papers and publications

Links to publications are listed below. See also scholarly publications on Google Scholar.

Sludge for Good: Slowing and Imposing Costs on Cyber Attackers
Josiah Dykstra, Kelly Shortridge, Jamie Met, Douglas Hough, Hawaii International Conference on System Sciences (HICCS), January 2025 (accepted).

A Game Theory for Resource-Constrained Tactical Cyber Operations.
Jonathan Goohs, Josiah Dykstra, Anthony Melarano, and William Casey, IEEE Military Communications Conference (MILCOM), October 2024 (accepted).

Position Paper: Evaluating Analogies and Applying Public Health Models for Cybersecurity
Josiah Dykstra, O. Sami Saydjari, Jamie Met, Douglas Hough. Workshop on Cybersecurity in Healthcare, October 2024.

Handling Pandemic-Scale Cyber Threats: Lessons from COVID-19.
Adam Shostack and Josiah Dykstra, New Security Paradigms Workshop (NSPW), August 2024.

Design and Implementation of a Coverage-Guided Ruby Fuzzer.
Matt Schwager, Dominik Klemba, Josiah Dykstra, Workshop on Cyber Security Experimentation and Test, August 2024.

Defending Multi-Cloud Applications Against Man-in-the-Middle Attacks.
Morgan Reece, Nidhi Rastogi, Theodore Lander, Josiah Dykstra, Sudip Mittal, Andy Sampson, Proceedings of the 29th ACM Symposium on Access Control Models and Technologies, June 2024.

Battle Ground: Data Collection and Labeling of CTF Games to Understand Human Cyber Operators
Georgel Savin, Ammar Asseri, Josiah Dykstra, Jonathan Goohs, Anthony Melarano, William Casey, Workshop on Cyber Security Experimentation and Test, August 2023.

Opportunity Cost and Missed Chances in Optimizing Cybersecurity
Kelly Shortridge and Josiah Dykstra. Communications of the ACM, July 2023.

Systemic Risk and Vulnerability Analysis of Multi-cloud Environments
Morgan Reece, Theodore Edward Lander Jr., Matthew Stoffolano, Andy Sampson, Josiah Dykstra, Sudip Mittal, Nidhi Rastogi. arXiv Preprint, June 2023.

Privacy, Security, and Usability Tradeoffs of Telehealth from Practitioners’ Perspectives
Faiza Tazi, Archana Nandakumar, Josiah Dykstra, Prashanth Rajivan, Sanchari Das. Human Factors and Ergonomics Society Annual Meeting, October 2023.

Maximizing the Benefits from Sharing Cyber Threat Intelligence by Government Agencies and Departments
Josiah Dykstra, Lawrence Gordon, Martin Loeb, Lei Zhao. Journal of Cybersecurity, April 2023.

Opportunity Cost and Missed Chances in Optimizing Cybersecurity
Kelly Shortridge and Josiah Dykstra. ACM Queue, April 2023.

Sludge for Good: Slowing and Imposing Costs on Cyber Attackers
Josiah Dykstra, Kelly Shortridge, Jamie Met, Douglas Hough. arXiv Preprint, November 2022.

Opportunity Cost of Action Bias in Cybersecurity Incident Response
Josiah Dykstra, Kelly Shortridge, Jamie Met, Douglas Hough. Human Factors and Ergonomics Society Annual Meeting, October 2022.

The Economics of Sharing Unclassified Cyber Threat Intelligence by Government Agencies and Departments
Josiah Dykstra, Lawrence A. Gordon, Martin P. Loeb, Lei Zhou. Journal of Information Security, vol. 13, 85-100, June 2022.

Action Bias and the Two Most Dangerous Words in Cybersecurity Incident Response
Josiah Dykstra, Jamie Met, Nicole Backert, Rebecca Mattie, and Douglas Hough. IEEE Security & Privacy, May/June 2022.

How Ready is Your Ready? Assessing the Usability of Incident Response Playbook Frameworks
Rock Stevens, Daniel Votipka, Josiah Dykstra, Fernando Tomlinson, Erin Quartararo, Colin Ahern, and Michelle L. Mazurek. ACM CHI Conference on Human Factors in Computing Systems, April 2022.

