Zobrazeno 1 - 10
of 84
pro vyhledávání: '"DYKSTRA, JOSIAH"'
Autor:
Tazi, Faiza1 (AUTHOR) faiza.tazi@du.edu, Dykstra, Josiah2 (AUTHOR) josiah@designersecurity.com, Rajivan, Prashanth3 (AUTHOR) prajivan@uw.edu, Chalil Madathil, Kapil4 (AUTHOR) kmadath@clemson.edu, Hughart, Jiovanne5 (AUTHOR) abizwhiz@icloud.com, McElligott, James6 (AUTHOR) mcellig@musc.edu, Votipka, Daniel7 (AUTHOR) dvotipka@cs.tufts.edu, Das, Sanchari8 (AUTHOR) Sanchari.Das@du.edu
Publikováno v:
Communications of the ACM. Sep2024, Vol. 67 Issue 9, p27-30. 4p.
Autor:
Shostack, Adam, Dykstra, Josiah
The devastating health, societal, and economic impacts of the COVID-19 pandemic illuminate potential dangers of unpreparedness for catastrophic pandemic-scale cyber events. While the nature of these threats differs, the responses to COVID-19 illustra
Externí odkaz:
http://arxiv.org/abs/2408.08417
Variations of the Flip-It game have been applied to model network cyber operations. While Flip-It can accurately express uncertainty and loss of control, it imposes no essential resource constraints for operations. Capture the flag (CTF) style compet
Externí odkaz:
http://arxiv.org/abs/2403.10789
Autor:
Reece, Morgan, Lander Jr., Theodore, Mittal, Sudip, Rastogi, Nidhi, Dykstra, Josiah, Sampson, Andy
Publikováno v:
39th ACM Annual Computer Security Applications Conference 2023 (ACM ACSAC 2023)
As organizations increasingly use cloud services to host their IT infrastructure, there is a need to share data among these cloud hosted services and systems. A majority of IT organizations have workloads spread across different cloud service provide
Externí odkaz:
http://arxiv.org/abs/2311.01247
Autor:
Savin, Georgel, Asseri, Ammar, Dykstra, Josiah, Goohs, Jonathan, Melarano, Anthony, Casey, William
Industry standard frameworks are now widespread for labeling the high-level stages and granular actions of attacker and defender behavior in cyberspace. While these labels are used for atomic actions, and to some extent for sequences of actions, ther
Externí odkaz:
http://arxiv.org/abs/2307.10877
The COVID-19 pandemic has significantly transformed the healthcare sector, with telehealth services being among the most prominent changes. The adoption of telehealth services, however, has raised new challenges, particularly in the areas of security
Externí odkaz:
http://arxiv.org/abs/2306.05725
Sensitive information is intrinsically tied to interactions in healthcare, and its protection is of paramount importance for achieving high-quality patient outcomes. Research in healthcare privacy and security is predominantly focused on understandin
Externí odkaz:
http://arxiv.org/abs/2306.06033
Autor:
Reece, Morgan, Lander Jr., Theodore Edward, Stoffolano, Matthew, Sampson, Andy, Dykstra, Josiah, Mittal, Sudip, Rastogi, Nidhi
With the increasing use of multi-cloud environments, security professionals face challenges in configuration, management, and integration due to uneven security capabilities and features among providers. As a result, a fragmented approach toward secu
Externí odkaz:
http://arxiv.org/abs/2306.01862
Choice architecture describes the design by which choices are presented to people. Nudges are an aspect intended to make "good" outcomes easy, such as using password meters to encourage strong passwords. Sludge, on the contrary, is friction that rais
Externí odkaz:
http://arxiv.org/abs/2211.16626
Autor:
SHORTRIDGE, KELLY1, DYKSTRA, JOSIAH2
Publikováno v:
Communications of the ACM. Jul2023, Vol. 66 Issue 7, p96-104. 9p. 1 Color Photograph, 2 Charts.