Zobrazeno 1 - 10
of 3 021
pro vyhledávání: '"DYKSTRA P"'
Autor:
Shostack, Adam, Dykstra, Josiah
The devastating health, societal, and economic impacts of the COVID-19 pandemic illuminate potential dangers of unpreparedness for catastrophic pandemic-scale cyber events. While the nature of these threats differs, the responses to COVID-19 illustra
Externí odkaz:
http://arxiv.org/abs/2408.08417
Variations of the Flip-It game have been applied to model network cyber operations. While Flip-It can accurately express uncertainty and loss of control, it imposes no essential resource constraints for operations. Capture the flag (CTF) style compet
Externí odkaz:
http://arxiv.org/abs/2403.10789
Autor:
Reece, Morgan, Lander Jr., Theodore, Mittal, Sudip, Rastogi, Nidhi, Dykstra, Josiah, Sampson, Andy
Publikováno v:
39th ACM Annual Computer Security Applications Conference 2023 (ACM ACSAC 2023)
As organizations increasingly use cloud services to host their IT infrastructure, there is a need to share data among these cloud hosted services and systems. A majority of IT organizations have workloads spread across different cloud service provide
Externí odkaz:
http://arxiv.org/abs/2311.01247
The ideal shock absorber combines high stiffness with high energy absorption whilst retaining structural integrity after impact and is scalable for industrial production. So far no structure meets all of these criteria. Here, we introduce a special o
Externí odkaz:
http://arxiv.org/abs/2310.04748
Autor:
Kepner, Jeremy, Jones, Michael, Dykstra, Phil, Byun, Chansup, Davis, Timothy, Jananthan, Hayden, Arcand, William, Bestor, David, Bergeron, William, Gadepally, Vijay, Houle, Micheal, Hubbell, Matthew, Klein, Anna, Milechin, Lauren, Morales, Guillermo, Mullen, Julie, Patel, Ritesh, Pentland, Alex, Pisharody, Sandeep, Prout, Andrew, Reuther, Albert, Rosa, Antonio, Samsi, Siddharth, Trigg, Tyler, Yee, Charles, Michaleas, Peter
Defending community-owned cyber space requires community-based efforts. Large-scale network observations that uphold the highest regard for privacy are key to protecting our shared cyberspace. Deployment of the necessary network sensors requires care
Externí odkaz:
http://arxiv.org/abs/2309.01806
Autor:
Mathieu JP Poirier, Andrea Morales Caceres, Tieneke E Dykstra, Aline Dayrell Ferreira Sales, Waleska Teixeira Caiaffa
Publikováno v:
International Journal for Equity in Health, Vol 23, Iss 1, Pp 1-14 (2024)
Abstract Background The COVID-19 pandemic has spread through pre-existing fault lines in societies, deepening structural barriers faced by precarious workers, low-income populations, and racialized communities in lower income sub-city units. Many stu
Externí odkaz:
https://doaj.org/article/51713e428003455b9212c1d6a2988c6e
Autor:
Savin, Georgel, Asseri, Ammar, Dykstra, Josiah, Goohs, Jonathan, Melarano, Anthony, Casey, William
Industry standard frameworks are now widespread for labeling the high-level stages and granular actions of attacker and defender behavior in cyberspace. While these labels are used for atomic actions, and to some extent for sequences of actions, ther
Externí odkaz:
http://arxiv.org/abs/2307.10877
The COVID-19 pandemic has significantly transformed the healthcare sector, with telehealth services being among the most prominent changes. The adoption of telehealth services, however, has raised new challenges, particularly in the areas of security
Externí odkaz:
http://arxiv.org/abs/2306.05725
Sensitive information is intrinsically tied to interactions in healthcare, and its protection is of paramount importance for achieving high-quality patient outcomes. Research in healthcare privacy and security is predominantly focused on understandin
Externí odkaz:
http://arxiv.org/abs/2306.06033
Autor:
Reece, Morgan, Lander Jr., Theodore Edward, Stoffolano, Matthew, Sampson, Andy, Dykstra, Josiah, Mittal, Sudip, Rastogi, Nidhi
With the increasing use of multi-cloud environments, security professionals face challenges in configuration, management, and integration due to uneven security capabilities and features among providers. As a result, a fragmented approach toward secu
Externí odkaz:
http://arxiv.org/abs/2306.01862