Dykstra, AT Sherman
Journal of Network Forensics 3 (1), 19-31, 2011
1342011
Will UML 2.0 be agile or awkward?
C Kobryn
Communications of the ACM 45 (1), 107-110, 2002
932002
Cyber Operations Stress Survey (COSS): Studying fatigue, frustration, and cognitive workload in cybersecurity operations
J Dykstra, CL Paul
11th USENIX Workshop on Cyber Security Experimentation and Test, 2018
632018
Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems
J Dykstra
O’Reilly Media, 2015
442015
Seizing electronic evidence from cloud computing environments
J Dykstra
Cloud Technology: Concepts, Methodologies, Tools, and Applications, 2033-2062, 2015
422015
Gaps and opportunities in situational awareness for cybersecurity
R Gutzwiller, J Dykstra, B Payne
Digital Threats: Research and Practice 1 (3), 1-6, 2020
412020
Forensic Collection of Electronic Evidence from Infrastructure-As-a-Service Cloud Computing
J Dykstra, D Riehl
Richmond Journal of Law and Technology 19 (1), 47, 2012
402012
Understanding Operator Fatigue, Frustration, and Cognitive Workload in Tactical Cybersecurity Operations
CL Paul, J Dykstra
Journal of Information Warfare 16 (2), 1-11, 2017
262017
Acting in the Unknown: The Cynefin Framework for Managing Cybersecurity Risk in Dynamic Decision Making
J Dykstra, SR Orr
International Conference on Cyber Conflict (CyCon U.S.), 2016
242016
Exploring 3d cybersecurity visualization with the microsoft hololens
S Beitzel, J Dykstra, P Toliver, J Youzwak
Advances in Human Factors in Cybersecurity: Proceedings of the AHFE 2017 …, 2018
202018
Compliance Cautions: Investigating Security Issues Associated with U.S. Digital-Security Standards
R Stevens, J Dykstra, W Knox Everette, J Chapman, G Bladow, A Farmer, ...
Network and Distributed Systems Security (NDSS) Symposium 2020, 2020
192020
Identifying Infected Users via Network Traffic
M Gratian, D Bhansali, M Cukier, J Dykstra
Computers & Security 80 (January 2019), 306-316, 2018
172018
The Case for Disappearing Cyber Security
J Dykstra, EH Spafford
Communications of the ACM 61 (7), 40-42, 2018
162018
How ready is your ready? assessing the usability of incident response playbook frameworks
R Stevens, D Votipka, J Dykstra, F Tomlinson, E Quartararo, C Ahern, ...
Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems …, 2022
142022
Design and implementation of FROST: Digital forensic tools for the OpenStack cloud computing platform. Digit. Invest
J Dykstra, AT Sherman
S87–S95, 2013
142013
The CATS Hackathon: Creating and Refining Test Items for Cybersecurity Concept Inventories
AT Sherman, L Oliva, E Golaszewski, D Phatak, T Scheponik, GL Herman, ...
Security & Privacy 17 (6), 77-83, 2019
122019
The CATS Hackathon: Creating and Refining Test Items for Cybersecurity Concept Inventories
AT Sherman, L Oliva, E Golaszewski, D Phatak, T Scheponik, GL Herman, ...
arXiv preprint arXiv:1901.09286, 2019
122019
系统目前无法执行此操作,请稍后再试。
文章 1–20