, , , , , e.a.

Research Methods for Cyber Security

Specificaties
Paperback, blz. | Engels
Elsevier Science | e druk, 2017
ISBN13: 9780128053492
Rubricering
Elsevier Science e druk, 2017 9780128053492
Verwachte levertijd ongeveer 9 werkdagen

Samenvatting

Research Methods for Cyber Security teaches scientific methods for generating impactful knowledge, validating theories, and adding critical rigor to the cyber security field. This book shows how to develop a research plan, beginning by starting research with a question, then offers an introduction to the broad range of useful research methods for cyber security research: observational, mathematical, experimental, and applied. Each research method chapter concludes with recommended outlines and suggested templates for submission to peer reviewed venues. This book concludes with information on cross-cutting issues within cyber security research.

Cyber security research contends with numerous unique issues, such as an extremely fast environment evolution, adversarial behavior, and the merging of natural and social science phenomena. Research Methods for Cyber Security addresses these concerns and much more by teaching readers not only the process of science in the context of cyber security research, but providing assistance in execution of research as well.

Specificaties

ISBN13:9780128053492
Taal:Engels
Bindwijze:Paperback

Inhoudsopgave

<p>Part I. Introduction<br>1. Introduction to Science<br>2. Science and Cyber Security<br>3. Starting Your Research</p> <p>Part II. Observational Research Methods<br>4. Exploratory Study<br>5. Descriptive Study<br>6. Machine Learning</p> <p>Part III: Mathematical Research Methods<br>7. Theoretical Research<br>8. Using Simulation for Research</p> <p>Part IV. Experimental Research Methods<br>9. Hypothetico-deductive Research<br>10. Quasi-experimental Research</p> <p>Part V. Applied Research Methods<br>11. Applied Experimentation<br>12. Applied Observational Study</p> <p>Part VI: Additional Materials<br>13. Instrumentation<br>14. Addressing the Adversary<br>15. Scientific Ethics</p>

Rubrieken

Populaire producten

    Personen

      Trefwoorden

        Research Methods for Cyber Security