{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T17:06:08Z","timestamp":1775667968178,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":126,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,8,7]],"date-time":"2023-08-07T00:00:00Z","timestamp":1691366400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Flemish Research Programme Cybersecurity"},{"name":"Research Fund KU Leuven"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,8,7]]},"DOI":"10.1145\/3607505.3607523","type":"proceedings-article","created":{"date-parts":[[2023,8,21]],"date-time":"2023-08-21T16:33:41Z","timestamp":1692635621000},"page":"64-74","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Analyzing\u00a0Cyber\u00a0Security\u00a0Research\u00a0Practices through\u00a0a\u00a0Meta-Research\u00a0Framework"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2297-8328","authenticated-orcid":false,"given":"Victor","family":"Le Pochat","sequence":"first","affiliation":[{"name":"imec-DistriNet, KU Leuven, Belgium"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7710-5092","authenticated-orcid":false,"given":"Wouter","family":"Joosen","sequence":"additional","affiliation":[{"name":"imec-DistriNet, KU Leuven, Belgium"}]}],"member":"320","published-online":{"date-parts":[[2023,8,21]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"3rd International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security. 40\u201355","author":"Abt Sebastian","year":"2014","unstructured":"Sebastian Abt and Harald Baier . 2014 . Are We Missing Labels? A Study of the Availability of Ground-Truth in Network Security Research . In 3rd International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security. 40\u201355 . https:\/\/doi.org\/10.1109\/badgers.2014.11 10.1109\/badgers.2014.11 Sebastian Abt and Harald Baier. 2014. Are We Missing Labels? A Study of the Availability of Ground-Truth in Network Security Research. In 3rd International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security. 40\u201355. https:\/\/doi.org\/10.1109\/badgers.2014.11"},{"key":"e_1_3_2_1_2_1","volume-title":"Artifact Review and Badging","author":"Association for Computing Machinery 2020.","unstructured":"Association for Computing Machinery 2020. Artifact Review and Badging . Association for Computing Machinery . https:\/\/www.acm.org\/publications\/policies\/artifact-review-and-badging-current Association for Computing Machinery 2020. Artifact Review and Badging. Association for Computing Machinery. https:\/\/www.acm.org\/publications\/policies\/artifact-review-and-badging-current"},{"key":"e_1_3_2_1_3_1","volume-title":"ACM IMC 2019","author":"Association for Computing Machinery","year":"2019","unstructured":"Association for Computing Machinery 2019 . Call For Posters , ACM IMC 2019 , Amsterdam, The Netherlands. Association for Computing Machinery. https:\/\/conferences.sigcomm.org\/imc\/ 2019\/call-for-posters\/ Association for Computing Machinery 2019. Call For Posters, ACM IMC 2019, Amsterdam, The Netherlands. Association for Computing Machinery. https:\/\/conferences.sigcomm.org\/imc\/2019\/call-for-posters\/"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1087\/20130103","article-title":"Altmetric: enriching scholarly content with article-level discussion and metrics","volume":"26","author":"Adie Euan","year":"2013","unstructured":"Euan Adie and William Roe . 2013 . Altmetric: enriching scholarly content with article-level discussion and metrics . Learned Publishing 26 , 1 (2013), 11 \u2013 17 . https:\/\/doi.org\/10.1087\/20130103 10.1087\/20130103 Euan Adie and William Roe. 2013. Altmetric: enriching scholarly content with article-level discussion and metrics. Learned Publishing 26, 1 (2013), 11\u201317. https:\/\/doi.org\/10.1087\/20130103","journal-title":"Learned Publishing"},{"key":"e_1_3_2_1_5_1","volume-title":"How Crawlers Impact Our Understanding of the Web. In The Web Conference","author":"Ahmad Syed\u00a0Suleman","year":"2020","unstructured":"Syed\u00a0Suleman Ahmad , Muhammad\u00a0Daniyal Dar , Muhammad\u00a0Fareed Zaffar , Narseo Vallina-Rodriguez , and Rishab Nithyanand . 2020 . Apophanies or Epiphanies? How Crawlers Impact Our Understanding of the Web. In The Web Conference 2020. 271\u2013280. https:\/\/doi.org\/10.1145\/3366423.3380113 10.1145\/3366423.3380113 Syed\u00a0Suleman Ahmad, Muhammad\u00a0Daniyal Dar, Muhammad\u00a0Fareed Zaffar, Narseo Vallina-Rodriguez, and Rishab Nithyanand. 2020. Apophanies or Epiphanies? How Crawlers Impact Our Understanding of the Web. In The Web Conference 2020. 271\u2013280. https:\/\/doi.org\/10.1145\/3366423.3380113"},{"key":"e_1_3_2_1_6_1","volume-title":"IMC 2014 Decision on Public Reviews. https:\/\/conferences.sigcomm.org\/imc\/2014\/news3.html","author":"Akella Aditya","year":"2014","unstructured":"Aditya Akella and Nina Taft . 2014 . IMC 2014 Decision on Public Reviews. https:\/\/conferences.sigcomm.org\/imc\/2014\/news3.html Aditya Akella and Nina Taft. 2014. IMC 2014 Decision on Public Reviews. https:\/\/conferences.sigcomm.org\/imc\/2014\/news3.html"},{"key":"e_1_3_2_1_7_1","volume-title":"Step One Towards Science of Security. In 2017 Workshop on Automated Decision Making for Active Cyber Defense. 31\u201335","author":"Al-Zyoud Mahran","year":"2017","unstructured":"Mahran Al-Zyoud , Laurie Williams , and Jeffrey\u00a0 C. Carver . 2017 . Step One Towards Science of Security. In 2017 Workshop on Automated Decision Making for Active Cyber Defense. 31\u201335 . https:\/\/doi.org\/10.1145\/3140368.3140374 10.1145\/3140368.3140374 Mahran Al-Zyoud, Laurie Williams, and Jeffrey\u00a0C. Carver. 2017. Step One Towards Science of Security. In 2017 Workshop on Automated Decision Making for Active Cyber Defense. 31\u201335. https:\/\/doi.org\/10.1145\/3140368.3140374"},{"key":"e_1_3_2_1_8_1","volume-title":"Issues and Etiquette Concerning Use of Shared Measurement Data. In 7th ACM SIGCOMM Conference on Internet Measurement. 135\u2013140","author":"Allman Mark","year":"2007","unstructured":"Mark Allman and Vern Paxson . 2007 . Issues and Etiquette Concerning Use of Shared Measurement Data. In 7th ACM SIGCOMM Conference on Internet Measurement. 135\u2013140 . https:\/\/doi.org\/10.1145\/1298306.1298327 10.1145\/1298306.1298327 Mark Allman and Vern Paxson. 2007. Issues and Etiquette Concerning Use of Shared Measurement Data. In 7th ACM SIGCOMM Conference on Internet Measurement. 135\u2013140. https:\/\/doi.org\/10.1145\/1298306.1298327"},{"key":"e_1_3_2_1_9_1","volume-title":"Dos and Don\u2019ts of Machine Learning in Computer Security. In 31st USENIX Security Symposium. 3971\u20133988","author":"Arp Daniel","year":"2022","unstructured":"Daniel Arp , Erwin Quiring , Feargus Pendlebury , Alexander Warnecke , Fabio Pierazzi , Christian Wressnegger , Lorenzo Cavallaro , and Konrad Rieck . 2022 . Dos and Don\u2019ts of Machine Learning in Computer Security. In 31st USENIX Security Symposium. 3971\u20133988 . Daniel Arp, Erwin Quiring, Feargus Pendlebury, Alexander Warnecke, Fabio Pierazzi, Christian Wressnegger, Lorenzo Cavallaro, and Konrad Rieck. 2022. Dos and Don\u2019ts of Machine Learning in Computer Security. In 31st USENIX Security Symposium. 3971\u20133988."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1109\/MSP.2012.52","article-title":"The Menlo Report","volume":"10","author":"Bailey Michael","year":"2012","unstructured":"Michael Bailey , David Dittrich , Erin Kenneally , and Doug Maughan . 2012 . The Menlo Report . IEEE Security & Privacy Magazine 10 , 2 (2012), 71 \u2013 75 . https:\/\/doi.org\/10.1109\/msp.2012.52 10.1109\/msp.2012.52 Michael Bailey, David Dittrich, Erin Kenneally, and Doug Maughan. 2012. The Menlo Report. IEEE Security & Privacy Magazine 10, 2 (2012), 71\u201375. https:\/\/doi.org\/10.1109\/msp.2012.52","journal-title":"IEEE Security & Privacy Magazine"},{"key":"e_1_3_2_1_11_1","first-page":"41","article-title":"Encouraging Reproducibility in Scientific Research of the Internet (Dagstuhl Seminar 18412)","volume":"8","author":"Bajpai Vaibhav","year":"2019","unstructured":"Vaibhav Bajpai , Olivier Bonaventure , Kimberly Claffy , and Daniel Karrenberg . 2019 . Encouraging Reproducibility in Scientific Research of the Internet (Dagstuhl Seminar 18412) . Dagstuhl Reports 8 , 10 (2019), 41 \u2013 62 . https:\/\/doi.org\/10.4230\/DagRep.8.10.41 10.4230\/DagRep.8.10.41 Vaibhav Bajpai, Olivier Bonaventure, Kimberly Claffy, and Daniel Karrenberg. 2019. Encouraging Reproducibility in Scientific Research of the Internet (Dagstuhl Seminar 18412). Dagstuhl Reports 8, 10 (2019), 41\u201362. https:\/\/doi.org\/10.4230\/DagRep.8.10.41","journal-title":"Dagstuhl Reports"},{"key":"e_1_3_2_1_12_1","first-page":"1","article-title":"The Dagstuhl Beginners Guide to Reproducibility for Experimental Networking Research","volume":"49","author":"Bajpai Vaibhav","year":"2019","unstructured":"Vaibhav Bajpai , Anna Brunstrom , Anja Feldmann , Wolfgang Kellerer , Aiko Pras , Henning Schulzrinne , Georgios Smaragdakis , Matthias W\u00e4hlisch , and Klaus Wehrle . 2019 . The Dagstuhl Beginners Guide to Reproducibility for Experimental Networking Research . ACM SIGCOMM Computer Communication Review 49 , 1 (February 2019), 24\u201330. https:\/\/doi.org\/10.1145\/3314212.3314217 10.1145\/3314212.3314217 Vaibhav Bajpai, Anna Brunstrom, Anja Feldmann, Wolfgang Kellerer, Aiko Pras, Henning Schulzrinne, Georgios Smaragdakis, Matthias W\u00e4hlisch, and Klaus Wehrle. 