Прати
Josiah Dykstra
Josiah Dykstra
Trail of Bits
Верификована је имејл адреса на trailofbits.com - Почетна страница
Наслов
Навело
Навело
Година
Acquiring Forensic Evidence from Infrastructure-as-a-Service Cloud Computing
J Dykstra, AT Sherman
Digital Investigation 9, S90-S98, 2012
3972012
Correlating Human Traits and Cybersecurity Behavior Intentions
M Gratian, S Bandi, M Cukier, J Dykstra, A Ginther
Computers & Security 73, 345–358, 2017
3602017
Design and Implementation of FROST: Digital Forensic Tools for the OpenStack Cloud Computing Platform
J Dykstra, AT Sherman
13th Annual Digital Forensics Research Workshop (DFRWS) 10, S87–S95, 2013
2472013
Understanding Issues in Cloud Forensics: Two Hypothetical Case Studies
J Dykstra, AT Sherman
Journal of Network Forensics 3 (1), 19-31, 2011
1352011
Will UML 2.0 be agile or awkward?
C Kobryn
Communications of the ACM 45 (1), 107-110, 2002
131*2002
Cyber Operations Stress Survey (COSS): Studying fatigue, frustration, and cognitive workload in cybersecurity operations
J Dykstra, CL Paul
11th USENIX Workshop on Cyber Security Experimentation and Test, 2018
762018
Gaps and opportunities in situational awareness for cybersecurity
R Gutzwiller, J Dykstra, B Payne
Digital Threats: Research and Practice 1 (3), 1-6, 2020
492020
Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems
J Dykstra
O’Reilly Media, 2015
482015
Seizing electronic evidence from cloud computing environments
J Dykstra
Cloud Technology: Concepts, Methodologies, Tools, and Applications, 2033-2062, 2015
452015
Forensic Collection of Electronic Evidence from Infrastructure-As-a-Service Cloud Computing
J Dykstra, D Riehl
Richmond Journal of Law and Technology 19 (1), 47, 2012
422012
Understanding Operator Fatigue, Frustration, and Cognitive Workload in Tactical Cybersecurity Operations
CL Paul, J Dykstra
Journal of Information Warfare 16 (2), 1-11, 2017
322017
Compliance Cautions: Investigating Security Issues Associated with U.S. Digital-Security Standards
R Stevens, J Dykstra, W Knox Everette, J Chapman, G Bladow, A Farmer, ...
Network and Distributed Systems Security (NDSS) Symposium 2020, 2020
282020
How ready is your ready? assessing the usability of incident response playbook frameworks
R Stevens, D Votipka, J Dykstra, F Tomlinson, E Quartararo, C Ahern, ...
Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems …, 2022
272022
Acting in the Unknown: The Cynefin Framework for Managing Cybersecurity Risk in Dynamic Decision Making
J Dykstra, SR Orr
International Conference on Cyber Conflict (CyCon U.S.), 2016
272016
Exploring 3d cybersecurity visualization with the microsoft hololens
S Beitzel, J Dykstra, P Toliver, J Youzwak
Advances in Human Factors in Cybersecurity: Proceedings of the AHFE 2017 …, 2018
222018
The Case for Disappearing Cyber Security
J Dykstra, EH Spafford
Communications of the ACM 61 (7), 40-42, 2018
182018
Identifying Infected Users via Network Traffic
M Gratian, D Bhansali, M Cukier, J Dykstra
Computers & Security 80 (January 2019), 306-316, 2018
162018
Design and implementation of FROST: Digital forensic tools for the OpenStack cloud computing platform. Digit. Invest
J Dykstra, AT Sherman
S87–S95, 2013
152013
Sok: Evaluating privacy and security vulnerabilities of patients’ data in healthcare
F Tazi, J Dykstra, P Rajivan, S Das
International workshop on socio-technical aspects in security, 153-181, 2022
142022
Cognitive Performance Impact of Augmented Reality for Network Operations Tasks
S Beitzel, J Dykstra, S Huver, M Kaplan, M Loushine, J Youzwak
Advances in Human Factors in Cybersecurity: Proceedings of the AHFE 2016 …, 2016
142016
Систем тренутно не може да изврши ову радњу. Пробајте поново касније.
Чланци 1–20