Skip to main content
eScholarship
Open Access Publications from the University of California

How to Design Computer Security Experiments

  • Author(s): Peisert, Sean
  • Bishop, Matt
  • et al.
Abstract

In this paper, we discuss the scientific method and how it can be applied to computer security experiments. We reiterate a number of general scientific principles, such as falsifiable hypotheses, scientific controls, reproducible results, and data quality.

Many UC-authored scholarly publications are freely available on this site because of the UC's open access policies. Let us know how this access is important for you.

Main Content
Current View