2019. The Dagstuhl Beginners Guide to Reproducibility for Experimental Networking Research. ACM SIGCOMM Computer Communication Review 49, 1 (February 2019), 24\u201330. https:\/\/doi.org\/10.1145\/3314212.3314217","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"e_1_3_2_1_13_1","volume-title":"Challenges with Reproducibility. In Reproducibility Workshop. 1\u20134. https:\/\/doi.org\/10","author":"Bajpai Vaibhav","year":"2017","unstructured":"Vaibhav Bajpai , Mirja K\u00fchlewind , J\u00f6rg Ott , J\u00fcrgen Sch\u00f6nw\u00e4lder , Anna Sperotto , and Brian Trammell . 2017 . Challenges with Reproducibility. In Reproducibility Workshop. 1\u20134. https:\/\/doi.org\/10 .1145\/3097766.3097767 10.1145\/3097766.3097767 Vaibhav Bajpai, Mirja K\u00fchlewind, J\u00f6rg Ott, J\u00fcrgen Sch\u00f6nw\u00e4lder, Anna Sperotto, and Brian Trammell. 2017. Challenges with Reproducibility. In Reproducibility Workshop. 1\u20134. https:\/\/doi.org\/10.1145\/3097766.3097767"},{"key":"e_1_3_2_1_14_1","volume-title":"15th Workshop on Cyber Security Experimentation and Test. 65\u201370","author":"Balenson David","year":"2022","unstructured":"David Balenson , Terry Benzel , Eric Eide , David Emmerich , David Johnson , Jelena Mirkovic , and Laura Tinnel . 2022 . Toward Findable, Accessible, Interoperable, and Reusable Cybersecurity Artifacts . In 15th Workshop on Cyber Security Experimentation and Test. 65\u201370 . https:\/\/doi.org\/10.1145\/3546096.3546104 10.1145\/3546096.3546104 David Balenson, Terry Benzel, Eric Eide, David Emmerich, David Johnson, Jelena Mirkovic, and Laura Tinnel. 2022. Toward Findable, Accessible, Interoperable, and Reusable Cybersecurity Artifacts. In 15th Workshop on Cyber Security Experimentation and Test. 65\u201370. https:\/\/doi.org\/10.1145\/3546096.3546104"},{"key":"e_1_3_2_1_15_1","unstructured":"Davide Balzarotti. 2023. System Security Circus. https:\/\/www.s3.eurecom.fr\/~balzarot\/security-circus\/  Davide Balzarotti. 2023. System Security Circus. https:\/\/www.s3.eurecom.fr\/~balzarot\/security-circus\/"},{"key":"e_1_3_2_1_16_1","volume-title":"12th USENIX Conference on Cyber Security Experimentation and Test. https:\/\/www.usenix.org\/system\/files\/cset19-paper_baset.pdf","author":"Baset Aniqua","year":"2019","unstructured":"Aniqua Baset and Tamara Denning . 2019 . A Data-Driven Reflection on 36 Years of Security and Privacy Research . In 12th USENIX Conference on Cyber Security Experimentation and Test. https:\/\/www.usenix.org\/system\/files\/cset19-paper_baset.pdf Aniqua Baset and Tamara Denning. 2019. A Data-Driven Reflection on 36 Years of Security and Privacy Research. In 12th USENIX Conference on Cyber Security Experimentation and Test. https:\/\/www.usenix.org\/system\/files\/cset19-paper_baset.pdf"},{"key":"e_1_3_2_1_17_1","volume-title":"Security and Privacy Research Artifacts: Are We Making Progress?IEEE Security & Privacy 21, 1 (January","author":"Benzel Terry","year":"2023","unstructured":"Terry Benzel . 2023. Security and Privacy Research Artifacts: Are We Making Progress?IEEE Security & Privacy 21, 1 (January 2023 ), 4\u20136. https:\/\/doi.org\/10.1109\/MSEC.2022.3222887 10.1109\/MSEC.2022.3222887 Terry Benzel. 2023. Security and Privacy Research Artifacts: Are We Making Progress?IEEE Security & Privacy 21, 1 (January 2023), 4\u20136. https:\/\/doi.org\/10.1109\/MSEC.2022.3222887"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1109\/MSEC.2020.2980180","article-title":"IEEE Euro S&P: The Younger Sibling Across the Pond Following in Oakland\u2019s Footsteps","volume":"18","author":"Benzel Terry","year":"2020","unstructured":"Terry Benzel and Frank Stajano . 2020 . IEEE Euro S&P: The Younger Sibling Across the Pond Following in Oakland\u2019s Footsteps . IEEE Security & Privacy 18 , 3 (2020), 6 \u2013 7 . https:\/\/doi.org\/10.1109\/MSEC.2020.2980180 10.1109\/MSEC.2020.2980180 Terry Benzel and Frank Stajano. 2020. IEEE Euro S&P: The Younger Sibling Across the Pond Following in Oakland\u2019s Footsteps. IEEE Security & Privacy 18, 3 (2020), 6\u20137. https:\/\/doi.org\/10.1109\/MSEC.2020.2980180","journal-title":"IEEE Security & Privacy"},{"key":"e_1_3_2_1_19_1","unstructured":"Emery Berger. 2022. CSRankings: Computer Science Rankings. https:\/\/csrankings.org\/  Emery Berger. 2022. CSRankings: Computer Science Rankings. https:\/\/csrankings.org\/"},{"key":"e_1_3_2_1_20_1","first-page":"7","article-title":"GOTO Rankings Considered","volume":"62","author":"Berger Emery","year":"2019","unstructured":"Emery Berger , Stephen\u00a0 M. Blackburn , Carla Brodley , H.\u00a0 V. Jagadish , Kathryn\u00a0 S. McKinley , Mario\u00a0 A. Nascimento , Minjeong Shin , Kuansan Wang , and Lexing Xie . 2019 . GOTO Rankings Considered Helpful. Commun. ACM 62 , 7 (June 2019), 29\u201330. https:\/\/doi.org\/10.1145\/3332803 10.1145\/3332803 Emery Berger, Stephen\u00a0M. Blackburn, Carla Brodley, H.\u00a0V. Jagadish, Kathryn\u00a0S. McKinley, Mario\u00a0A. Nascimento, Minjeong Shin, Kuansan Wang, and Lexing Xie. 2019. GOTO Rankings Considered Helpful. Commun. ACM 62, 7 (June 2019), 29\u201330. https:\/\/doi.org\/10.1145\/3332803","journal-title":"Helpful. Commun. ACM"},{"key":"e_1_3_2_1_21_1","first-page":"1","article-title":"Findings and Implications from Data Mining the IMC Review Process","volume":"43","author":"Beverly Robert","year":"2012","unstructured":"Robert Beverly and Mark Allman . 2012 . Findings and Implications from Data Mining the IMC Review Process . ACM SIGCOMM Computer Communication Review 43 , 1 (January 2012), 22\u201329. https:\/\/doi.org\/10.1145\/2427036.2427040 10.1145\/2427036.2427040 Robert Beverly and Mark Allman. 2012. Findings and Implications from Data Mining the IMC Review Process. ACM SIGCOMM Computer Communication Review 43, 1 (January 2012), 22\u201329. https:\/\/doi.org\/10.1145\/2427036.2427040","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"e_1_3_2_1_22_1","first-page":"1","article-title":"The January 2017 issue","volume":"47","author":"Bonaventure Olivier","year":"2017","unstructured":"Olivier Bonaventure . 2017 . The January 2017 issue . ACM SIGCOMM Computer Communication Review 47 , 1 (January 2017), 1\u20133. https:\/\/doi.org\/10.1145\/3041027.3041028 10.1145\/3041027.3041028 Olivier Bonaventure. 2017. The January 2017 issue. ACM SIGCOMM Computer Communication Review 47, 1 (January 2017), 1\u20133. https:\/\/doi.org\/10.1145\/3041027.3041028","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"e_1_3_2_1_23_1","volume-title":"Article 102287 (July","author":"Botacin Marcus","year":"2021","unstructured":"Marcus Botacin , Fabricio Ceschin , Ruimin Sun , Daniela Oliveira , and Andr\u00e9 Gr\u00e9gio . 2021. Challenges and pitfalls in malware research. Computers & Security 106 , Article 102287 (July 2021 ). https:\/\/doi.org\/10.1016\/j.cose.2021.102287 10.1016\/j.cose.2021.102287 Marcus Botacin, Fabricio Ceschin, Ruimin Sun, Daniela Oliveira, and Andr\u00e9 Gr\u00e9gio. 2021. Challenges and pitfalls in malware research. Computers & Security 106, Article 102287 (July 2021). https:\/\/doi.org\/10.1016\/j.cose.2021.102287"},{"key":"e_1_3_2_1_24_1","volume-title":"2022 ACM Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses. 83\u201392","author":"Boucher Nicholas","year":"2022","unstructured":"Nicholas Boucher and Ross Anderson . 2022 . Talking Trojan: Analyzing an Industry-Wide Disclosure . In 2022 ACM Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses. 83\u201392 . https:\/\/doi.org\/10.1145\/3560835.3564555 10.1145\/3560835.3564555 Nicholas Boucher and Ross Anderson. 2022. Talking Trojan: Analyzing an Industry-Wide Disclosure. In 2022 ACM Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses. 83\u201392. https:\/\/doi.org\/10.1145\/3560835.3564555"},{"key":"e_1_3_2_1_25_1","volume-title":"Realizing Scientific Methods for Cyber Security. In 2012 Workshop on Learning from Authoritative Security Experiment Results. 19\u201324","author":"Carroll E.","year":"2012","unstructured":"Thomas\u00a0 E. Carroll , David Manz , Thomas Edgar , and Frank\u00a0 L. Greitzer . 2012 . Realizing Scientific Methods for Cyber Security. In 2012 Workshop on Learning from Authoritative Security Experiment Results. 19\u201324 . https:\/\/doi.org\/10.1145\/2379616.2379619 10.1145\/2379616.2379619 Thomas\u00a0E. Carroll, David Manz, Thomas Edgar, and Frank\u00a0L. Greitzer. 2012. Realizing Scientific Methods for Cyber Security. In 2012 Workshop on Learning from Authoritative Security Experiment Results. 19\u201324. https:\/\/doi.org\/10.1145\/2379616.2379619"},{"key":"e_1_3_2_1_26_1","first-page":"2022","volume-title":"Proceedings on Privacy Enhancing Technologies 2022","author":"Cassel Darion","year":"2021","unstructured":"Darion Cassel , Su-Chin Lin , Alessio Buraggina , William Wang , Andrew Zhang , Lujo Bauer , Hsu-Chun Hsiao , Limin Jia , and Timothy Libert . 2021 . OmniCrawl: Comprehensive Measurement of Web Tracking With Real Desktop and Mobile Browsers . Proceedings on Privacy Enhancing Technologies 2022 , 1 (September 2021), 227\u2013252. https:\/\/doi.org\/10.2478\/popets- 2022 - 0012 10.2478\/popets-2022-0012 Darion Cassel, Su-Chin Lin, Alessio Buraggina, William Wang, Andrew Zhang, Lujo Bauer, Hsu-Chun Hsiao, Limin Jia, and Timothy Libert. 2021. OmniCrawl: Comprehensive Measurement of Web Tracking With Real Desktop and Mobile Browsers. Proceedings on Privacy Enhancing Technologies 2022, 1 (September 2021), 227\u2013252. https:\/\/doi.org\/10.2478\/popets-2022-0012"},{"key":"e_1_3_2_1_28_1","first-page":"3","article-title":"Repeatability in Computer Systems","volume":"59","author":"Collberg Christian","year":"2016","unstructured":"Christian Collberg and Todd\u00a0 A. Proebsting . 