What would a 'Science of Security' look like? This question has received considerable attention over the past 10 years. No one argues against the desirability of making security research more 'scientific.' But how would one would go about that? We argue that making progress on this requires clarifying what 'scientific' means in the context of computer security, and that has received too little attention. We pursue this based on a review of literature in the history and Philosophy of Science and a belief that work under the theme 'Science of Security' should align with and ideally, benefit from what has been learned over a few hundred years in science. We offer observations and insights, with a view that the security community can benefit fr...
This article presents basic issues concerning security research in the past, called reaching the ori...
There is a need to understand the cultural issues affecting security in large, distributed and heter...
The views or opinions presented in this paper are solely those of the authors and do not necessarily...
The past ten years has seen increasing calls to makesecurity research more 'scientific'.On the surfa...
Computer security researchers have not generally applied the scientific method when conducting exper...
In this paper, basic issues of measuring security as a system property are discussed. While traditi...
Security is perceived by various groups of theorists and practitioners in different ways, and at th...
Item does not contain fulltextIn this contribution, we cover the major philosophical concepts descri...
In this paper, we discuss the scientific method and how it can be applied to computer security exper...
We study security-development patterns in computer-science technologies through (i) the security att...
A recent paper (Oakland 2017) discussed science and security research in the context of the governme...
It is a widely accepted management principle that an activity cannot be managed well if it cannot be...
Subjective security (security of a subject) is a state of a subject, his potential and abilities of ...
Scientific advancement is fueled by solid fundamental research, followed by replication, meta-analys...
While the importance of security has long been recognised, research efforts aimed at finding a solut...
This article presents basic issues concerning security research in the past, called reaching the ori...
There is a need to understand the cultural issues affecting security in large, distributed and heter...
The views or opinions presented in this paper are solely those of the authors and do not necessarily...
The past ten years has seen increasing calls to makesecurity research more 'scientific'.On the surfa...
Computer security researchers have not generally applied the scientific method when conducting exper...
In this paper, basic issues of measuring security as a system property are discussed. While traditi...
Security is perceived by various groups of theorists and practitioners in different ways, and at th...
Item does not contain fulltextIn this contribution, we cover the major philosophical concepts descri...
In this paper, we discuss the scientific method and how it can be applied to computer security exper...
We study security-development patterns in computer-science technologies through (i) the security att...
A recent paper (Oakland 2017) discussed science and security research in the context of the governme...
It is a widely accepted management principle that an activity cannot be managed well if it cannot be...
Subjective security (security of a subject) is a state of a subject, his potential and abilities of ...
Scientific advancement is fueled by solid fundamental research, followed by replication, meta-analys...
While the importance of security has long been recognised, research efforts aimed at finding a solut...
This article presents basic issues concerning security research in the past, called reaching the ori...
There is a need to understand the cultural issues affecting security in large, distributed and heter...
The views or opinions presented in this paper are solely those of the authors and do not necessarily...