Introduction: On the Nature of Situational Awareness
Josiah Dykstra, Neil Rowe, Timothy Shimeall, Angela Horneman, and Marisa Midler. Digital Threats: Research and Practice, Vol. 2, No. 4, December 2021.

Action Bias and the Two Most Dangerous Words in Cybersecurity
Josiah Dykstra and Douglas Hough. Black Hat Briefings USA. August 2021. Video

Omnichannel Cybersecurity: Optimizing Security by Leveraging Asymmetric Motivation
Spencer Oriot, Adam Williams, Josiah Dykstra. 20th Annual Workshop on the Economics of Information Security (WEIS 2021). June 2021.

Invisible Security: Protecting Users with No Time to Spare
Josiah Dykstra. RSA Conference. May 2021. Video

Invisible Security: Protecting Users with No Time to Spare
Josiah Dykstra. 2020 IEEE 6th International Conference on Collaboration and Internet Computing (CIC), December 2020.

Cybersecurity in Medical Private Practice: Results of a Survey in Audiology
Josiah Dykstra, Rohan Mathur, Alicia Spoor. 2020 IEEE 6th International Conference on Collaboration and Internet Computing (CIC), December 2020.

Differentiating Kinetic and Cyber Weapons to Improve Integrated Combat
Thomas S. Walcott, J. Chris Inglis, Josiah Dykstra. Joint Forces Quarterly, No. 99, October 2020.

It Lurks Within: A Look at the Unexpected Security Implications of Compliance Programs
Rock Stevens, Josiah Dykstra, Wendy Knox Everett, Michelle Mazurek, IEEE Security & Privacy, September/October 2020.

Cyber Buzz: Examining Virality Characteristics of Cybersecurity Content in Social Networks
Thomas Shields, Hannah Li, Peter Lebedev, Josiah Dykstra. Human Factors and Ergonomics Society Annual Meeting, October 2020.

Gaps and Opportunities in Situational Awareness for Cybersecurity
Robert Gutzwiller, Josiah Dykstra, Bryan Payne. Digital Threats: Research and Practice, Vol. 1, No. 3, September 2020.

Compliance Cautions: Investigating Security Issues Associated with U.S. Digital-Security Standards
Rock Stevens, Josiah Dykstra, James Chapman, Wendy Knox Everette, Garrett Bladow, Alexander Farmer, Kevin Halliday, Michelle Mazurek. Network and Distributed System Security Symposium (NDSS), February 2020.

Help, I’ve Been Hacked!”: Insights from a Corpus of User-Reported Cyber Victimization Cases on Twitter
Margaret Gratian, Darshan Bhansali, Michel Cukier, Josiah Dykstra. Human Factors and Ergonomics Society Annual Meeting, October 2019.

The CATS Hackathon: Creating and Refining Test Items for Cybersecurity Concept Inventories
Alan T. Sherman, Linda Oliva, Enis Golaszewski, Dhananjay Phatak, Travis Scheponik, Geoffrey L. Herman, Dong San Choi, Spencer E. Offenberger, Peter Peterson, Josiah Dykstra, Gregory V. Bard, Ankur Chattopadhyay, Filipo Sharevski, Rakesh Verma, Ryan Vrecenar. IEEE Security and Privacy,  Vol. 17, No. 6. pp. 77-83, 2019.

Lessons from Using the I-Corps Methodology to Understand Cyber Threat Intelligence Sharing
Josiah Dykstra, Matt Fante, Paul Donahue, Dawn Varva, Linda Wilk, Amanda Johnson. In CSET 2019: 12th USENIX Workshop on Cyber Security Experimentation and Test. August 2019.

Sonification with Music for Cybersecurity Situational Awareness
Courtney Falk and Josiah Dykstra. 25th International Conference on Auditory Display, June 2019.

Identifying Infected Users via Network Traffic: An Empirical Study
Margaret Gratian, Darshan Bhansali, Michel Cukier, and Josiah Dykstra. Computers & Security, Vol. 80, pp. 306-316, January 2019.