2016 . Repeatability in Computer Systems Research. Commun. ACM 59 , 3 (February 2016), 62\u201369. https:\/\/doi.org\/10.1145\/2812803 10.1145\/2812803 Christian Collberg and Todd\u00a0A. Proebsting. 2016. Repeatability in Computer Systems Research. Commun. ACM 59, 3 (February 2016), 62\u201369. https:\/\/doi.org\/10.1145\/2812803","journal-title":"Research. Commun. ACM"},{"key":"e_1_3_2_1_29_1","volume-title":"CORE Rankings Portal","author":"Computing Research and Education Association of Australasia 2022.","unstructured":"Computing Research and Education Association of Australasia 2022. CORE Rankings Portal . Computing Research and Education Association of Australasia . https:\/\/www.core.edu.au\/conference-portal Computing Research and Education Association of Australasia 2022. CORE Rankings Portal. Computing Research and Education Association of Australasia. https:\/\/www.core.edu.au\/conference-portal"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","first-page":"2003","DOI":"10.1002\/asi.23309","article-title":"Do \u201caltmetrics\u201d correlate with citations? Extensive comparison of altmetric indicators with citations from a multidisciplinary perspective","volume":"66","author":"Costas Rodrigo","year":"2015","unstructured":"Rodrigo Costas , Zohreh Zahedi , and Paul Wouters . 2015 . Do \u201caltmetrics\u201d correlate with citations? Extensive comparison of altmetric indicators with citations from a multidisciplinary perspective . Journal of the Association for Information Science and Technology 66 , 10 (2015), 2003 \u2013 2019 . https:\/\/doi.org\/10.1002\/asi.23309 10.1002\/asi.23309 Rodrigo Costas, Zohreh Zahedi, and Paul Wouters. 2015. Do \u201caltmetrics\u201d correlate with citations? Extensive comparison of altmetric indicators with citations from a multidisciplinary perspective. Journal of the Association for Information Science and Technology 66, 10 (2015), 2003\u20132019. https:\/\/doi.org\/10.1002\/asi.23309","journal-title":"Journal of the Association for Information Science and Technology"},{"key":"e_1_3_2_1_31_1","first-page":"1","article-title":"Viewpoint Scaling the Academic Publication Process to Internet","volume":"52","author":"Crowcroft Jon","year":"2009","unstructured":"Jon Crowcroft , S. Keshav , and Nick McKeown . 2009 . Viewpoint Scaling the Academic Publication Process to Internet Scale. Commun. ACM 52 , 1 (January 2009), 27\u201330. https:\/\/doi.org\/10.1145\/1435417.1435430 10.1145\/1435417.1435430 Jon Crowcroft, S. Keshav, and Nick McKeown. 2009. Viewpoint Scaling the Academic Publication Process to Internet Scale. Commun. ACM 52, 1 (January 2009), 27\u201330. https:\/\/doi.org\/10.1145\/1435417.1435430","journal-title":"Scale. Commun. ACM"},{"key":"e_1_3_2_1_32_1","volume-title":"31st USENIX Security Symposium. 2153\u20132170","author":"Cuevas Alejandro","year":"2022","unstructured":"Alejandro Cuevas , Fieke Miedema , Kyle Soska , Nicolas Christin , and Rolf van Wegberg . 2022 . Measurement by Proxy: On the Accuracy of Online Marketplace Measurements . In 31st USENIX Security Symposium. 2153\u20132170 . Alejandro Cuevas, Fieke Miedema, Kyle Soska, Nicolas Christin, and Rolf van Wegberg. 2022. Measurement by Proxy: On the Accuracy of Online Marketplace Measurements. In 31st USENIX Security Symposium. 2153\u20132170."},{"key":"e_1_3_2_1_33_1","volume-title":"2019 IEEE Symposium on Security and Privacy. 20\u201338","author":"Das Sanjeev","year":"2019","unstructured":"Sanjeev Das , Jan Werner , Manos Antonakakis , Michalis Polychronakis , and Fabian Monrose . 2019 . SoK: The Challenges, Pitfalls, and Perils of Using Hardware Performance Counters for Security . In 2019 IEEE Symposium on Security and Privacy. 20\u201338 . https:\/\/doi.org\/10.1109\/SP.2019.00021 10.1109\/SP.2019.00021 Sanjeev Das, Jan Werner, Manos Antonakakis, Michalis Polychronakis, and Fabian Monrose. 2019. SoK: The Challenges, Pitfalls, and Perils of Using Hardware Performance Counters for Security. In 2019 IEEE Symposium on Security and Privacy. 20\u201338. https:\/\/doi.org\/10.1109\/SP.2019.00021"},{"key":"#cr-split#-e_1_3_2_1_34_1.1","unstructured":"James Davis. 2019. Do top conferences contain well cited papers or junk?https:\/\/doi.org\/10.48550\/arxiv.1911.09197 arXiv:1911.09197 10.48550\/arxiv.1911.09197"},{"key":"#cr-split#-e_1_3_2_1_34_1.2","unstructured":"James Davis. 2019. Do top conferences contain well cited papers or junk?https:\/\/doi.org\/10.48550\/arxiv.1911.09197 arXiv:1911.09197"},{"key":"e_1_3_2_1_35_1","volume-title":"Reproducibility and Replicability of Web Measurement Studies. In ACM Web Conference","author":"Demir Nurullah","year":"2022","unstructured":"Nurullah Demir , Matteo Gro\u00dfe-Kampmann , Tobias Urban , Christian Wressnegger , Thorsten Holz , and Norbert Pohlmann . 2022 . Reproducibility and Replicability of Web Measurement Studies. In ACM Web Conference 2022. 533\u2013544. https:\/\/doi.org\/10.1145\/3485447.3512214 10.1145\/3485447.3512214 Nurullah Demir, Matteo Gro\u00dfe-Kampmann, Tobias Urban, Christian Wressnegger, Thorsten Holz, and Norbert Pohlmann. 2022. Reproducibility and Replicability of Web Measurement Studies. In ACM Web Conference 2022. 533\u2013544. https:\/\/doi.org\/10.1145\/3485447.3512214"},{"key":"e_1_3_2_1_36_1","first-page":"10","article-title":"The Existence of Publication Bias and Risk Factors for Its Occurrence","volume":"263","author":"Dickersin Kay","year":"1990","unstructured":"Kay Dickersin . 1990 . The Existence of Publication Bias and Risk Factors for Its Occurrence . JAMA 263 , 10 (March 1990), 1385\u20131389. https:\/\/doi.org\/10.1001\/jama.1990.03440100097014 10.1001\/jama.1990.03440100097014 Kay Dickersin. 1990. The Existence of Publication Bias and Risk Factors for Its Occurrence. JAMA 263, 10 (March 1990), 1385\u20131389. https:\/\/doi.org\/10.1001\/jama.1990.03440100097014","journal-title":"JAMA"},{"key":"e_1_3_2_1_37_1","volume-title":"Evaluating Behavioral Biometrics for Continuous Authentication: Challenges and Metrics. In 2017 ACM on Asia Conference on Computer and Communications Security. 386\u2013399","author":"Eberz Simon","year":"2017","unstructured":"Simon Eberz , Kasper\u00a0 B. Rasmussen , Vincent Lenders , and Ivan Martinovic . 2017 . Evaluating Behavioral Biometrics for Continuous Authentication: Challenges and Metrics. In 2017 ACM on Asia Conference on Computer and Communications Security. 386\u2013399 . https:\/\/doi.org\/10.1145\/3052973.3053032 10.1145\/3052973.3053032 Simon Eberz, Kasper\u00a0B. Rasmussen, Vincent Lenders, and Ivan Martinovic. 2017. Evaluating Behavioral Biometrics for Continuous Authentication: Challenges and Metrics. In 2017 ACM on Asia Conference on Computer and Communications Security. 386\u2013399. https:\/\/doi.org\/10.1145\/3052973.3053032"},{"key":"e_1_3_2_1_38_1","volume-title":"2021 IEEE Security and Privacy Workshops. 7\u201312","author":"Engelen Gints","year":"2021","unstructured":"Gints Engelen , Vera Rimmer , and Wouter Joosen . 2021 . Troubleshooting an Intrusion Detection Dataset: the CICIDS2017 Case Study . In 2021 IEEE Security and Privacy Workshops. 7\u201312 . https:\/\/doi.org\/10.1109\/SPW53761.2021.00009 10.1109\/SPW53761.2021.00009 Gints Engelen, Vera Rimmer, and Wouter Joosen. 2021. Troubleshooting an Intrusion Detection Dataset: the CICIDS2017 Case Study. In 2021 IEEE Security and Privacy Workshops. 7\u201312. https:\/\/doi.org\/10.1109\/SPW53761.2021.00009"},{"key":"e_1_3_2_1_39_1","volume-title":"Is science really facing a reproducibility crisis, and do we need it to?Proceedings of the National Academy of Sciences 115, 11","author":"Fanelli Daniele","year":"2018","unstructured":"Daniele Fanelli . 2018. Is science really facing a reproducibility crisis, and do we need it to?Proceedings of the National Academy of Sciences 115, 11 ( 2018 ), 2628\u20132631. https:\/\/doi.org\/10.1073\/pnas.1708272114 10.1073\/pnas.1708272114 Daniele Fanelli. 2018. Is science really facing a reproducibility crisis, and do we need it to?Proceedings of the National Academy of Sciences 115, 11 (2018), 2628\u20132631. https:\/\/doi.org\/10.1073\/pnas.1708272114"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"crossref","first-page":"1334","DOI":"10.1109\/TNSM.2021.3075552","article-title":"Blocklist Babel: On the Transparency and Dynamics of Open Source Blocklisting","volume":"18","author":"Feal \u00c1lvaro","year":"2021","unstructured":"\u00c1lvaro Feal , Pelayo Vallina , Julien Gamba , Sergio Pastrana , Antonio Nappa , Oliver Hohlfeld , Narseo Vallina-Rodriguez , and Juan Tapiador . 2021 . Blocklist Babel: On the Transparency and Dynamics of Open Source Blocklisting . IEEE Transactions on Network and Service Management 18 , 2 (2021), 1334 \u2013 1349 . https:\/\/doi.org\/10.1109\/TNSM.2021.3075552 10.1109\/TNSM.2021.3075552 \u00c1lvaro Feal, Pelayo Vallina, Julien Gamba, Sergio Pastrana, Antonio Nappa, Oliver Hohlfeld, Narseo Vallina-Rodriguez, and Juan Tapiador. 2021. Blocklist Babel: On the Transparency and Dynamics of Open Source Blocklisting. IEEE Transactions on Network and Service Management 18, 2 (2021), 1334\u20131349. https:\/\/doi.org\/10.1109\/TNSM.2021.3075552","journal-title":"IEEE Transactions on Network and Service Management"},{"key":"#cr-split#-e_1_3_2_1_41_1.1","unstructured":"Dror\u00a0G. Feitelson. 