Computer forensics in forensis
ACM SIGOPS Operating Systems Review
E-voting and forensics: prying open the black box
EVT/WOTE'09 Proceedings of the 2009 conference on Electronic voting technology/workshop on trustworthy elections
Hi-index | 0.00 |
To evaluate anything we can't prove using pure mathematics or logical syllogism, we must test hypotheses by performing controlled experiments to generate measurable, empirical data. But today's computer security researchers often claim "proof" without following this approach. Failure to follow the scientific method rigorously can create problems. This article presents a method for scientific experimentation when others aren't appropriate or can't be readily applied. The goal is to further motivate researchers to apply science to experiments and, in concert with the authors' earlier work, offer a new technique for doing so.