How to Design Computer Security Experiments
AbstractIn this paper, we discuss the scientific method and how it can be applied to computer security experiments. We reiterate a number of general scientific principles, such as falsifiable hypotheses, scientific controls, reproducible results, and data quality.
Copyright NoticeThe version posted here is a manuscript version. The definitive version was published in the Proceedings of the Fifth World Conference on Information Security Education, June 2007.
|Last updated on Friday, May 10, 2013 at 11:21:44AM PDT|