2021. \"We do not appreciate being experimented on\": Developer and Researcher Views on the Ethics of Experiments on Open-Source Projects. https:\/\/doi.org\/10.48550\/arxiv.2112.13217 arXiv:2112.13217 10.48550\/arxiv.2112.13217"},{"key":"#cr-split#-e_1_3_2_1_41_1.2","unstructured":"Dror\u00a0G. Feitelson. 2021. \"We do not appreciate being experimented on\": Developer and Researcher Views on the Ethics of Experiments on Open-Source Projects. https:\/\/doi.org\/10.48550\/arxiv.2112.13217 arXiv:2112.13217"},{"key":"e_1_3_2_1_42_1","first-page":"3","article-title":"Experiences from the Sigcomm 2005 European Shadow PC Experiment","volume":"35","author":"Feldmann Anja","year":"2005","unstructured":"Anja Feldmann . 2005 . Experiences from the Sigcomm 2005 European Shadow PC Experiment . ACM SIGCOMM Computer Communication Review 35 , 3 (July 2005), 97\u20137\u2013102. https:\/\/doi.org\/10.1145\/1070873.1070889 10.1145\/1070873.1070889 Anja Feldmann. 2005. Experiences from the Sigcomm 2005 European Shadow PC Experiment. ACM SIGCOMM Computer Communication Review 35, 3 (July 2005), 97\u20137\u2013102. https:\/\/doi.org\/10.1145\/1070873.1070889","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"e_1_3_2_1_43_1","first-page":"1","article-title":"A Survey on Artifacts from CoNEXT, ICN, IMC, and SIGCOMM Conferences in 2017","volume":"48","author":"Flittner Matthias","year":"2018","unstructured":"Matthias Flittner , Mohamed\u00a0Naoufal Mahfoudi , Damien Saucez , Matthias W\u00e4hlisch , Luigi Iannone , Vaibhav Bajpai , and Alex Afanasyev . 2018 . A Survey on Artifacts from CoNEXT, ICN, IMC, and SIGCOMM Conferences in 2017 . ACM SIGCOMM Computer Communication Review 48 , 1 (April 2018), 75\u201380. https:\/\/doi.org\/10.1145\/3211852.3211864 10.1145\/3211852.3211864 Matthias Flittner, Mohamed\u00a0Naoufal Mahfoudi, Damien Saucez, Matthias W\u00e4hlisch, Luigi Iannone, Vaibhav Bajpai, and Alex Afanasyev. 2018. A Survey on Artifacts from CoNEXT, ICN, IMC, and SIGCOMM Conferences in 2017. ACM SIGCOMM Computer Communication Review 48, 1 (April 2018), 75\u201380. https:\/\/doi.org\/10.1145\/3211852.3211864","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"e_1_3_2_1_44_1","volume-title":"Research artifacts and citations in computer systems papers. PeerJ Computer Science 8 (February","author":"Frachtenberg Eitan","year":"2022","unstructured":"Eitan Frachtenberg . 2022. Research artifacts and citations in computer systems papers. PeerJ Computer Science 8 (February 2022 ), e887. https:\/\/doi.org\/10.7717\/peerj-cs.887 10.7717\/peerj-cs.887 Eitan Frachtenberg. 2022. Research artifacts and citations in computer systems papers. PeerJ Computer Science 8 (February 2022), e887. https:\/\/doi.org\/10.7717\/peerj-cs.887"},{"key":"e_1_3_2_1_45_1","volume-title":"Citation analysis of computer systems papers. PeerJ Computer Science 9 (May","author":"Frachtenberg Eitan","year":"2023","unstructured":"Eitan Frachtenberg . 2023. Citation analysis of computer systems papers. PeerJ Computer Science 9 (May 2023 ), e1389. https:\/\/doi.org\/10.7717\/peerj-cs.1389 10.7717\/peerj-cs.1389 Eitan Frachtenberg. 2023. Citation analysis of computer systems papers. PeerJ Computer Science 9 (May 2023), e1389. https:\/\/doi.org\/10.7717\/peerj-cs.1389"},{"key":"e_1_3_2_1_46_1","volume-title":"A survey of accepted authors in computer systems conferences. PeerJ Computer Science 6 (September","author":"Frachtenberg Eitan","year":"2020","unstructured":"Eitan Frachtenberg and Noah Koster . 2020. A survey of accepted authors in computer systems conferences. PeerJ Computer Science 6 (September 2020 ), e299. https:\/\/doi.org\/10.7717\/peerj-cs.299 10.7717\/peerj-cs.299 Eitan Frachtenberg and Noah Koster. 2020. A survey of accepted authors in computer systems conferences. PeerJ Computer Science 6 (September 2020), e299. https:\/\/doi.org\/10.7717\/peerj-cs.299"},{"key":"e_1_3_2_1_47_1","volume-title":"The Power of Interpretation: Qualitative Methods in Cybersecurity Research. In 14th International Conference on Availability, Reliability and Security. Article 92","author":"Fujs Damjan","unstructured":"Damjan Fujs , An\u017ee Miheli\u010d , and Simon L . \u00a0R. Vrhovec. 2019 . The Power of Interpretation: Qualitative Methods in Cybersecurity Research. In 14th International Conference on Availability, Reliability and Security. Article 92 , 10\u00a0pages. https:\/\/doi.org\/10.1145\/3339252.3341479 10.1145\/3339252.3341479 Damjan Fujs, An\u017ee Miheli\u010d, and Simon L.\u00a0R. Vrhovec. 2019. The Power of Interpretation: Qualitative Methods in Cybersecurity Research. In 14th International Conference on Availability, Reliability and Security. Article 92, 10\u00a0pages. https:\/\/doi.org\/10.1145\/3339252.3341479"},{"key":"e_1_3_2_1_48_1","volume-title":"Statistical Reliability of 10 Years of Cyber Security User Studies. In 10th International Workshop on Socio-Technical Aspects in Security and Trust. 171\u2013190","author":"Gro\u00df Thomas","year":"2020","unstructured":"Thomas Gro\u00df . 2020 . Statistical Reliability of 10 Years of Cyber Security User Studies. In 10th International Workshop on Socio-Technical Aspects in Security and Trust. 171\u2013190 . https:\/\/doi.org\/10.1007\/978-3-030-79318-0_10 10.1007\/978-3-030-79318-0_10 Thomas Gro\u00df. 2020. Statistical Reliability of 10 Years of Cyber Security User Studies. In 10th International Workshop on Socio-Technical Aspects in Security and Trust. 171\u2013190. https:\/\/doi.org\/10.1007\/978-3-030-79318-0_10"},{"key":"e_1_3_2_1_49_1","volume-title":"Computer Security Conference Ranking and Statistic. https:\/\/people.engr.tamu.edu\/guofei\/sec_conf_stat.htm","author":"Gu Guofei","year":"2022","unstructured":"Guofei Gu . 2022 . Computer Security Conference Ranking and Statistic. https:\/\/people.engr.tamu.edu\/guofei\/sec_conf_stat.htm Guofei Gu. 2022. Computer Security Conference Ranking and Statistic. https:\/\/people.engr.tamu.edu\/guofei\/sec_conf_stat.htm"},{"key":"e_1_3_2_1_50_1","unstructured":"Mark Guzdial. 2020. Why I Don\u2019t Recommend CSRankings.org: Know the Values You are Ranking On. BLOG@CACM. https:\/\/cacm.acm.org\/blogs\/blog-cacm\/248078-why-i-dont-recommend-csrankingsorg-know-the-values-you-are-ranking-on\/fulltext  Mark Guzdial. 2020. Why I Don\u2019t Recommend CSRankings.org: Know the Values You are Ranking On. BLOG@CACM. https:\/\/cacm.acm.org\/blogs\/blog-cacm\/248078-why-i-dont-recommend-csrankingsorg-know-the-values-you-are-ranking-on\/fulltext"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"crossref","first-page":"823","DOI":"10.1016\/j.joi.2017.06.005","article-title":"Suitability of Google Scholar as a source of scientific information and as a source of data for scientific evaluation\u2014Review of the Literature","volume":"11","author":"Halevi Gali","year":"2017","unstructured":"Gali Halevi , Henk Moed , and Judit Bar-Ilan . 2017 . Suitability of Google Scholar as a source of scientific information and as a source of data for scientific evaluation\u2014Review of the Literature . Journal of Informetrics 11 , 3 (2017), 823 \u2013 834 . https:\/\/doi.org\/10.1016\/j.joi.2017.06.005 10.1016\/j.joi.2017.06.005 Gali Halevi, Henk Moed, and Judit Bar-Ilan. 2017. Suitability of Google Scholar as a source of scientific information and as a source of data for scientific evaluation\u2014Review of the Literature. Journal of Informetrics 11, 3 (2017), 823\u2013834. https:\/\/doi.org\/10.1016\/j.joi.2017.06.005","journal-title":"Journal of Informetrics"},{"key":"e_1_3_2_1_52_1","volume-title":"14th International Conference on Availability, Reliability and Security. Article 91","author":"Hamm Peter","year":"2019","unstructured":"Peter Hamm , David Harborth , and Sebastian Pape . 2019 . A Systematic Analysis of User Evaluations in Security Research . In 14th International Conference on Availability, Reliability and Security. Article 91 , 7\u00a0pages. https:\/\/doi.org\/10.1145\/3339252.3340339 10.1145\/3339252.3340339 Peter Hamm, David Harborth, and Sebastian Pape. 2019. A Systematic Analysis of User Evaluations in Security Research. In 14th International Conference on Availability, Reliability and Security. Article 91, 7\u00a0pages. https:\/\/doi.org\/10.1145\/3339252.3340339"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1146\/annurev-statistics-031219-041104","article-title":"Calibrating the Scientific Ecosystem Through Meta-Research","volume":"7","author":"Hardwicke E.","year":"2020","unstructured":"Tom\u00a0 E. Hardwicke , Stylianos Serghiou , Perrine Janiaud , Valentin Danchev , Sophia Cr\u00fcwell , Steven\u00a0 N. Goodman , and John\u00a0 P.A. Ioannidis . 2020 . Calibrating the Scientific Ecosystem Through Meta-Research . Annual Review of Statistics and Its Application 7 , 1 (2020), 11 \u2013 37 . https:\/\/doi.org\/10.1146\/annurev-statistics-031219-041104 10.1146\/annurev-statistics-031219-041104 Tom\u00a0E. Hardwicke, Stylianos Serghiou, Perrine Janiaud, Valentin Danchev, Sophia Cr\u00fcwell, Steven\u00a0N. Goodman, and John\u00a0P.A. Ioannidis. 2020. Calibrating the Scientific Ecosystem Through Meta-Research. Annual Review of Statistics and Its Application 7, 1 (2020), 11\u201337. https:\/\/doi.org\/10.1146\/annurev-statistics-031219-041104","journal-title":"Annual Review of Statistics and Its Application"},{"key":"e_1_3_2_1_54_1","volume-title":"2017 IEEE Symposium on Security and Privacy. 99\u2013120","author":"Herley Cormac","year":"2017","unstructured":"Cormac Herley and P.C. Van\u00a0Oorschot . 2017. SoK: Science, Security and the Elusive Goal of Security as a Scientific Pursuit . In 2017 IEEE Symposium on Security and Privacy. 