Skip to main content
Open Access Publications from the University of California

How to Design Computer Security Experiments

  • Author(s): Peisert, Sean
  • Bishop, Matt
  • et al.

In this paper, we discuss the scientific method and how it can be applied to computer security experiments. We reiterate a number of general scientific principles, such as falsifiable hypotheses, scientific controls, reproducible results, and data quality.

Many UC-authored scholarly publications are freely available on this site because of the UC Academic Senate's Open Access Policy. Let us know how this access is important for you.

Main Content
Current View