Research Methods for Cyber Security

Research Methods for Cyber Security
Author: Thomas W. Edgar,David O. Manz
Publsiher: Syngress
Total Pages: 428
Release: 2017-04-19
Genre: Computers
ISBN: 9780128129302

Download Research Methods for Cyber Security Book in PDF, Epub and Kindle

Research Methods for Cyber Security teaches scientific methods for generating impactful knowledge, validating theories, and adding critical rigor to the cyber security field. This book shows how to develop a research plan, beginning by starting research with a question, then offers an introduction to the broad range of useful research methods for cyber security research: observational, mathematical, experimental, and applied. Each research method chapter concludes with recommended outlines and suggested templates for submission to peer reviewed venues. This book concludes with information on cross-cutting issues within cyber security research. Cyber security research contends with numerous unique issues, such as an extremely fast environment evolution, adversarial behavior, and the merging of natural and social science phenomena. Research Methods for Cyber Security addresses these concerns and much more by teaching readers not only the process of science in the context of cyber security research, but providing assistance in execution of research as well. Presents research methods from a cyber security science perspective Catalyzes the rigorous research necessary to propel the cyber security field forward Provides a guided method selection for the type of research being conducted, presented in the context of real-world usage

Research Methods for Cyber Security

Research Methods for Cyber Security
Author: Thomas Edgar,David Manz
Publsiher: Syngress
Total Pages: 0
Release: 2017-04-21
Genre: Computers
ISBN: 0128053496

Download Research Methods for Cyber Security Book in PDF, Epub and Kindle

Research Methods for Cyber Security teaches scientific methods for generating impactful knowledge, validating theories, and adding critical rigor to the cyber security field. This book shows how to develop a research plan, beginning by starting research with a question, then offers an introduction to the broad range of useful research methods for cyber security research: observational, mathematical, experimental, and applied. Each research method chapter concludes with recommended outlines and suggested templates for submission to peer reviewed venues. This book concludes with information on cross-cutting issues within cyber security research. Cyber security research contends with numerous unique issues, such as an extremely fast environment evolution, adversarial behavior, and the merging of natural and social science phenomena. Research Methods for Cyber Security addresses these concerns and much more by teaching readers not only the process of science in the context of cyber security research, but providing assistance in execution of research as well.

Cybersecurity in Humanities and Social Sciences

Cybersecurity in Humanities and Social Sciences
Author: Hugo Loiseau,Daniel Ventre,Hartmut Aden
Publsiher: John Wiley & Sons
Total Pages: 240
Release: 2020-11-17
Genre: Computers
ISBN: 9781786305398

Download Cybersecurity in Humanities and Social Sciences Book in PDF, Epub and Kindle

The humanities and social sciences are interested in the cybersecurity object since its emergence in the security debates, at the beginning of the 2000s. This scientific production is thus still relatively young, but diversified, mobilizing at the same time political science, international relations, sociology , law, information science, security studies, surveillance studies, strategic studies, polemology. There is, however, no actual cybersecurity studies. After two decades of scientific production on this subject, we thought it essential to take stock of the research methods that could be mobilized, imagined and invented by the researchers. The research methodology on the subject "cybersecurity" has, paradoxically, been the subject of relatively few publications to date. This dimension is essential. It is the initial phase by which any researcher, seasoned or young doctoral student, must pass, to define his subject of study, delimit the contours, ask the research questions, and choose the methods of treatment. It is this methodological dimension that our book proposes to treat. The questions the authors were asked to answer were: how can cybersecurity be defined? What disciplines in the humanities and social sciences are studying, and how, cybersecurity? What is the place of pluralism or interdisciplinarity? How are the research topics chosen, the questions defined? How, concretely, to study cybersecurity: tools, methods, theories, organization of research, research fields, data ...? How are discipline-specific theories useful for understanding and studying cybersecurity? Has cybersecurity had an impact on scientific theories?