99\u2013120 . https:\/\/doi.org\/10.1109\/SP. 2017 .38 10.1109\/SP.2017.38 Cormac Herley and P.C. Van\u00a0Oorschot. 2017. SoK: Science, Security and the Elusive Goal of Security as a Scientific Pursuit. In 2017 IEEE Symposium on Security and Privacy. 99\u2013120. https:\/\/doi.org\/10.1109\/SP.2017.38"},{"key":"e_1_3_2_1_55_1","volume-title":"Symposium on Security and Privacy 2017. Call For Papers. IEEE Symposium on Security and Privacy. https:\/\/www.ieee-security.org\/TC\/SP2018\/cfpapers.html","author":"IEEE","unstructured":"IEEE Symposium on Security and Privacy 2017. Call For Papers. IEEE Symposium on Security and Privacy. https:\/\/www.ieee-security.org\/TC\/SP2018\/cfpapers.html IEEE Symposium on Security and Privacy 2017. Call For Papers. IEEE Symposium on Security and Privacy. https:\/\/www.ieee-security.org\/TC\/SP2018\/cfpapers.html"},{"key":"e_1_3_2_1_56_1","volume-title":"Symposium on Security and Privacy 2023. Call For Papers. IEEE Symposium on Security and Privacy. https:\/\/sp2024","author":"IEEE","unstructured":"IEEE Symposium on Security and Privacy 2023. Call For Papers. IEEE Symposium on Security and Privacy. https:\/\/sp2024 .ieee-security.org\/cfpapers.html IEEE Symposium on Security and Privacy 2023. Call For Papers. IEEE Symposium on Security and Privacy. https:\/\/sp2024.ieee-security.org\/cfpapers.html"},{"key":"e_1_3_2_1_57_1","volume-title":"Symposium on Security and Privacy 2023. CFP Changes for the 2024 Conference. IEEE Symposium on Security and Privacy. https:\/\/sp2024","author":"IEEE","unstructured":"IEEE Symposium on Security and Privacy 2023. CFP Changes for the 2024 Conference. IEEE Symposium on Security and Privacy. https:\/\/sp2024 .ieee-security.org\/changes-cfp.html IEEE Symposium on Security and Privacy 2023. CFP Changes for the 2024 Conference. IEEE Symposium on Security and Privacy. https:\/\/sp2024.ieee-security.org\/changes-cfp.html"},{"key":"e_1_3_2_1_58_1","volume-title":"Article e124 (August","author":"Ioannidis John","year":"2005","unstructured":"John P.\u00a0A. Ioannidis . 2005. Why Most Published Research Findings Are False. PLoS Medicine 2, 8 , Article e124 (August 2005 ). https:\/\/doi.org\/10.1371\/journal.pmed.0020124 10.1371\/journal.pmed.0020124 John P.\u00a0A. Ioannidis. 2005. Why Most Published Research Findings Are False. PLoS Medicine 2, 8, Article e124 (August 2005). https:\/\/doi.org\/10.1371\/journal.pmed.0020124"},{"key":"e_1_3_2_1_59_1","volume-title":"Meta-research: Evaluation and Improvement of Research Methods and Practices. PLOS Biology 13, 10, Article e1002264 (October","author":"Ioannidis John","year":"2015","unstructured":"John P.\u00a0A. Ioannidis , Daniele Fanelli , Debbie\u00a0Drake Dunne , and Steven\u00a0 N. Goodman . 2015 . Meta-research: Evaluation and Improvement of Research Methods and Practices. PLOS Biology 13, 10, Article e1002264 (October 2015). https:\/\/doi.org\/10.1371\/journal.pbio.1002264 10.1371\/journal.pbio.1002264 John P.\u00a0A. Ioannidis, Daniele Fanelli, Debbie\u00a0Drake Dunne, and Steven\u00a0N. Goodman. 2015. Meta-research: Evaluation and Improvement of Research Methods and Practices. PLOS Biology 13, 10, Article e1002264 (October 2015). https:\/\/doi.org\/10.1371\/journal.pbio.1002264"},{"key":"e_1_3_2_1_60_1","volume-title":"Towards Realistic and Reproducible Web Crawl Measurements. In The Web Conference","author":"Jueckstock Jordan","year":"2021","unstructured":"Jordan Jueckstock , Shaown Sarker , Peter Snyder , Aidan Beggs , Panagiotis Papadopoulos , Matteo Varvello , Benjamin Livshits , and Alexandros Kapravelos . 2021 . Towards Realistic and Reproducible Web Crawl Measurements. In The Web Conference 2021. 80\u201391. https:\/\/doi.org\/10.1145\/3442381.3450050 10.1145\/3442381.3450050 Jordan Jueckstock, Shaown Sarker, Peter Snyder, Aidan Beggs, Panagiotis Papadopoulos, Matteo Varvello, Benjamin Livshits, and Alexandros Kapravelos. 2021. Towards Realistic and Reproducible Web Crawl Measurements. In The Web Conference 2021. 80\u201391. https:\/\/doi.org\/10.1145\/3442381.3450050"},{"key":"e_1_3_2_1_61_1","volume-title":"Article 100431","author":"Katsikeas Sotirios","year":"2021","unstructured":"Sotirios Katsikeas , Pontus Johnson , Mathias Ekstedt , and Robert Lagerstr\u00f6m . 2021. Research communities in cyber security: A comprehensive literature review. Computer Science Review 42 , Article 100431 ( 2021 ). https:\/\/doi.org\/10.1016\/j.cosrev.2021.100431 10.1016\/j.cosrev.2021.100431 Sotirios Katsikeas, Pontus Johnson, Mathias Ekstedt, and Robert Lagerstr\u00f6m. 2021. Research communities in cyber security: A comprehensive literature review. Computer Science Review 42, Article 100431 (2021). https:\/\/doi.org\/10.1016\/j.cosrev.2021.100431"},{"key":"#cr-split#-e_1_3_2_1_62_1.1","unstructured":"Mannat Kaur Michel van Eeten Marijn Janssen Kevin Borgolte and Tobias Fiebig. 2021. Human Factors in Security Research: Lessons Learned from 2008-2018. https:\/\/doi.org\/10.48550\/arxiv.2103.13287 arxiv:2103.13287 10.48550\/arxiv.2103.13287"},{"key":"#cr-split#-e_1_3_2_1_62_1.2","unstructured":"Mannat Kaur Michel van Eeten Marijn Janssen Kevin Borgolte and Tobias Fiebig. 2021. Human Factors in Security Research: Lessons Learned from 2008-2018. https:\/\/doi.org\/10.48550\/arxiv.2103.13287 arxiv:2103.13287"},{"key":"e_1_3_2_1_63_1","volume-title":"2019 ACM\/IEEE Joint Conference on Digital Libraries. 315\u2013324","author":"Keselman Leonid","year":"2019","unstructured":"Leonid Keselman . 2019 . Venue Analytics: A Simple Alternative to Citation-Based Metrics . In 2019 ACM\/IEEE Joint Conference on Digital Libraries. 315\u2013324 . https:\/\/doi.org\/10.1109\/JCDL.2019.00052 10.1109\/JCDL.2019.00052 Leonid Keselman. 2019. Venue Analytics: A Simple Alternative to Citation-Based Metrics. In 2019 ACM\/IEEE Joint Conference on Digital Libraries. 315\u2013324. https:\/\/doi.org\/10.1109\/JCDL.2019.00052"},{"key":"e_1_3_2_1_64_1","first-page":"3","article-title":"Editor\u2019s Message","volume":"41","author":"Keshav Srinivasan","year":"2011","unstructured":"Srinivasan Keshav . 2011 . Editor\u2019s Message . ACM SIGCOMM Computer Communication Review 41 , 3 (July 2011). https:\/\/doi.org\/10.1145\/2002250 10.1145\/2002250 Srinivasan Keshav. 2011. Editor\u2019s Message. ACM SIGCOMM Computer Communication Review 41, 3 (July 2011). https:\/\/doi.org\/10.1145\/2002250","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"#cr-split#-e_1_3_2_1_65_1.1","doi-asserted-by":"crossref","unstructured":"Alexander Kott. 2014. Towards Fundamental Science of Cyber Security. 1-13. https:\/\/doi.org\/10.1007\/978-1-4614-7597-2_1 10.1007\/978-1-4614-7597-2_1","DOI":"10.1007\/978-1-4614-7597-2_1"},{"key":"#cr-split#-e_1_3_2_1_65_1.2","doi-asserted-by":"crossref","unstructured":"Alexander Kott. 2014. Towards Fundamental Science of Cyber Security. 1-13. https:\/\/doi.org\/10.1007\/978-1-4614-7597-2_1","DOI":"10.1007\/978-1-4614-7597-2_1"},{"key":"e_1_3_2_1_66_1","volume-title":"Article 6225","author":"Krause Tim","year":"2021","unstructured":"Tim Krause , Raphael Ernst , Benedikt Klaer , Immanuel Hacker , and Martin Henze . 2021. Cybersecurity in Power Grids: Challenges and Opportunities. Sensors 21, 18 , Article 6225 ( 2021 ). https:\/\/doi.org\/10.3390\/s21186225 10.3390\/s21186225 Tim Krause, Raphael Ernst, Benedikt Klaer, Immanuel Hacker, and Martin Henze. 2021. Cybersecurity in Power Grids: Challenges and Opportunities. Sensors 21, 18, Article 6225 (2021). https:\/\/doi.org\/10.3390\/s21186225"},{"key":"e_1_3_2_1_67_1","unstructured":"Kat Krol Jonathan\u00a0M. Spring Simon Parkin and M.\u00a0Angela Sasse. 2016. Towards Robust Experimental Design for User Studies in Security and Privacy. In 2016 Learning from Authoritative Security Experiment Results Workshop. 21\u201331. https:\/\/www.usenix.org\/conference\/laser2016\/program\/presentation\/krol  Kat Krol Jonathan\u00a0M. Spring Simon Parkin and M.\u00a0Angela Sasse. 2016. Towards Robust Experimental Design for User Studies in Security and Privacy. In 2016 Learning from Authoritative Security Experiment Results Workshop. 21\u201331. https:\/\/www.usenix.org\/conference\/laser2016\/program\/presentation\/krol"},{"key":"e_1_3_2_1_68_1","volume-title":"Reliability. In 18th International Conference on Emerging Networking EXperiments and Technologies. 171\u2013186","author":"Krumnow Benjamin","year":"2022","unstructured":"Benjamin Krumnow , Hugo Jonker , and Stefan Karsch . 2022 . How Gullible Are Web Measurement Tools? A Case Study Analysing and Strengthening OpenWPM\u2019s Reliability. In 18th International Conference on Emerging Networking EXperiments and Technologies. 171\u2013186 . https:\/\/doi.org\/10.1145\/3555050.3569131 10.1145\/3555050.3569131 Benjamin Krumnow, Hugo Jonker, and Stefan Karsch. 2022. How Gullible Are Web Measurement Tools? A Case Study Analysing and Strengthening OpenWPM\u2019s Reliability. In 18th International Conference on Emerging Networking EXperiments and Technologies. 171\u2013186. https:\/\/doi.org\/10.1145\/3555050.3569131"},{"key":"e_1_3_2_1_69_1","first-page":"0938","volume-title":"Reverse-engineering conference rankings: what does it take to make a reputable conference?Scientometrics 96","author":"K\u00fcngas Peep","year":"2013","unstructured":"Peep K\u00fcngas , Siim Karus , Svitlana Vakulenko , Marlon Dumas , Cristhian Parra , and Fabio Casati . 