default search action
Josiah Dykstra
Person information
- affiliation: National Security Agency, MD, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Faiza Tazi, Josiah Dykstra, Prashanth Rajivan, Kapil Chalil Madathil, Jiovanne Hughart, James T. McElligott, Daniel Votipka, Sanchari Das:
Improving Privacy and Security of Telehealth. Commun. ACM 67(9): 27-30 (2024) - [j14]Faiza Tazi, Archana Nandakumar, Josiah Dykstra, Prashanth Rajivan, Sanchari Das:
SoK: Analyzing Privacy and Security of Healthcare Data from the User Perspective. ACM Trans. Comput. Heal. 5(2): 11:1-11:31 (2024) - [c13]Faiza Tazi, Josiah Dykstra, Prashanth Rajivan, Sanchari Das:
"We Have No Security Concerns": Understanding the Privacy-Security Nexus in Telehealth for Audiologists and Speech-Language Pathologists: Understanding the Privacy-Security Nexus in Telehealth. CHI 2024: 790:1-790:20 - [c12]Morgan Reece, Nidhi Rastogi, Theodore Lander, Josiah Dykstra, Sudip Mittal, Andy Sampson:
Defending Multi-Cloud Applications Against Man-in-the-Middle Attacks. SACMAT 2024 - [c11]Matt Schwager, Dominik Klemba, Josiah Dykstra:
Design and Implementation of a Coverage-Guided Ruby Fuzzer. CSET @ USENIX Security Symposium 2024: 27-33 - [i9]Jonathan Goohs, Georgel Savin, Lucas Starks, Josiah Dykstra, William Casey:
Adversarial Knapsack and Secondary Effects of Common Information for Cyber Operations. CoRR abs/2403.10789 (2024) - [i8]Adam Shostack, Josiah Dykstra:
Handling Pandemic-Scale Cyber Threats: Lessons from COVID-19. CoRR abs/2408.08417 (2024) - 2023
- [j13]Kelly Shortridge, Josiah Dykstra:
Opportunity Cost and Missed Chances in Optimizing Cybersecurity. Commun. ACM 66(7): 96-104 (2023) - [j12]Josiah Dykstra, Lawrence A. Gordon, Martin P. Loeb, Lei Zhou:
Maximizing the benefits from sharing cyber threat intelligence by government agencies and departments. J. Cybersecur. 9(1) (2023) - [j11]Kelly Shortridge, Josiah Dykstra:
Opportunity Cost and Missed Chances in Optimizing Cybersecurity: The loss of potential gain from other alternatives when one alternative is chosen. ACM Queue 21(1): 30-56 (2023) - [c10]Georgel M. Savin, Ammar Asseri, Josiah Dykstra, Jonathan Goohs, Anthony Melaragno, William Casey:
Battle Ground: Data Collection and Labeling of CTF Games to Understand Human Cyber Operators. CSET @ USENIX Security Symposium 2023: 32-40 - [i7]Morgan Reece, Theodore Edward Lander Jr., Matthew Stoffolano, Andy Sampson, Josiah Dykstra, Sudip Mittal, Nidhi Rastogi:
Systemic Risk and Vulnerability Analysis of Multi-cloud Environments. CoRR abs/2306.01862 (2023) - [i6]Faiza Tazi, Archana Nandakumar, Josiah Dykstra, Prashanth Rajivan, Sanchari Das:
Privacy, Security, and Usability Tradeoffs of Telehealth from Practitioners' Perspectives. CoRR abs/2306.05725 (2023) - [i5]Faiza Tazi, Archana Nandakumar, Josiah Dykstra, Prashanth Rajivan, Sanchari Das:
SoK: Analysis of User-Centered Studies Focusing on Healthcare Privacy & Security. CoRR abs/2306.06033 (2023) - [i4]Georgel Savin, Ammar Asseri, Josiah Dykstra, Jonathan Goohs, Anthony Melaragno, William Casey:
Battle Ground: Data Collection and Labeling of CTF Games to Understand Human Cyber Operators. CoRR abs/2307.10877 (2023) - [i3]Morgan Reece, Theodore Edward Lander Jr., Sudip Mittal, Nidhi Rastogi, Josiah Dykstra, Andy Sampson:
Emergent (In)Security of Multi-Cloud Environments. CoRR abs/2311.01247 (2023) - 2022
- [j10]Josiah Dykstra, Jamie Met, Nicole Backert, Rebecca Mattie, Douglas Hough:
Action Bias and the Two Most Dangerous Words in Cybersecurity Incident Response: An Argument for More Measured Incident Response. IEEE Secur. Priv. 20(3): 102-106 (2022) - [c9]Rock Stevens, Daniel Votipka, Josiah Dykstra, Fernando Tomlinson, Erin Quartararo, Colin Ahern, Michelle L. Mazurek:
How Ready is Your Ready? Assessing the Usability of Incident Response Playbook Frameworks. CHI 2022: 589:1-589:18 - [i2]Josiah Dykstra, Kelly Shortridge, Jamie Met, Douglas Hough:
Sludge for Good: Slowing and Imposing Costs on Cyber Attackers. CoRR abs/2211.16626 (2022) - 2021
- [c8]Faiza Tazi, Josiah Dykstra, Prashanth Rajivan, Sanchari Das:
SOK: Evaluating Privacy and Security Vulnerabilities of Patients' Data in Healthcare. STAST 2021: 153-181 - 2020
- [j9]Rock Stevens, Josiah Dykstra, Wendy Knox Everette, Michelle L. Mazurek:
It Lurks Within: A Look at the Unexpected Security Implications of Compliance Programs. IEEE Secur. Priv. 18(6): 51-58 (2020) - [c7]Josiah Dykstra, Rohan Mathur, Alicia Spoor:
Cybersecurity in Medical Private Practice: Results of a Survey in Audiology. CIC 2020: 169-176 - [c6]Josiah Dykstra:
Invisible Security: Protecting Users with No Time to Spare. CIC 2020: 184-190 - [c5]Rock Stevens, Josiah Dykstra, Wendy Knox Everette, James Chapman, Garrett Bladow, Alexander Farmer, Kevin Halliday, Michelle L. Mazurek:
Compliance Cautions: Investigating Security Issues Associated with U.S. Digital-Security Standards. NDSS 2020
2010 – 2019
- 2019
- [j8]Margaret Gratian, Darshan Bhansali, Michel Cukier, Josiah Dykstra:
Identifying infected users via network traffic. Comput. Secur. 80: 306-316 (2019) - [j7]Alan T. Sherman, Josiah Dykstra, Gregory V. Bard, Ankur Chattopadhyay, Filipo Sharevski, Rakesh M. Verma, Ryan Vrecenar, Linda Oliva, Enis Golaszewski, Dhananjay S. Phatak, Travis Scheponik, Geoffrey L. Herman, Dong San Choi, Spencer E. Offenberger, Peter Peterson:
The CATS Hackathon: Creating and Refining Test Items for Cybersecurity Concept Inventories. IEEE Secur. Priv. 17(6): 77-83 (2019) - [c4]Josiah Dykstra, Matt Fante, Paul Donahue, Dawn Varva, Linda Wilk, Amanda Johnson:
Lessons from Using the I-Corps Methodology to Understand Cyber Threat Intelligence Sharing. CSET @ USENIX Security Symposium 2019 - [i1]Alan T. Sherman, Linda Oliva, Enis Golaszewski, Dhananjay S. Phatak, Travis Scheponik, Geoffrey L. Herman, Dong San Choi, Spencer E. Offenberger, Peter Peterson, Josiah Dykstra, Gregory V. Bard, Ankur Chattopadhyay, Filipo Sharevski, Rakesh M. Verma, Ryan Vrecenar:
The CATS Hackathon: Creating and Refining Test Items for Cybersecurity Concept Inventories. CoRR abs/1901.09286 (2019) - 2018
- [j6]Josiah Dykstra, Eugene H. Spafford:
The case for disappearing cyber security. Commun. ACM 61(7): 40-42 (2018) - [j5]Margaret Gratian, Sruthi Bandi, Michel Cukier, Josiah Dykstra, Amy Ginther:
Correlating human traits and cyber security behavior intentions. Comput. Secur. 73: 345-358 (2018) - [c3]Josiah Dykstra, Celeste Lyn Paul:
Cyber Operations Stress Survey (COSS): Studying fatigue, frustration, and cognitive workload in cybersecurity operations. CSET @ USENIX Security Symposium 2018 - 2017
- [c2]Steve Beitzel, Josiah Dykstra, Paul Toliver, Jason Youzwak:
Exploring 3D Cybersecurity Visualization with the Microsoft HoloLens. AHFE (9) 2017: 197-207 - 2016
- [c1]Josiah A. B. S. Dykstra, Stephen R. Orr:
Acting in the unknown: the cynefin framework for managing cybersecurity risk in dynamic decision making. CyCon U.S. 2016: 44-49 - 2013
- [j4]Josiah Dykstra, Alan T. Sherman:
Design and implementation of FROST: Digital forensic tools for the OpenStack cloud computing platform. Digit. Investig. 10(Supplement): S87-S95 (2013) - 2012
- [j3]Josiah Dykstra, Alan T. Sherman:
Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques. Digit. Investig. 9(Supplement): S90-S98 (2012)
2000 – 2009
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint