In this paper, we discuss the scientific method and how it can be applied to computer security experiments. We reiterate a number of general scientific principles, such as falsifiable hypotheses, scientific controls, reproducible results, and data quality. © 2007 International Federation for Information Processing.
CITATION STYLE
Peisert, S., & Bishop, M. (2007). How to design computer security experiments. In IFIP International Federation for Information Processing (Vol. 237, pp. 141–148). https://doi.org/10.1007/978-0-387-73269-5_19
Mendeley helps you to discover research relevant for your work.