Home » CSCI XXX: Research Methods in Cybersecurity

Attribution-NonCommercial-ShareAlike 4.0 International

Except where otherwise noted, content on this site is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International license.

CSCI XXX: Research Methods in Cybersecurity

Course Description:

This course introduces students to observational, experimental, and mathematical research methods in cybersecurity.  Special attention is paid to the research process, including qualitative and quantitative research methods and designs, and the development of proposals for interdisciplinary research.  This course is open only to students in the 5-year BS-MS program in Computer Science-Digital Forensics and Cybersecurity and to students in the Undergraduate Certificate in Bridge to Digital Forensics and Cybersecurity.

Learning Outcomes:

Upon completion of this course, students will be able to:

  • Define research concepts and identify different types of research methodologies in cybersecurity.
  • Explain the research process.
  • Identify and discuss ethical guidelines for cybersecurity research.
  • Discuss and critically examine observational, mathematical, experimental, and applied research methods.
  • Identify and discuss instrumentation, simulation, and adversarial research. 
  • Write a research proposal.

Course Pre-requisites:

ENG 201, CSCI 272, MAT 204. This course is open  to students admitted in the 5-year BS-MS  in Digital Forensics and Cybersecurity or the Undergraduate certificate in Cyberbridge or permission from the department

Course Textbook Information:

Class lectures, handouts, outside readings, PowerPoint presentations, and videos will be used to accomplish the course objectives.  Students will be expected to consult the below-required texts for class preparation. 

Edgar, T. W and Manz D. O. (2017). Research Methods for Cyber Security. Cambridge, MA: Elsevier.

The course is structured in such a way that you will not be able to participate in class if you have not done the assigned reading. Students are encouraged to read widely and strategically beyond the assigned texts (some recommendations for such readings will be made for you each week, under the further reading section). 

Course Calendar:

 Topics CoveredDiscussions/Assignments Due
Week 1  Introduction to the CourseReview of the syllabus and general introduction to the course.

In addition, the assignments of the course will be discussed in detail. 
Week 2  Starting Your Research  

Students will be introduced to the research process, key concepts, and different types of research.
Required Readings  

Chapters 3  

In-Class Exercise: Hypotheses and Variables. Students will be placed into groups and will be asked to change a statement into a hypothesis and identify dependent and independent variables.  Formulate research questions.
Week 3  Scientific Ethics

Students will be introduced to scientific ethics and ethical guidelines for cybersecurity research.
Homework 1: Ethical Considerations in Cybersecurity.   What are the important ethical issues in cybersecurity research? Please provide a one or two-paragraph response to this question and upload it to Blackboard before the class begins. 
 
Homework #1 Due Today Before Class  

Required Readings  

Chapter 15

In-class discussion of cases involving an ethical dilemma  
Week 4  Exploratory Study

Students will explore data collection as it relates to exploratory studies, different types of exploratory studies, and the design and presentation of exploratory studies. Analysis bias will also be considered.
Homework 2: Research Topic.   Please submit your research topic on Blackboard before the class begins. 
 
Homework #2 Due Today Before Class
 
Required Readings  
 
Chapter 4
Week 5  Descriptive Study  

Students will discuss descriptive study methods (e.g., case studies, surveys, and case reports), data collection as it relates to descriptive studies, and the design and presentation of descriptive studies.
Required Readings
 
Chapter 5

Begin literature search to inform and refine the research question for Homework 3
Week 6  Machine Learning  

Students will be introduced to machine learning, discuss model validation, and explore the use of Bayesian networks and hidden Markov models in cybersecurity research. 
Homework 3: Research Question and Hypothesis. Please submit your research question and hypothesis on Blackboard before the class begins. 
 
Homework #3 Due Today Before Class  

Required Readings    

Chapter 6
In-class exercise:  How to choose a research method based on the question and literature survey?
Week 7  Theoretical Research  

Students will identify terms and concepts relating to theories, characteristics of a good theory, and theoretical research. Students will be introduced to the process of developing a strong theory.
Required Readings    

Chapter 7
Week 8  Using Simulation for Research

Students will be introduced to simulation and model validation, and simulation-specific methodologies. Information and guidance will be provided on cyber security-specific simulation practices, opportunities, and pitfalls.
Homework 4: Annotated Bibliography.  Please submit an annotated bibliography on your topic that includes at least 10 scholarly references on Blackboard before the class begins.
    
Homework #4 Due Today Before Class  

Required Readings  

Chapter 8
Week 9Hypothetico-deductive research 

Students will be introduced to hypothesis-driven research and aspects of experimental design.
Homework 5: Introduction.  Please submit an introduction (the first part of your research proposal) on Blackboard before the class begins. 

Homework #5 Due Today Before Class
 
Required Readings  

Chapter 9
Week 10  Quasi-experimental Research

Students will explore quasi-experimental research, design, and methodology.
Required Readings  

Chapter 10
Week 11Applied Experimentation

Students will discuss applied research methods and applied experimental research.
Homework 6: Background/Literature Review. Please submit the background and literature review for your research (the first part of your research proposal) on Blackboard before the class begins.

Homework #6 Due Today Before Class  

Required Readings  

Chapter 11
Week 12Applied Observational Study

Students will discuss the types and design of applied studies and applied observation method selection.
Required Readings  

Chapter 12
Week 13Mixed Methods

Students will critique mixed methods research. 
Homework 7: Method and Design. Please submit your research method and design (the third part of your research proposal) on Blackboard before the class begins.   

Homework #7 Due Today Before Class   Students will come to class and be prepared to discuss the following article:  

Russo, M. (2019). Quantitative and Qualitative Research Designs can no longer stand on their own. https://cybersentinel.tech/2019/07/07/cybersecurity-research-a-future-requirement-for-mixed-method/
Week 14  Instrumentation   Students will be informed of ways to identify proper instrumentation and controlled environments for cybersecurity experimentation.Required Readings  

Chapter 13  
Week 15  Addressing the Adversary

Students will explore adversarial studies and threat actor modeling.
Required Readings  

Chapter 14
Research Proposal Due!  
Final Poster Presentation during final exam week