How to Design Computer Security Experiments. Peisert, S. & Bishop, M. In Futcher, L. & Dodge, R., editors, 5th World Conf. on Information Security Education, volume 237, of Intl. Federation for Information Processing, pages 141--148. Springer US, 2007. bibtex @incollection{Peisert2007,
author = {Peisert, Sean and Bishop, Matt},
title = {{How to Design Computer Security Experiments}},
year = {2007},
booktitle = {5th World Conf. on Information Security Education},
volume = {237},
series = {Intl. Federation for Information Processing},
editor = {Futcher, Lynn and Dodge, Ronald},
_url = {http://dx.doi.org/10.1007/978-0-387-73269-5_19},
publisher = {Springer US},
pages = {141--148},
}
Downloads: 0
{"_id":"jnqy9iyZb8H6xeq52","bibbaseid":"peisert-bishop-howtodesigncomputersecurityexperiments-2007","downloads":0,"creationDate":"2017-03-01T17:17:32.932Z","title":"How to Design Computer Security Experiments","author_short":["Peisert, S.","Bishop, M."],"year":2007,"bibtype":"incollection","biburl":"https://dl.dropboxusercontent.com/u/14215034/refs.bib","bibdata":{"bibtype":"incollection","type":"incollection","author":[{"propositions":[],"lastnames":["Peisert"],"firstnames":["Sean"],"suffixes":[]},{"propositions":[],"lastnames":["Bishop"],"firstnames":["Matt"],"suffixes":[]}],"title":"How to Design Computer Security Experiments","year":"2007","booktitle":"5th World Conf. on Information Security Education","volume":"237","series":"Intl. Federation for Information Processing","editor":[{"propositions":[],"lastnames":["Futcher"],"firstnames":["Lynn"],"suffixes":[]},{"propositions":[],"lastnames":["Dodge"],"firstnames":["Ronald"],"suffixes":[]}],"_url":"http://dx.doi.org/10.1007/978-0-387-73269-5_19","publisher":"Springer US","pages":"141--148","bibtex":"@incollection{Peisert2007,\n author = {Peisert, Sean and Bishop, Matt},\n title = {{How to Design Computer Security Experiments}},\n year = {2007},\n booktitle = {5th World Conf. on Information Security Education},\n volume = {237},\n series = {Intl. Federation for Information Processing},\n editor = {Futcher, Lynn and Dodge, Ronald},\n _url = {http://dx.doi.org/10.1007/978-0-387-73269-5_19},\n publisher = {Springer US},\n pages = {141--148},\n}\n\n\n","author_short":["Peisert, S.","Bishop, M."],"editor_short":["Futcher, L.","Dodge, R."],"key":"Peisert2007","id":"Peisert2007","bibbaseid":"peisert-bishop-howtodesigncomputersecurityexperiments-2007","role":"author","urls":{},"downloads":0},"search_terms":["design","computer","security","experiments","peisert","bishop"],"keywords":[],"authorIDs":[],"dataSources":["NtS8A4ZcMa63HtfYc"]}