Josiah Dykstra
Orcid: 0000-0002-3455-2562Affiliations:
- National Security Agency, MD, USA
According to our database1,
Josiah Dykstra
authored at least 39 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on acm.org
-
on twitter.com
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
ACM Trans. Comput. Heal., April, 2024
Adversarial Knapsack and Secondary Effects of Common Information for Cyber Operations.
CoRR, 2024
Proceedings of the 17th Cyber Security Experimentation and Test Workshop, 2024
Proceedings of the 29th ACM Symposium on Access Control Models and Technologies, 2024
Proceedings of the New Security Paradigms Workshop, 2024
Proceedings of the IEEE Military Communications Conference, 2024
Position Paper: Evaluating Analogies and Applying Public Health Models for Cybersecurity.
Proceedings of the 2024 Workshop on Cybersecurity in Healthcare, 2024
"We Have No Security Concerns": Understanding the Privacy-Security Nexus in Telehealth for Audiologists and Speech-Language Pathologists: Understanding the Privacy-Security Nexus in Telehealth.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2024
2023
Commun. ACM, July, 2023
Maximizing the benefits from sharing cyber threat intelligence by government agencies and departments.
J. Cybersecur., January, 2023
Opportunity Cost and Missed Chances in Optimizing Cybersecurity: The loss of potential gain from other alternatives when one alternative is chosen.
ACM Queue, 2023
CoRR, 2023
Privacy, Security, and Usability Tradeoffs of Telehealth from Practitioners' Perspectives.
CoRR, 2023
Battle Ground: Data Collection and Labeling of CTF Games to Understand Human Cyber Operators.
Proceedings of the 2023 Cyber Security Experimentation and Test Workshop, 2023
2022
Action Bias and the Two Most Dangerous Words in Cybersecurity Incident Response: An Argument for More Measured Incident Response.
IEEE Secur. Priv., 2022
How Ready is Your Ready? Assessing the Usability of Incident Response Playbook Frameworks.
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022
2021
SOK: Evaluating Privacy and Security Vulnerabilities of Patients' Data in Healthcare.
Proceedings of the Socio-Technical Aspects in Security - 11th International Workshop, 2021
2020
It Lurks Within: A Look at the Unexpected Security Implications of Compliance Programs.
IEEE Secur. Priv., 2020
Compliance Cautions: Investigating Security Issues Associated with U.S. Digital-Security Standards.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Proceedings of the 6th IEEE International Conference on Collaboration and Internet Computing, 2020
Proceedings of the 6th IEEE International Conference on Collaboration and Internet Computing, 2020
2019
The CATS Hackathon: Creating and Refining Test Items for Cybersecurity Concept Inventories.
IEEE Secur. Priv., 2019
Lessons from Using the I-Corps Methodology to Understand Cyber Threat Intelligence Sharing.
Proceedings of the 12th USENIX Workshop on Cyber Security Experimentation and Test, 2019
2018
Comput. Secur., 2018
Cyber Operations Stress Survey (COSS): Studying fatigue, frustration, and cognitive workload in cybersecurity operations.
Proceedings of the 11th USENIX Workshop on Cyber Security Experimentation and Test, 2018
2017
Proceedings of the Advances in Human Factors in Cybersecurity, 2017
2016
Acting in the unknown: the cynefin framework for managing cybersecurity risk in dynamic decision making.
Proceedings of the 2016 International Conference on Cyber Conflict, 2016
2013
Design and implementation of FROST: Digital forensic tools for the OpenStack cloud computing platform.
Digit. Investig., 2013
2012
Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques.
Digit. Investig., 2012
2002
Software verification and validation with destiny: a parallel approach to automated theorem proving.
XRDS, 2002
2001