2013 . Reverse-engineering conference rankings: what does it take to make a reputable conference?Scientometrics 96 , 2 (January 2013), 651\u2013665. https:\/\/doi.org\/10.1007\/s11192-012- 0938 - 0938 10.1007\/s11192-012-0938-8 Peep K\u00fcngas, Siim Karus, Svitlana Vakulenko, Marlon Dumas, Cristhian Parra, and Fabio Casati. 2013. Reverse-engineering conference rankings: what does it take to make a reputable conference?Scientometrics 96, 2 (January 2013), 651\u2013665. https:\/\/doi.org\/10.1007\/s11192-012-0938-8"},{"key":"e_1_3_2_1_70_1","volume-title":"Tranco: A Research-Oriented Top Sites Ranking Hardened Against Manipulation. In 26th Annual Network and Distributed System Security Symposium(NDSS \u201919)","author":"Pochat Victor Le","year":"2019","unstructured":"Victor Le Pochat , Tom Van Goethem , Samaneh Tajalizadehkhoob , Maciej Korczy\u0144ski , and Wouter Joosen . 2019 . Tranco: A Research-Oriented Top Sites Ranking Hardened Against Manipulation. In 26th Annual Network and Distributed System Security Symposium(NDSS \u201919) . https:\/\/doi.org\/10.14722\/ndss.2019.23386 10.14722\/ndss.2019.23386 Victor Le Pochat, Tom Van Goethem, Samaneh Tajalizadehkhoob, Maciej Korczy\u0144ski, and Wouter Joosen. 2019. Tranco: A Research-Oriented Top Sites Ranking Hardened Against Manipulation. In 26th Annual Network and Distributed System Security Symposium(NDSS \u201919). https:\/\/doi.org\/10.14722\/ndss.2019.23386"},{"key":"e_1_3_2_1_71_1","unstructured":"Edward Lee. 2022. The Toxic Culture of Rejection in Computer Science. ACM SIGBED. https:\/\/sigbed.org\/2022\/08\/22\/the-toxic-culture-of-rejection-in-computer-science\/  Edward Lee. 2022. The Toxic Culture of Rejection in Computer Science. ACM SIGBED. https:\/\/sigbed.org\/2022\/08\/22\/the-toxic-culture-of-rejection-in-computer-science\/"},{"key":"e_1_3_2_1_72_1","volume-title":"2022 IEEE Conference on Communications and Network Security. https:\/\/doi.org\/10","author":"Liu Lisa","year":"2022","unstructured":"Lisa Liu , Gints Engelen , Timothy Lynar , Daryl Essam , and Wouter Joosen . 2022 . Error Prevalence in NIDS datasets: A Case Study on CIC-IDS-2017 and CSE-CIC-IDS-2018 . In 2022 IEEE Conference on Communications and Network Security. https:\/\/doi.org\/10 .1109\/CNS56114.2022.9947235 10.1109\/CNS56114.2022.9947235 Lisa Liu, Gints Engelen, Timothy Lynar, Daryl Essam, and Wouter Joosen. 2022. Error Prevalence in NIDS datasets: A Case Study on CIC-IDS-2017 and CSE-CIC-IDS-2018. In 2022 IEEE Conference on Communications and Network Security. https:\/\/doi.org\/10.1109\/CNS56114.2022.9947235"},{"key":"e_1_3_2_1_73_1","volume-title":"26th Annual Computer Security Applications Conference. 127\u2013129","author":"Longstaff Tom","year":"2010","unstructured":"Tom Longstaff , David Balenson , and Mark Matties . 2010 . Barriers to Science in Security . In 26th Annual Computer Security Applications Conference. 127\u2013129 . https:\/\/doi.org\/10.1145\/1920261.1920281 10.1145\/1920261.1920281 Tom Longstaff, David Balenson, and Mark Matties. 2010. Barriers to Science in Security. In 26th Annual Computer Security Applications Conference. 127\u2013129. https:\/\/doi.org\/10.1145\/1920261.1920281"},{"key":"e_1_3_2_1_74_1","volume-title":"Article 101382","author":"Macnish Kevin","year":"2020","unstructured":"Kevin Macnish and Jeroen van\u00a0der Ham . 2020. Ethics in cybersecurity research and practice. Technology in Society 63 , Article 101382 ( 2020 ). https:\/\/doi.org\/10.1016\/j.techsoc.2020.101382 10.1016\/j.techsoc.2020.101382 Kevin Macnish and Jeroen van\u00a0der Ham. 2020. Ethics in cybersecurity research and practice. Technology in Society 63, Article 101382 (2020). https:\/\/doi.org\/10.1016\/j.techsoc.2020.101382"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/2500098.2500112","article-title":"Towards More Constructive Reviewing of SIGCOMM Papers","volume":"43","author":"Mogul C.","year":"2013","unstructured":"Jeffrey\u00a0 C. Mogul . 2013 . Towards More Constructive Reviewing of SIGCOMM Papers . ACM SIGCOMM Computer Communication Review 43 , 3 (July 2013), 90\u201394. https:\/\/doi.org\/10.1145\/2500098.2500112 10.1145\/2500098.2500112 Jeffrey\u00a0C. Mogul. 2013. Towards More Constructive Reviewing of SIGCOMM Papers. ACM SIGCOMM Computer Communication Review 43, 3 (July 2013), 90\u201394. https:\/\/doi.org\/10.1145\/2500098.2500112","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/1384609.1384623","article-title":"Open issues in organizing computer systems conferences","volume":"38","author":"Mogul C.","year":"2008","unstructured":"Jeffrey\u00a0 C. Mogul and Tom Anderson . 2008 . Open issues in organizing computer systems conferences . ACM SIGCOMM Computer Communication Review 38 , 3 (July 2008), 93\u2013102. https:\/\/doi.org\/10.1145\/1384609.1384623 10.1145\/1384609.1384623 Jeffrey\u00a0C. Mogul and Tom Anderson. 2008. Open issues in organizing computer systems conferences. ACM SIGCOMM Computer Communication Review 38, 3 (July 2008), 93\u2013102. https:\/\/doi.org\/10.1145\/1384609.1384623","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1038\/s41562-016-0021","article-title":"A manifesto for reproducible science","volume":"1","author":"Munaf\u00f2 R.","year":"2017","unstructured":"Marcus\u00a0 R. Munaf\u00f2 , Brian\u00a0 A. Nosek , Dorothy V.\u00a0M. Bishop , Katherine\u00a0 S. Button , Christopher\u00a0 D. Chambers , Nathalie\u00a0Percie du Sert , Uri Simonsohn , Eric-Jan Wagenmakers , Jennifer\u00a0 J. Ware , and John P.\u00a0A. Ioannidis . 2017 . A manifesto for reproducible science . Nature Human Behaviour 1 , 1 (January 2017). https:\/\/doi.org\/10.1038\/s41562-016-0021 10.1038\/s41562-016-0021 Marcus\u00a0R. Munaf\u00f2, Brian\u00a0A. Nosek, Dorothy V.\u00a0M. Bishop, Katherine\u00a0S. Button, Christopher\u00a0D. Chambers, Nathalie\u00a0Percie du Sert, Uri Simonsohn, Eric-Jan Wagenmakers, Jennifer\u00a0J. Ware, and John P.\u00a0A. Ioannidis. 2017. A manifesto for reproducible science. Nature Human Behaviour 1, 1 (January 2017). https:\/\/doi.org\/10.1038\/s41562-016-0021","journal-title":"Nature Human Behaviour"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1109\/MSEC.2023.3236540","article-title":"Security Policy Audits","volume":"21","author":"Narayanan Arvind","year":"2023","unstructured":"Arvind Narayanan and Kevin Lee . 2023 . Security Policy Audits : Why and How. IEEE Security & Privacy 21 , 2 (2023), 77 \u2013 81 . https:\/\/doi.org\/10.1109\/MSEC.2023.3236540 10.1109\/MSEC.2023.3236540 Arvind Narayanan and Kevin Lee. 2023. Security Policy Audits: Why and How. IEEE Security & Privacy 21, 2 (2023), 77\u201381. https:\/\/doi.org\/10.1109\/MSEC.2023.3236540","journal-title":"Why and How. IEEE Security & Privacy"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"crossref","first-page":"2600","DOI":"10.1073\/pnas.1708274114","article-title":"The preregistration revolution","volume":"115","author":"Nosek A.","year":"2018","unstructured":"Brian\u00a0 A. Nosek , Charles\u00a0 R. Ebersole , Alexander\u00a0 C. DeHaven , and David\u00a0 T. Mellor . 2018 . The preregistration revolution . Proceedings of the National Academy of Sciences 115 , 11 (2018), 2600 \u2013 2606 . https:\/\/doi.org\/10.1073\/pnas.1708274114 10.1073\/pnas.1708274114 Brian\u00a0A. Nosek, Charles\u00a0R. Ebersole, Alexander\u00a0C. DeHaven, and David\u00a0T. Mellor. 2018. The preregistration revolution. Proceedings of the National Academy of Sciences 115, 11 (2018), 2600\u20132606. https:\/\/doi.org\/10.1073\/pnas.1708274114","journal-title":"Proceedings of the National Academy of Sciences"},{"key":"e_1_3_2_1_80_1","volume-title":"2023 CHI Conference on Human Factors in Computing Systems. Article 864","author":"Ortloff Anna-Marie","year":"2023","unstructured":"Anna-Marie Ortloff , Matthias Fassl , Alexander Ponticello , Florin Martius , Anne Mertens , Katharina Krombholz , and Matthew Smith . 2023 . Different Researchers, Different Results? Analyzing the Influence of Researcher Experience and Data Type During Qualitative Analysis of an Interview and Survey Study on Security Advice . In 2023 CHI Conference on Human Factors in Computing Systems. Article 864 , 21\u00a0pages. https:\/\/doi.org\/10.1145\/3544548.3580766 10.1145\/3544548.3580766 Anna-Marie Ortloff, Matthias Fassl, Alexander Ponticello, Florin Martius, Anne Mertens, Katharina Krombholz, and Matthew Smith. 2023. Different Researchers, Different Results? Analyzing the Influence of Researcher Experience and Data Type During Qualitative Analysis of an Interview and Survey Study on Security Advice. In 2023 CHI Conference on Human Factors in Computing Systems. Article 864, 21\u00a0pages. https:\/\/doi.org\/10.1145\/3544548.3580766"},{"key":"e_1_3_2_1_81_1","volume-title":"Understanding the Ethical Frameworks of Internet Measurement Studies. In 2nd International Workshop on Ethics in Computer Security. 8\u00a0pages. https:\/\/doi.org\/10","author":"Pauley Eric","year":"2023","unstructured":"Eric Pauley and Patrick McDaniel . 2023 . Understanding the Ethical Frameworks of Internet Measurement Studies. In 2nd International Workshop on Ethics in Computer Security. 8\u00a0pages. https:\/\/doi.org\/10 .14722\/ethics.2023.239547 10.14722\/ethics.2023.239547 Eric Pauley and Patrick McDaniel. 2023. Understanding the Ethical Frameworks of Internet Measurement Studies. In 2nd International Workshop on Ethics in Computer Security. 8\u00a0pages. https:\/\/doi.org\/10.14722\/ethics.2023.239547"},{"key":"e_1_3_2_1_82_1","volume-title":"Strategies for Sound Internet Measurement. In 4th ACM SIGCOMM Conference on Internet Measurement. 263\u2013271","author":"Paxson Vern","year":"2004","unstructured":"Vern Paxson . 