Cyber Security and Privacy Experiments: A Design and Reporting Toolkit

被引:5
|
作者
Coopamootoo, Kovila P. L. [1 ]
Gross, Thomas [1 ]
机构
[1] Newcastle Univ, Newcastle Upon Tyne, Tyne & Wear, England
基金
欧洲研究理事会;
关键词
CONFIDENCE;
D O I
10.1007/978-3-319-92925-5_17
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With cyber security increasingly flourishing into a scientific discipline, there has been a number of proposals to advance evidence-based research, ranging from introductions of evidence-based methodology [8], proposals to make experiments dependable [30], guidance for experiment design [8,38], to overviews of pitfalls to avoid when writing about experiments [42]. However, one is still given to wonder: What are the best practices in reporting research that act as tell-tale signs of reliable research. We aim at developing a set of indicators for complete reporting that can drive the quality of experimental research as well as support the reviewing process. As method, we review literature on key ingredients for sound experiment and studied fallacies and shortcomings in other fields. We draw on lessons learned and infuse them into indicators. We provide definition, reporting examples, importance and impact and guiding steps to be taken for each indicator. As results, we offer a toolkit with nine systematic indictors for designing and reporting experiments. We report on lessons and challenges from an initial sharing of this toolkit with the community. The toolkit is a valuable companion for researchers. It incites the consideration of scientific foundations at experiment design and reporting phases. It also supports program committees and reviewers in quality decisions, thereby impacting the state of our field.
引用
收藏
页码:243 / 262
页数:20
相关论文
共 50 条
  • [31] Special Issue on Security and Privacy in Cyber-Physical Systems
    Yu, Wei
    Fu, Xinwen
    Song, Houbing
    Economides, Anastasios A.
    Jo, Minho
    Zhao, Wei
    IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (06): : 1798 - 1801
  • [32] Security, Trust and Privacy in Cyber (STPCyber): Future trends and challenges
    Nanda, Priyadarsi
    He, Xiangjian
    Yang, Laurence T.
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 109 (109): : 446 - 449
  • [33] A Tutorial Introduction to Security and Privacy for Cyber-Physical Systems
    Chong, Michelle S.
    Sandberg, Henrik
    Teixeira, Andre M. H.
    2019 18TH EUROPEAN CONTROL CONFERENCE (ECC), 2019, : 968 - 978
  • [34] Security and Privacy in the Emerging Cyber-Physical World: A Survey
    Yu, Zhiyuan
    Kaplan, Zack
    Yan, Qiben
    Zhang, Ning
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2021, 23 (03): : 1879 - 1919
  • [35] Security and Privacy in Cyber-Physical Systems: A Survey of Surveys
    Giraldo, Jairo
    Sarkar, Esha
    Cardenas, Alvaro A.
    Maniatakos, Michail
    Kantarcioglu, Murat
    IEEE DESIGN & TEST, 2017, 34 (04) : 7 - 17
  • [36] Cyber Security Assistant:Design Overview
    Sayan, Carla
    Hariri, Salim
    Ball, George
    2017 IEEE 2ND INTERNATIONAL WORKSHOPS ON FOUNDATIONS AND APPLICATIONS OF SELF* SYSTEMS (FAS*W), 2017, : 313 - 317
  • [37] Effective Measurement Design for Cyber Security
    Gol, Murat
    Abur, Ali
    2014 POWER SYSTEMS COMPUTATION CONFERENCE (PSCC), 2014,
  • [38] Towards a cyber security reporting system - A quality improvement process
    Gonzalez, JJ
    COMPUTER SAFETY, RELIABILITY, AND SECURITY, PROCEEDINGS, 2005, 3688 : 368 - 380
  • [39] Design Considerations for Cyber Security Testbeds: A Case Study on a Cyber Security Testbed for Education
    Frank, Maximilian
    Leitner, Maria
    Pahi, Timea
    2017 IEEE 15TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 15TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 3RD INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS(DASC/PICOM/DATACOM/CYBERSCI, 2017, : 38 - 46
  • [40] DCAFE: A Distributed Cyber Security Automation Framework for Experiments
    Rush, George
    Tauritz, Daniel R.
    Kent, Alexander D.
    2014 38TH ANNUAL IEEE INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSACW 2014), 2014, : 134 - 139