Affordable Access

How to Design Computer Security Experiments

IFIP International Federation for Information Processing
Publication Date


In this paper, we discuss the scientific method and how it can be applied to computer security experiments. We reiterate a number of general scientific principles, such as falsifiable hypotheses, scientific controls, reproducible results, and data quality Full Text at Springer, may require registration or fee

There are no comments yet on this publication. Be the first to share your thoughts.