Psychological and Behavioral Examinations in Cyber Security

Psychological and Behavioral Examinations in Cyber Security
Author: McAlaney, John,Frumkin, Lara A.,Benson, Vladlena
Publsiher: IGI Global
Total Pages: 334
Release: 2018-03-09
Genre: Computers
ISBN: 9781522540540

Download Psychological and Behavioral Examinations in Cyber Security Book in PDF, Epub and Kindle

Cyber security has become a topic of concern over the past decade. As many individual and organizational activities continue to evolve digitally, it is important to examine the psychological and behavioral aspects of cyber security. Psychological and Behavioral Examinations in Cyber Security is a critical scholarly resource that examines the relationship between human behavior and interaction and cyber security. Featuring coverage on a broad range of topics, such as behavioral analysis, cyberpsychology, and online privacy, this book is geared towards IT specialists, administrators, business managers, researchers, and students interested in online decision making in cybersecurity.

Empirical Research for Software Security

Empirical Research for Software Security
Author: Lotfi ben Othmane,Martin Gilje Jaatun,Edgar Weippl
Publsiher: CRC Press
Total Pages: 300
Release: 2017-11-28
Genre: Computers
ISBN: 9781351650885

Download Empirical Research for Software Security Book in PDF, Epub and Kindle

Developing secure software requires the integration of numerous methods and tools into the development process, and software design is based on shared expert knowledge, claims, and opinions. Empirical methods, including data analytics, allow extracting knowledge and insights from the data that organizations collect from their processes and tools, and from the opinions of the experts who practice these processes and methods. This book introduces the reader to the fundamentals of empirical research methods, and demonstrates how these methods can be used to hone a secure software development lifecycle based on empirical data and published best practices.

Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security

Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security
Author: Gupta, Brij,Agrawal, Dharma P.,Yamaguchi, Shingo
Publsiher: IGI Global
Total Pages: 589
Release: 2016-05-16
Genre: Computers
ISBN: 9781522501060

Download Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security Book in PDF, Epub and Kindle

Internet usage has become a facet of everyday life, especially as more technological advances have made it easier to connect to the web from virtually anywhere in the developed world. However, with this increased usage comes heightened threats to security within digital environments. The Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security identifies emergent research and techniques being utilized in the field of cryptology and cyber threat prevention. Featuring theoretical perspectives, best practices, and future research directions, this handbook of research is a vital resource for professionals, researchers, faculty members, scientists, graduate students, scholars, and software developers interested in threat identification and prevention.

Handbook of Research on Multimedia Cyber Security

Handbook of Research on Multimedia Cyber Security
Author: Gupta, Brij B.,Gupta, Deepak
Publsiher: IGI Global
Total Pages: 372
Release: 2020-04-03
Genre: Computers
ISBN: 9781799827023

Download Handbook of Research on Multimedia Cyber Security Book in PDF, Epub and Kindle

Because it makes the distribution and transmission of digital information much easier and more cost effective, multimedia has emerged as a top resource in the modern era. In spite of the opportunities that multimedia creates for businesses and companies, information sharing remains vulnerable to cyber attacks and hacking due to the open channels in which this data is being transmitted. Protecting the authenticity and confidentiality of information is a top priority for all professional fields that currently use multimedia practices for distributing digital data. The Handbook of Research on Multimedia Cyber Security provides emerging research exploring the theoretical and practical aspects of current security practices and techniques within multimedia information and assessing modern challenges. Featuring coverage on a broad range of topics such as cryptographic protocols, feature extraction, and chaotic systems, this book is ideally designed for scientists, researchers, developers, security analysts, network administrators, scholars, IT professionals, educators, and students seeking current research on developing strategies in multimedia security.

Distributed Control Methods and Cyber Security Issues in Microgrids

Distributed Control Methods and Cyber Security Issues in Microgrids
Author: Wenchao Meng,Xiaoyu Wang,Shichao Liu
Publsiher: Academic Press
Total Pages: 304
Release: 2020-03-20
Genre: Distributed generation of electric power
ISBN: 9780128169469

Download Distributed Control Methods and Cyber Security Issues in Microgrids Book in PDF, Epub and Kindle

Distributed Control and Cyber Security Issues in Microgrids presents a thorough treatment of distributed control methods and cyber security issues for power system researchers and engineers. With the help of mathematical tools, this reference gives a deep understanding of microgrids and new research directions, addressing emerging concepts, methodologies and applications of monitoring, control and protection in smart microgrids with large-scale renewables. With the integration of more distributed or aggregated renewables and the wide utilization of power electronic devices, the smart microgrid is facing new stability and security challenges.