Skip to product information
1 of 1
Regular price £60.89 GBP
Regular price £70.99 GBP Sale price £60.89 GBP
Sale Sold out
Free UK Shipping

Freshly Printed - allow 10 days lead

Research Methods for Cyber Security

This practical guide offers a systematic research methodology for making improvements to the field of cyber security

Thomas W. Edgar (Author), David O. Manz (Author)

9780128053492, Elsevier Science

Paperback, published 21 April 2017

428 pages
23.5 x 19 x 2.7 cm, 0.84 kg

Research Methods for Cyber Security teaches scientific methods for generating impactful knowledge, validating theories, and adding critical rigor to the cyber security field. This book shows how to develop a research plan, beginning by starting research with a question, then offers an introduction to the broad range of useful research methods for cyber security research: observational, mathematical, experimental, and applied. Each research method chapter concludes with recommended outlines and suggested templates for submission to peer reviewed venues. This book concludes with information on cross-cutting issues within cyber security research.

Cyber security research contends with numerous unique issues, such as an extremely fast environment evolution, adversarial behavior, and the merging of natural and social science phenomena. Research Methods for Cyber Security addresses these concerns and much more by teaching readers not only the process of science in the context of cyber security research, but providing assistance in execution of research as well.

Part I. Introduction 1. Introduction to Science 2. Science and Cyber Security 3. Starting Your Research

Part II. Observational Research Methods 4. Exploratory Study 5. Descriptive Study 6. Machine Learning

Part III: Mathematical Research Methods 7. Theoretical Research 8. Using Simulation for Research

Part IV. Experimental Research Methods 9. Hypothetico-deductive Research 10. Quasi-experimental Research

Part V. Applied Research Methods 11. Applied Experimentation 12. Applied Observational Study

Part VI: Additional Materials 13. Instrumentation 14. Addressing the Adversary 15. Scientific Ethics

Subject Areas: Computer security [UR]

View full details