Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}
Image of Research methods for cyber security
Bookmark Share

Text

Research methods for cyber security

Edgar, Thomas W. - Personal Name; Manz, David O. - Personal Name;

Table of Contents

Part I: Introduction

Chapter 1. Introduction to Science
Abstract
Chapter Objectives
What is Science
Types of Science
Science is Messy
From Ptolemy to Einstein—Science and the Discovery of the Nature of the Sky
Summary and Conclusions
Endnotes

Chapter 2. Science and Cyber Security
Abstract
Chapter Objectives
Defining Cyber Space
Defining Cyber Security
Cyber Security Fundamentals
Cyber Security Controls Overview
Defining a Science of Cyber Security
Challenges in Achieving Security in Cyber Space
Further Reading
Endnotes

Chapter 3. Starting Your Research
Abstract
Chapter Objectives
Starting Your Research
Research before the Research
Selecting Your Research Path
Conferences and Journals
Endnotes

Part II: Observational Research Methods

Chapter 4. Exploratory Study
Abstract
Chapter Objectives
Knowledge by Inference
Types of Studies
Gathering Data
Exploratory Method Selection
Exploratory Study Method Examples
Analysis Bias
The Search for a Causal Relationship
Reporting Your Results
Endnotes

Chapter 5. Descriptive Study
Abstract
Chapter Objectives
Descriptive Study Methods
Observation Method Selection
Gathering Data
Data Analysis
Descriptive Study Method Examples
Reporting your Results
Endnotes

Chapter 6. Machine Learning
Abstract
Chapter Objectives
What is Machine Learning
Categories of Machine Learning
Debugging Machine Learning
Bayesian Network Mathematical Preliminaries and Model Properties
Hidden Markov Models
Discussion
Sample Format
Endnotes

Part III: Mathematical Research Methods

Chapter 7. Theoretical Research
Abstract
Chapter Objectives
Background
Challenges in Development of Cyber Security Science Theory
Example Theoretical Research Construction
Reporting Your Results
Endnotes

Chapter 8. Using Simulation for Research
Abstract
Chapter Objectives
Defining Simulation
When Should Simulation Be Used
Defining What to Model
Instantiating a Model
Example Use Case
Paper Format
Endnotes

Part IV: Experimental Research Methods

Chapter 9. Hypothetico-deductive Research
Abstract
Chapter Objectives
Purpose of Hypothesis-driven Experimentation
A Proper Hypothesis
Experimentation
Analysis
Integrating the Theory with Results
Reporting Your Results
Endnotes

Chapter 10. Quasi-experimental Research
Abstract
Chapter Objectives
True versus Quasi-experiment
Cyber Drivers for Quasi-experimental Design
Quasi-experiment Research Methods
Reporting Your Results
Endnotes

Part V: Applied Research Methods

Chapter 11. Applied Experimentation
Abstract
Chapter Objectives
Building From a Theory
Methods of Applied Experimentation
Benchmarking
Reporting Your Results
Validation Testing
Independent Variables
Dependent Variables
Experimental Design
Problems With Validation Testing
Reporting Your Results
Endnotes

Chapter 12. Applied Observational Study
Abstract
Chapter Objectives
Applied Study Types
Applied Observation Method Selection
Data Collection and Analysis
Applied Exploratory Study: Stress Test
Applied Descriptive Study: Case Study
Reporting Your Results
Endnote

Part VI: Additional Materials

Chapter 13. Instrumentation
Abstract
Chapter Objectives
Understanding Your Data Needs
Overview of Data and Sensor Types
Controlled-testing Environments
Conclusion
Endnotes

Chapter 14. Addressing the Adversary
Abstract
Chapter Objectives
Defining Adversary
The Challenge of Adversarial Research
Adversaries in Other Fields of Study
Different Ways to Think About Threats
Integrating Adversary Models into Research
Conclusions
Endnotes

Chapter 15. Scientific Ethics
Abstract
Chapter Objectives
Ethics for Science
History of Ethics in Cyber Security
Ethical Standards
Cyber Security Expert Classification
Cyber Security and the Law
Human Subjects Research
Ethical Use of Data
Individual Responsibility
Conclusion
Endnotes


Availability
#
Perpustakaan Poltek SSN (Rak 000) 005.8072 EDG r
b0001337
Available - Available
#
Perpustakaan Poltek SSN (Rak 000) 005.8072 EDG r
b0002325
Available - Available
#
Perpustakaan Poltek SSN (Rak 000) 005.8072 EDG r
b0002393
Available - Available
#
Perpustakaan Poltek SSN (Rak 000) 005.8072 EDG r
b0002394
Available - Available
#
Perpustakaan Poltek SSN (Rak 000) 005.8072 EDG r
b0002395
Available - Available
#
Perpustakaan Poltek SSN (Rak 000) 005.8072 EDG r
b0002396
Available - Available
Detail Information
Series Title
--
Call Number
005.8072 EDG r
Publisher
Massachusetts : Syngress., 2017
Collation
xxiii, 404 hal.; ilus.; 24 cm
Language
English
ISBN/ISSN
9780128053492
Classification
005.8072
Content Type
-
Media Type
-
Carrier Type
-
Edition
1st edition
Subject(s)
Computer security -- Research -- Methodology
Specific Detail Info
--
Statement of Responsibility
Thomas W. Edgar dan David O. Manz
Other version/related

No other version available

File Attachment
No Data
Comments

You must be logged in to post a comment

Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?