How to Design Computer Security Experiments
- Author(s): Peisert, Sean
- Bishop, Matt
- et al.
Published Web Locationhttp://www.springer.com/computer/security+and+cryptology/book/978-0-387-73268-8
In this paper, we discuss the scientific method and how it can be applied to computer security experiments. We reiterate a number of general scientific principles, such as falsifiable hypotheses, scientific controls, reproducible results, and data quality.
Many UC-authored scholarly publications are freely available on this site because of the UC Academic Senate's Open Access Policy. Let us know how this access is important for you.