Research Methods for Cyber Security teaches scientific methods for generating impactful knowledge, validating theories, and adding critical rigor to the cyber security field. This book shows how to develop a research plan, beginning by starting research with a question, then offers an introduction to the broad range of useful research methods for cyber security research: observational, mathematical, experimental, and applied. Each research method chapter concludes with recommended outlines and suggested templates for submission to peer reviewed venues. This book concludes with information on cross-cutting issues within cyber security research. Cyber security research contends with numerous unique issues, such as an extremely fast environment evolution, adversarial behavior, and the merging of natural and social science phenomena. Research Methods for Cyber Security addresses these concerns and much more by teaching readers not only the process of science in the context of cyber security research, but providing assistance in execution of research as well. Presents research methods from a cyber security science perspective Catalyzes the rigorous research necessary to propel the cyber security field forward Provides a guided method selection for the type of research being conducted, presented in the context of real-world usage
The questions the authors were asked to answer were: how can cybersecurity be defined? What disciplines in the humanities and social sciences are studying, and how, cybersecurity? What is the place of pluralism or interdisciplinarity?
Methodologies, Ethics, and Critical Approaches Anita Lavorgna Thomas J. Holt. Titus, R., Heinzelmann, F., & Boyle, J. (1995). Victimisation of persons by fraud. Crime and Delinquency, 41(1), 54–72. UK Finance. (2019).
Featuring coverage on a broad range of topics, such as behavioral analysis, cyberpsychology, and online privacy, this book is geared towards IT specialists, administrators, business managers, researchers, and students interested in online ...
Distributed Control and Cyber Security Issues in Microgrids presents a thorough treatment of distributed control methods and cyber security issues for power system researchers and engineers.
The Handbook of Research on Machine and Deep Learning Applications for Cyber Security is a pivotal reference source that provides vital research on the application of machine learning techniques for network security research.
Foundational Cybersecurity Research focuses on foundational research strategies for organizing people, technologies, and governance.
Including innovative studies on cloud security, online threat protection, and cryptography, this multi-volume book is an ideal source for IT specialists, administrators, researchers, and students interested in uncovering new ways to thwart ...
This book is ideal for social scientists, practitioners, librarians, researchers, academicians, and students interested in social research methodology and its developments in the digital scenario.
This book presents the implementation of novel concepts and solutions, which allows to enhance the cyber security of administrative and industrial systems and the resilience of economies and societies to cyber and hybrid threats.
The Handbook of Research on Multimedia Cyber Security provides emerging research exploring the theoretical and practical aspects of current security practices and techniques within multimedia information and assessing modern challenges.