2004 . Strategies for Sound Internet Measurement. In 4th ACM SIGCOMM Conference on Internet Measurement. 263\u2013271 . https:\/\/doi.org\/10.1145\/1028788.1028824 10.1145\/1028788.1028824 Vern Paxson. 2004. Strategies for Sound Internet Measurement. In 4th ACM SIGCOMM Conference on Internet Measurement. 263\u2013271. https:\/\/doi.org\/10.1145\/1028788.1028824"},{"key":"e_1_3_2_1_83_1","volume-title":"5th IFIP World Conference on Information Security Education. 141\u2013148","author":"Peisert Sean","year":"2007","unstructured":"Sean Peisert and Matt Bishop . 2007 . How to Design Computer Security Experiments . In 5th IFIP World Conference on Information Security Education. 141\u2013148 . https:\/\/doi.org\/10.1007\/978-0-387-73269-5_19 10.1007\/978-0-387-73269-5_19 Sean Peisert and Matt Bishop. 2007. How to Design Computer Security Experiments. In 5th IFIP World Conference on Information Security Education. 141\u2013148. https:\/\/doi.org\/10.1007\/978-0-387-73269-5_19"},{"key":"e_1_3_2_1_84_1","volume-title":"Not a Philosopher!IEEE Security & Privacy 5, 4","author":"Peisert Sean","year":"2007","unstructured":"Sean Peisert and Matt Bishop . 2007. I Am a Scientist , Not a Philosopher!IEEE Security & Privacy 5, 4 ( 2007 ), 48\u201351. https:\/\/doi.org\/10.1109\/MSP.2007.84 10.1109\/MSP.2007.84 Sean Peisert and Matt Bishop. 2007. I Am a Scientist, Not a Philosopher!IEEE Security & Privacy 5, 4 (2007), 48\u201351. https:\/\/doi.org\/10.1109\/MSP.2007.84"},{"key":"e_1_3_2_1_85_1","volume-title":"Opening the Blackbox of VirusTotal: Analyzing Online Phishing Scan Engines. In 2019 Internet Measurement Conference. 478\u2013485","author":"Peng Peng","year":"2019","unstructured":"Peng Peng , Limin Yang , Linhai Song , and Gang Wang . 2019 . Opening the Blackbox of VirusTotal: Analyzing Online Phishing Scan Engines. In 2019 Internet Measurement Conference. 478\u2013485 . https:\/\/doi.org\/10.1145\/3355369.3355585 10.1145\/3355369.3355585 Peng Peng, Limin Yang, Linhai Song, and Gang Wang. 2019. Opening the Blackbox of VirusTotal: Analyzing Online Phishing Scan Engines. In 2019 Internet Measurement Conference. 478\u2013485. https:\/\/doi.org\/10.1145\/3355369.3355585"},{"key":"#cr-split#-e_1_3_2_1_86_1.1","doi-asserted-by":"crossref","unstructured":"Jan Pennekamp Erik Buchholz Markus Dahlmanns Ike Kunze Stefan Braun Eric Wagner Matthias Brockmann Klaus Wehrle and Martin Henze. 2020. Collaboration is not Evil: A Systematic Look at Security Research for Industrial Use. In 2020 Learning from Authoritative Security Experiment Results Workshop. 16\u00a0pages. https:\/\/doi.org\/10.14722\/laser-acsac.2020.23088 10.14722\/laser-acsac.2020.23088","DOI":"10.14722\/laser-acsac.2020.23088"},{"key":"#cr-split#-e_1_3_2_1_86_1.2","doi-asserted-by":"crossref","unstructured":"Jan Pennekamp Erik Buchholz Markus Dahlmanns Ike Kunze Stefan Braun Eric Wagner Matthias Brockmann Klaus Wehrle and Martin Henze. 2020. Collaboration is not Evil: A Systematic Look at Security Research for Industrial Use. In 2020 Learning from Authoritative Security Experiment Results Workshop. 16\u00a0pages. https:\/\/doi.org\/10.14722\/laser-acsac.2020.23088","DOI":"10.14722\/laser-acsac.2020.23088"},{"key":"e_1_3_2_1_87_1","volume-title":"Security and Privacy Measurements in Social Networks: Experiences and Lessons Learned. In 3rd International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security. 18\u201329","author":"Polakis Iasonas","year":"2014","unstructured":"Iasonas Polakis , Federico Maggi , Stefano Zanero , and Angelos\u00a0 D. Keromytis . 2014 . Security and Privacy Measurements in Social Networks: Experiences and Lessons Learned. In 3rd International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security. 18\u201329 . https:\/\/doi.org\/10.1109\/BADGERS.2014.9 10.1109\/BADGERS.2014.9 Iasonas Polakis, Federico Maggi, Stefano Zanero, and Angelos\u00a0D. Keromytis. 2014. Security and Privacy Measurements in Social Networks: Experiences and Lessons Learned. In 3rd International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security. 18\u201329. https:\/\/doi.org\/10.1109\/BADGERS.2014.9"},{"key":"e_1_3_2_1_88_1","volume-title":"Article 103123 (May","author":"Pour Morteza\u00a0Safaei","year":"2023","unstructured":"Morteza\u00a0Safaei Pour , Christelle Nader , Kurt Friday , and Elias Bou-Harb . 2023. A Comprehensive Survey of Recent Internet Measurement Techniques for Cyber Security. Computers & Security 128 , Article 103123 (May 2023 ), 35\u00a0pages. https:\/\/doi.org\/10.1016\/j.cose.2023.103123 10.1016\/j.cose.2023.103123 Morteza\u00a0Safaei Pour, Christelle Nader, Kurt Friday, and Elias Bou-Harb. 2023. A Comprehensive Survey of Recent Internet Measurement Techniques for Cyber Security. Computers & Security 128, Article 103123 (May 2023), 35\u00a0pages. https:\/\/doi.org\/10.1016\/j.cose.2023.103123"},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1109\/MSP.2018.2701150","article-title":"Scoping the Cyber Security Body of Knowledge","volume":"16","author":"Rashid Awais","year":"2018","unstructured":"Awais Rashid , George Danezis , Howard Chivers , Emil Lupu , Andrew Martin , Makayla Lewis , and Claudia Peersman . 2018 . Scoping the Cyber Security Body of Knowledge . IEEE Security & Privacy 16 , 3 (2018), 96 \u2013 102 . https:\/\/doi.org\/10.1109\/MSP.2018.2701150 10.1109\/MSP.2018.2701150 Awais Rashid, George Danezis, Howard Chivers, Emil Lupu, Andrew Martin, Makayla Lewis, and Claudia Peersman. 2018. Scoping the Cyber Security Body of Knowledge. IEEE Security & Privacy 16, 3 (2018), 96\u2013102. https:\/\/doi.org\/10.1109\/MSP.2018.2701150","journal-title":"IEEE Security & Privacy"},{"key":"e_1_3_2_1_90_1","volume-title":"2018 ACM SIGSAC Conference on Computer and Communications Security. 1238\u20131255","author":"Redmiles M.","year":"2018","unstructured":"Elissa\u00a0 M. Redmiles , Ziyun Zhu , Sean Kross , Dhruv Kuchhal , Tudor Dumitras , and Michelle\u00a0 L. Mazurek . 2018 . Asking for a Friend: Evaluating Response Biases in Security User Studies . In 2018 ACM SIGSAC Conference on Computer and Communications Security. 1238\u20131255 . https:\/\/doi.org\/10.1145\/3243734.3243740 10.1145\/3243734.3243740 Elissa\u00a0M. Redmiles, Ziyun Zhu, Sean Kross, Dhruv Kuchhal, Tudor Dumitras, and Michelle\u00a0L. Mazurek. 2018. Asking for a Friend: Evaluating Response Biases in Security User Studies. In 2018 ACM SIGSAC Conference on Computer and Communications Security. 1238\u20131255. https:\/\/doi.org\/10.1145\/3243734.3243740"},{"key":"e_1_3_2_1_91_1","volume-title":"2nd International Workshop on Ethics in Computer Security. 7\u00a0pages. https:\/\/doi.org\/10","author":"Reidsma Dennis","year":"2023","unstructured":"Dennis Reidsma , Jeroen van\u00a0der Ham , and Andrea Continella . 2023 . Operationalizing Cybersecurity Research Ethics Review: From Principles and Guidelines to Practice . In 2nd International Workshop on Ethics in Computer Security. 7\u00a0pages. https:\/\/doi.org\/10 .14722\/ethics.2023.237352 10.14722\/ethics.2023.237352 Dennis Reidsma, Jeroen van\u00a0der Ham, and Andrea Continella. 2023. Operationalizing Cybersecurity Research Ethics Review: From Principles and Guidelines to Practice. In 2nd International Workshop on Ethics in Computer Security. 7\u00a0pages. https:\/\/doi.org\/10.14722\/ethics.2023.237352"},{"key":"e_1_3_2_1_92_1","doi-asserted-by":"crossref","first-page":"2035","DOI":"10.1080\/0144929X.2022.2080908","article-title":"A quarter century of usable security and privacy research: transparency, tailorability, and the road ahead","volume":"41","author":"Reuter Christian","year":"2022","unstructured":"Christian Reuter , Luigi\u00a0Lo Iacono , and Alexander Benlian . 2022 . A quarter century of usable security and privacy research: transparency, tailorability, and the road ahead . Behaviour & Information Technology 41 , 10 (2022), 2035 \u2013 2048 . https:\/\/doi.org\/10.1080\/0144929X.2022.2080908 10.1080\/0144929X.2022.2080908 Christian Reuter, Luigi\u00a0Lo Iacono, and Alexander Benlian. 2022. A quarter century of usable security and privacy research: transparency, tailorability, and the road ahead. Behaviour & Information Technology 41, 10 (2022), 2035\u20132048. https:\/\/doi.org\/10.1080\/0144929X.2022.2080908","journal-title":"Behaviour & Information Technology"},{"key":"e_1_3_2_1_93_1","unstructured":"Konrad Rieck. 2023. Influential Security Papers. https:\/\/mlsec.org\/topnotch\/  Konrad Rieck. 2023. Influential Security Papers. https:\/\/mlsec.org\/topnotch\/"},{"key":"e_1_3_2_1_94_1","first-page":"2022","volume-title":"Proceedings on Privacy Enhancing Technologies 2022","author":"Rimmer Vera","year":"2022","unstructured":"Vera Rimmer , Theodor Schnitzler , Tom Van\u00a0Goethem , Abel Rodr\u00edguez\u00a0Romero , Wouter Joosen , and Katharina Kohls . 2022 . Trace Oddity: Methodologies for Data-Driven Traffic Analysis on Tor . Proceedings on Privacy Enhancing Technologies 2022 , 3 (July 2022), 314\u2013335. https:\/\/doi.org\/10.56553\/popets- 2022 - 0074 10.56553\/popets-2022-0074 Vera Rimmer, Theodor Schnitzler, Tom Van\u00a0Goethem, Abel Rodr\u00edguez\u00a0Romero, Wouter Joosen, and Katharina Kohls. 2022. Trace Oddity: Methodologies for Data-Driven Traffic Analysis on Tor. Proceedings on Privacy Enhancing Technologies 2022, 3 (July 2022), 314\u2013335. https:\/\/doi.org\/10.56553\/popets-2022-0074"},{"key":"e_1_3_2_1_95_1","volume-title":"Prudent Practices for Designing Malware Experiments: Status Quo and Outlook. In 2012 IEEE Symposium on Security and Privacy. 