Cyber Security and Privacy Experiments: A Design and Reporting Toolkit

被引:5
|
作者
Coopamootoo, Kovila P. L. [1 ]
Gross, Thomas [1 ]
机构
[1] Newcastle Univ, Newcastle Upon Tyne, Tyne & Wear, England
基金
欧洲研究理事会;
关键词
CONFIDENCE;
D O I
10.1007/978-3-319-92925-5_17
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With cyber security increasingly flourishing into a scientific discipline, there has been a number of proposals to advance evidence-based research, ranging from introductions of evidence-based methodology [8], proposals to make experiments dependable [30], guidance for experiment design [8,38], to overviews of pitfalls to avoid when writing about experiments [42]. However, one is still given to wonder: What are the best practices in reporting research that act as tell-tale signs of reliable research. We aim at developing a set of indicators for complete reporting that can drive the quality of experimental research as well as support the reviewing process. As method, we review literature on key ingredients for sound experiment and studied fallacies and shortcomings in other fields. We draw on lessons learned and infuse them into indicators. We provide definition, reporting examples, importance and impact and guiding steps to be taken for each indicator. As results, we offer a toolkit with nine systematic indictors for designing and reporting experiments. We report on lessons and challenges from an initial sharing of this toolkit with the community. The toolkit is a valuable companion for researchers. It incites the consideration of scientific foundations at experiment design and reporting phases. It also supports program committees and reviewers in quality decisions, thereby impacting the state of our field.
引用
收藏
页码:243 / 262
页数:20
相关论文
共 50 条
  • [21] Survey on security and privacy issues in cyber physical systems
    Nazarenko A.A.
    Safdar G.A.
    AIMS Electronics and Electrical Engineering, 2019, 3 (02): : 111 - 143
  • [22] Special Issue on Cyber Security and Privacy in Communication Networks
    Gupta, C. P.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2019, 13 (01) : V - VI
  • [23] Security and Privacy for Smart Cyber-Physical Systems
    Ma, Liran
    Huo, Yan
    Hu, Chunqiang
    Li, Wei
    SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [24] Cyber Security and Privacy Issues in Industrial Internet of Things
    Jhanjhi, N. Z.
    Humayun, Mamoona
    Almuayqil, Saleh N.
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2021, 37 (03): : 361 - 380
  • [25] Reporting a Cyber Security Breach: How Organizations Respond
    Naidoo, Jef
    Dulek, Ron
    Butler, Seth
    Baily, Brooke
    INTERNATIONAL JOURNAL OF BUSINESS COMMUNICATION, 2024,
  • [26] A Socio-Technical Regime Transitions Model for Gerontechnology Service Design: Privacy, Information Security and Cyber Security in Focus
    Kowalski, Stewart James
    Ostby, Grethe
    PHEALTH 2022, 2022, 299 : 20 - 29
  • [27] Empowering boards: How the National Cyber Security Centre Board (United Kingdom) toolkit is transforming cyber security governance Reply
    Tarka, Mitchell
    Blankstein, Michael
    Schottel, Patrick
    INJURY-INTERNATIONAL JOURNAL OF THE CARE OF THE INJURED, 2023, 54 (11):
  • [28] Security and Privacy by Declarative Design
    Maffei, Matteo
    Pecina, Kim
    Reinert, Manuel
    2013 IEEE 26TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2013, : 81 - 96
  • [29] Cyber-Physical Security and Privacy in the Electric Smart Grid
    1600, Morgan and Claypool Publishers (09):
  • [30] AI-Driven Cyber Security Analytics and Privacy Protection
    Chen, Jiageng
    Su, Chunhua
    Yan, Zheng
    SECURITY AND COMMUNICATION NETWORKS, 2019, 2019