Skip to main content
Download PDF
- Main
How to Design Computer Security Experiments
Published Web Location
http://www.springer.com/computer/security+and+cryptology/book/978-0-387-73268-8Abstract
In this paper, we discuss the scientific method and how it can be applied to computer security experiments. We reiterate a number of general scientific principles, such as falsifiable hypotheses, scientific controls, reproducible results, and data quality.
Many UC-authored scholarly publications are freely available on this site because of the UC's open access policies. Let us know how this access is important for you.