Cyber Security and Privacy Experiments: A Design and Reporting Toolkit

被引:5
|
作者
Coopamootoo, Kovila P. L. [1 ]
Gross, Thomas [1 ]
机构
[1] Newcastle Univ, Newcastle Upon Tyne, Tyne & Wear, England
基金
欧洲研究理事会;
关键词
CONFIDENCE;
D O I
10.1007/978-3-319-92925-5_17
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With cyber security increasingly flourishing into a scientific discipline, there has been a number of proposals to advance evidence-based research, ranging from introductions of evidence-based methodology [8], proposals to make experiments dependable [30], guidance for experiment design [8,38], to overviews of pitfalls to avoid when writing about experiments [42]. However, one is still given to wonder: What are the best practices in reporting research that act as tell-tale signs of reliable research. We aim at developing a set of indicators for complete reporting that can drive the quality of experimental research as well as support the reviewing process. As method, we review literature on key ingredients for sound experiment and studied fallacies and shortcomings in other fields. We draw on lessons learned and infuse them into indicators. We provide definition, reporting examples, importance and impact and guiding steps to be taken for each indicator. As results, we offer a toolkit with nine systematic indictors for designing and reporting experiments. We report on lessons and challenges from an initial sharing of this toolkit with the community. The toolkit is a valuable companion for researchers. It incites the consideration of scientific foundations at experiment design and reporting phases. It also supports program committees and reviewers in quality decisions, thereby impacting the state of our field.
引用
收藏
页码:243 / 262
页数:20
相关论文
共 50 条
  • [1] Application of HAZOP to the Design of Cyber Security Experiments
    Mansoori, Masood
    Welch, Ian
    Choo, Kim-Kwang Raymond
    Maxion, Roy A.
    IEEE 30TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS IEEE AINA 2016, 2016, : 790 - 799
  • [2] Automated Cyber and Privacy Risk Management Toolkit
    Gonzalez-Granadillo, Gustavo
    Menesidou, Sofia Anna
    Papamartzivanos, Dimitrios
    Romeu, Ramon
    Navarro-Llobet, Diana
    Okoh, Caxton
    Nifakos, Sokratis
    Xenakis, Christos
    Panaousis, Emmanouil
    SENSORS, 2021, 21 (16)
  • [3] Cyber-Security and Privacy
    Lopez, Javier
    Martinelli, Fabio
    Samarati, Pierangela
    ERCIM NEWS, 2015, (100): : 10 - 11
  • [4] Cyber security and privacy third cyber security and privacy EU forum, CSP forum 2014
    Cleary, Frances
    Felici, Massimo
    Communications in Computer and Information Science, 2014, 470
  • [5] Game Theory for Cyber Security and Privacy
    Do, Cuong T.
    Tran, Nguyen H.
    Hong, Choongseon
    Kamhoua, Charles A.
    Kwiat, Kevin A.
    Blasch, Erik
    Ren, Shaolei
    Pissinou, Niki
    Iyengar, Sundaraja Sitharama
    ACM COMPUTING SURVEYS, 2017, 50 (02) : 30 - 37
  • [6] Balancing Cyber-Security and Privacy
    Patakyova, Maria T.
    BRATISLAVA LAW REVIEW, 2020, 4 (01): : 181 - 183
  • [7] Cyber security challenges in Smart Cities: Safety, security and privacy
    Elmaghraby, Adel S.
    Losavio, Michael M.
    JOURNAL OF ADVANCED RESEARCH, 2014, 5 (04) : 491 - 497
  • [8] Privacy and security Cyber Defense Triad for Where Security Matters
    Schell, Roger R.
    COMMUNICATIONS OF THE ACM, 2016, 59 (11) : 20 - 23
  • [9] Cyber-Physical Security and Privacy Introduction
    Cardenas, Alvaro
    Crispo, Bruno
    IEEE INTERNET COMPUTING, 2016, 20 (05) : 6 - 8
  • [10] Cyber-Physical Systems Security and Privacy
    Henkel, Jorg
    IEEE DESIGN & TEST, 2017, 34 (04) : 4 - 4