Stress and Hacking: Understanding Cognitive Stress in Tactical Cyber Ops
Celeste Lyn Paul and Josiah Dykstra. Black Hat Briefings USA. August 2018. Video

Cyber Operations Stress Survey (COSS): Studying fatigue, frustration, and cognitive workload in cybersecurity operations
Josiah Dykstra and Celeste Lyn Paul. In CSET 2018: 11th USENIX Workshop on Cyber Security Experimentation and Test. August 2018. Download 2-page survey.

Network Anomaly Analysis using the Microsoft HoloLens
Steve Beitzel, Josiah Dykstra, Paul Toliver, and Jason Youzwak. Proceedings of the Human Factors and Ergonomics Society Annual Meeting, Vol. 62, Issue 1, pp. 2094 – 2098, 2018.

Correlating Human Traits and Cybersecurity Behavior Intentions
Margaret Gratian, Sruthi Bandi, Michel Cukier, Josiah Dykstra, and Amy Ginther. Computers & Security, Vol. 73, pp. 345-358, March 2018.

The Case for Disappearing Cyber Security
Josiah Dykstra and Eugene H. Spafford. Communications of the ACM, Vol. 61 No. 7, pp. 40-42, July 2018.

Cyber Issues Related to Social and Behavioral Sciences for National Security
Josiah Dykstra. Whitepaper for the Committee on a Decadal Survey of Social and Behavioral Sciences for Applications to National Security, National Academies of Sciences, Engineering, and Medicine, 2017.

She blinded me with science: Understanding misleading, manipulative, and deceptive cybersecurity
Josiah Dykstra. O’Reilly Security Conference, October 2017.

Exploring 3D cybersecurity visualization with Microsoft Hololens
Steve Beitzel, Josiah Dykstra, Paul Toliver, and Jason Youzwak. AHFE 2017: 8th International Conference on Applied Human Factors and Ergonomics, July 2017.

Understanding Operator Fatigue, Frustration, and Cognitive Workload in Tactical Cybersecurity Operations
Celeste Lyn Paul and Josiah Dykstra. Journal of Information Warfare, Vol. 16, Issue 2, pp. 1-11, June 2017.

Acting in the Unknown: The Cynefin Framework for Managing Cybersecurity Risk in Dynamic Decision Making
Josiah Dykstra and Stephen R. Orr, IV. CyCon 2016: U.S. International Conference on Cyber Conflict, October 2016.

Cognitive Performance Impact of Augmented Reality for Network Operations Tasks
Steve Beitzel, Josiah Dykstra, Sean Huver, Michael Kaplan, Michael Loushine, and Jason Youzwak. AHFE 2016: 7th International Conference on Applied Human Factors and Ergonomics, July 2016.

Stress and the Cyber Warrior: Cognitive Workload in a Computer Operations Center
Josiah Dykstra and Celeste Lyn Paul. Journal of Sensitive Cyber Operations Research and Engineering, Vol. 3, Issue 1, pp. 1-23, 2015.

Design and Implementation of FROST: Digital Forensic Tools for the OpenStack Cloud Computing Platform
Josiah Dykstra and Alan T. Sherman. Digital Investigation, Vol. 10 Supplement, pp. S87-S95, August 2013.

Seizing Electronic Evidence from Cloud Computing Environments
Josiah Dykstra. In Cybercrime and Cloud Forensics: Applications for Investigation Processes, Keyun Ruan, ed, pp. 156-185, 2013. Sample Search Warrant.

Forensic Collection of Electronic Evidence from Infrastructure-As-A-Service Cloud Computing
Josiah Dykstra and Damien Riehl. Richmond Journal of Law and Technology, Vol. XIX, Issue 1, 2012.

Acquiring Forensic Evidence from Infrastructure-as-a-Service Cloud Computing
Josiah Dykstra and Alan T. Sherman. Digital Investigation, Vol. 9 Supplement, pp. S90-S98, August 2012.

Understanding Issues in Cloud Forensics: Two Hypothetical Case Studies
Josiah Dykstra and Alan T. Sherman. Journal of Network Forensics Vol. 3, Issue 1, pp. 19–31, Autumn 2011.