Abstract
In this paper, we discuss the scientific method and how it can be applied to computer security experiments. We reiterate a number of general scientific principles, such as falsifiable hypotheses, scientific controls, reproducible results, and data quality.
Please use the following format when citing this chapter: Peisert. S., Bishop. M., 2007, in IFIP International Federation for Information Processing, Volume 237. Fifth World Conference on Information Security Education, eds. Futcher, L., Dodge, R., (Boston: Springer), pp. 141–148.
Chapter PDF
References
Aristotle. Organon. 100 B.C.E.
Matt Bishop. Computer Security: Art and Science. Addison-Wesley Professional, Boston, MA, 2003.
Robert Boyle. The Unsuccessful Experiment. In Certain Physiological Essays. Henry Herringman, London, 1661.
Darrell Huff. How to Lie With Statistics. Norton, 1954.
Thomas S. Kuhn. The Structure of Scientific Revolutions. University of Chicago Press, Chicago, 1962.
James Lind. A Treatise of the Scurvy. Sands, Murray, and Cochran for A Kincaid and A Donaldson, 1753.
Sir Isaac Newton. Philosophiae Naturalis Prmcipia Mathematica. The Royal Society, 1687.
Karl Raimund Popper. The Logic of Scientific Discovery. Routledge, 1959.
Lance Spitzner. The Honeynet Project: Trapping the Hackers. IEEE Security & Privacy, 1(2): 15–23, Mar–Apr 2003.
The Free Encyclopedia Wikipedia. Scientific method. http://en.wikipedia.org/w/index.php?title=Scientific_method&oldid=104300855, January 30 09:59 UTC 2007.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 International Federation for Information Processing
About this paper
Cite this paper
Peisert, S., Bishop, M. (2007). How to Design Computer Security Experiments. In: Futcher, L., Dodge, R. (eds) Fifth World Conference on Information Security Education. WISE 2007. IFIP Advances in Information and Communication Technology, vol 237. Springer, New York, NY. https://doi.org/10.1007/978-0-387-73269-5_19
Download citation
DOI: https://doi.org/10.1007/978-0-387-73269-5_19
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-0-387-73268-8
Online ISBN: 978-0-387-73269-5
eBook Packages: Computer ScienceComputer Science (R0)