65\u201379","author":"Rossow Christian","year":"2012","unstructured":"Christian Rossow , Christian\u00a0 J. Dietrich , Chris Grier , Christian Kreibich , Vern Paxson , Norbert Pohlmann , Herbert Bos , and Maarten\u00a0van Steen . 2012 . Prudent Practices for Designing Malware Experiments: Status Quo and Outlook. In 2012 IEEE Symposium on Security and Privacy. 65\u201379 . https:\/\/doi.org\/10.1109\/SP.2012.14 10.1109\/SP.2012.14 Christian Rossow, Christian\u00a0J. Dietrich, Chris Grier, Christian Kreibich, Vern Paxson, Norbert Pohlmann, Herbert Bos, and Maarten\u00a0van Steen. 2012. Prudent Practices for Designing Malware Experiments: Status Quo and Outlook. In 2012 IEEE Symposium on Security and Privacy. 65\u201379. https:\/\/doi.org\/10.1109\/SP.2012.14"},{"key":"e_1_3_2_1_96_1","volume-title":"The Security Lottery: Measuring Client-Side Web Security Inconsistencies. In 31st USENIX Security Symposium. 2047\u20132064","author":"Roth Sebastian","year":"2022","unstructured":"Sebastian Roth , Stefano Calzavara , Moritz Wilhelm , Alvise Rabitti , and Ben Stock . 2022 . The Security Lottery: Measuring Client-Side Web Security Inconsistencies. In 31st USENIX Security Symposium. 2047\u20132064 . Sebastian Roth, Stefano Calzavara, Moritz Wilhelm, Alvise Rabitti, and Ben Stock. 2022. The Security Lottery: Measuring Client-Side Web Security Inconsistencies. In 31st USENIX Security Symposium. 2047\u20132064."},{"key":"e_1_3_2_1_97_1","first-page":"1","article-title":"Thoughts and Recommendations from the ACM SIGCOMM 2017 Reproducibility Workshop","volume":"48","author":"Saucez Damien","year":"2018","unstructured":"Damien Saucez and Luigi Iannone . 2018 . Thoughts and Recommendations from the ACM SIGCOMM 2017 Reproducibility Workshop . ACM SIGCOMM Computer Communication Review 48 , 1 (April 2018), 70\u201374. https:\/\/doi.org\/10.1145\/3211852.3211863 10.1145\/3211852.3211863 Damien Saucez and Luigi Iannone. 2018. Thoughts and Recommendations from the ACM SIGCOMM 2017 Reproducibility Workshop. ACM SIGCOMM Computer Communication Review 48, 1 (April 2018), 70\u201374. https:\/\/doi.org\/10.1145\/3211852.3211863","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"e_1_3_2_1_99_1","volume-title":"18th Internet Measurement Conference","author":"Scheitle Quirin","year":"2018","unstructured":"Quirin Scheitle , Oliver Hohlfeld , Julien Gamba , Jonas Jelten , Torsten Zimmermann , Stephen\u00a0 D. Strowes , and Narseo Vallina-Rodriguez . 2018 . A Long Way to the Top: Significance, Structure, and Stability of Internet Top Lists . In 18th Internet Measurement Conference (2018). 478\u2013493. https:\/\/doi.org\/10.1145\/3278532.3278574 10.1145\/3278532.3278574 Quirin Scheitle, Oliver Hohlfeld, Julien Gamba, Jonas Jelten, Torsten Zimmermann, Stephen\u00a0D. Strowes, and Narseo Vallina-Rodriguez. 2018. A Long Way to the Top: Significance, Structure, and Stability of Internet Top Lists. In 18th Internet Measurement Conference (2018). 478\u2013493. https:\/\/doi.org\/10.1145\/3278532.3278574"},{"key":"e_1_3_2_1_100_1","volume-title":"Reproducibility Workshop. 5\u20138. https:\/\/doi.org\/10","author":"Scheitle Quirin","year":"2017","unstructured":"Quirin Scheitle , Matthias W\u00e4hlisch , Oliver Gasser , Thomas\u00a0 C. Schmidt , and Georg Carle . 2017 . Towards an Ecosystem for Reproducible Research in Computer Networking . In Reproducibility Workshop. 5\u20138. https:\/\/doi.org\/10 .1145\/3097766.3097768 10.1145\/3097766.3097768 Quirin Scheitle, Matthias W\u00e4hlisch, Oliver Gasser, Thomas\u00a0C. Schmidt, and Georg Carle. 2017. Towards an Ecosystem for Reproducible Research in Computer Networking. In Reproducibility Workshop. 5\u20138. https:\/\/doi.org\/10.1145\/3097766.3097768"},{"key":"e_1_3_2_1_101_1","first-page":"2","article-title":"Double-blind reviewing","volume":"39","author":"Schulzrinne Henning","year":"2009","unstructured":"Henning Schulzrinne . 2009 . Double-blind reviewing . ACM SIGCOMM Computer Communication Review 39 , 2 (March 2009), 56\u201359. https:\/\/doi.org\/10.1145\/1517480.1517492 10.1145\/1517480.1517492 Henning Schulzrinne. 2009. Double-blind reviewing. ACM SIGCOMM Computer Communication Review 39, 2 (March 2009), 56\u201359. https:\/\/doi.org\/10.1145\/1517480.1517492","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"e_1_3_2_1_102_1","first-page":"6","article-title":"Challenges, Experiments, and Computational Solutions in Peer","volume":"65","author":"Shah B.","year":"2022","unstructured":"Nihar\u00a0 B. Shah . 2022 . Challenges, Experiments, and Computational Solutions in Peer Review. Commun. ACM 65 , 6 (May 2022), 76\u201387. https:\/\/doi.org\/10.1145\/3528086 10.1145\/3528086 Nihar\u00a0B. Shah. 2022. Challenges, Experiments, and Computational Solutions in Peer Review. Commun. ACM 65, 6 (May 2022), 76\u201387. https:\/\/doi.org\/10.1145\/3528086","journal-title":"Review. Commun. ACM"},{"key":"e_1_3_2_1_103_1","unstructured":"Radu Sion. 2011. Democracy in Peer Reviewing. https:\/\/zxr.io\/theseriousacademic\/  Radu Sion. 2011. Democracy in Peer Reviewing. https:\/\/zxr.io\/theseriousacademic\/"},{"key":"e_1_3_2_1_104_1","volume-title":"The Experts\u2019 Insights on the Peer Review Process of Evaluating Security Papers. In 2022 IEEE Symposium on Security and Privacy. 1845\u20131862","author":"Soneji Ananta","year":"2022","unstructured":"Ananta Soneji , Faris\u00a0Bugra Kokulu , Carlos Rubio-Medrano , Tiffany Bao , Ruoyu Wang , Yan Shoshitaishvili , and Adam Doup\u00e9 . 2022 . \u201c Flawed, but like democracy we don\u2019t have a better system \u201d: The Experts\u2019 Insights on the Peer Review Process of Evaluating Security Papers. In 2022 IEEE Symposium on Security and Privacy. 1845\u20131862 . https:\/\/doi.org\/10.1109\/SP46214.2022.9833581 10.1109\/SP46214.2022.9833581 Ananta Soneji, Faris\u00a0Bugra Kokulu, Carlos Rubio-Medrano, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, and Adam Doup\u00e9. 2022. \u201cFlawed, but like democracy we don\u2019t have a better system\u201d: The Experts\u2019 Insights on the Peer Review Process of Evaluating Security Papers. In 2022 IEEE Symposium on Security and Privacy. 1845\u20131862. https:\/\/doi.org\/10.1109\/SP46214.2022.9833581"},{"key":"e_1_3_2_1_105_1","volume-title":"2017 New Security Paradigms Workshop. 1\u201318","author":"Spring M.","year":"2017","unstructured":"Jonathan\u00a0 M. Spring , Tyler Moore , and David Pym . 2017 . Practicing a Science of Security: A Philosophy of Science Perspective . In 2017 New Security Paradigms Workshop. 1\u201318 . https:\/\/doi.org\/10.1145\/3171533.3171540 10.1145\/3171533.3171540 Jonathan\u00a0M. Spring, Tyler Moore, and David Pym. 2017. Practicing a Science of Security: A Philosophy of Science Perspective. In 2017 New Security Paradigms Workshop. 1\u201318. https:\/\/doi.org\/10.1145\/3171533.3171540"},{"key":"e_1_3_2_1_106_1","volume-title":"Robust Performance Metrics for Authentication Systems. In 2019 Network and Distributed System Security Symposium. 15\u00a0pages. https:\/\/doi.org\/10","author":"Sugrim Shridatt","year":"2019","unstructured":"Shridatt Sugrim , Can Liu , Meghan McLean , and Janne Lindqvist . 2019 . Robust Performance Metrics for Authentication Systems. In 2019 Network and Distributed System Security Symposium. 15\u00a0pages. https:\/\/doi.org\/10 .14722\/ndss.2019.23351 10.14722\/ndss.2019.23351 Shridatt Sugrim, Can Liu, Meghan McLean, and Janne Lindqvist. 2019. Robust Performance Metrics for Authentication Systems. In 2019 Network and Distributed System Security Symposium. 15\u00a0pages. https:\/\/doi.org\/10.14722\/ndss.2019.23351"},{"key":"e_1_3_2_1_107_1","volume-title":"Understanding Abusive Traffic Distribution Systems. In The Web Conference","author":"Szurdi Janos","year":"2021","unstructured":"Janos Szurdi , Meng Luo , Brian Kondracki , Nick Nikiforakis , and Nicolas Christin . 2021 . Where are you taking me? Understanding Abusive Traffic Distribution Systems. In The Web Conference 2021. 3613\u20133624. https:\/\/doi.org\/10.1145\/3442381.3450071 10.1145\/3442381.3450071 Janos Szurdi, Meng Luo, Brian Kondracki, Nick Nikiforakis, and Nicolas Christin. 2021. Where are you taking me? Understanding Abusive Traffic Distribution Systems. In The Web Conference 2021. 3613\u20133624. https:\/\/doi.org\/10.1145\/3442381.3450071"},{"key":"e_1_3_2_1_108_1","volume-title":"USENIX Security \u201922 Call for Artifacts","author":"USENIX Association 2022.","unstructured":"USENIX Association 2022. USENIX Security \u201922 Call for Artifacts . USENIX Association . https:\/\/www.usenix.org\/conference\/usenixsecurity22\/call-for-artifacts USENIX Association 2022. USENIX Security \u201922 Call for Artifacts. USENIX Association. https:\/\/www.usenix.org\/conference\/usenixsecurity22\/call-for-artifacts"},{"key":"e_1_3_2_1_109_1","volume-title":"Misfits: An Analysis of Domain Classification Services. In 20th Internet Measurement Conference. 598\u2013618","author":"Vallina Pelayo","year":"2020","unstructured":"Pelayo Vallina , Victor Le\u00a0Pochat , \u00c1lvaro Feal , Marius Paraschiv , Julien Gamba , Tim Burke , Oliver Hohlfeld , Juan Tapiador , and Narseo Vallina-Rodriguez . 2020 . Mis-shapes, Mistakes , Misfits: An Analysis of Domain Classification Services. In 20th Internet Measurement Conference. 598\u2013618 . https:\/\/doi.org\/10.1145\/3419394.3423660 10.1145\/3419394.3423660 Pelayo Vallina, Victor Le\u00a0Pochat, \u00c1lvaro Feal, Marius Paraschiv, Julien Gamba, Tim Burke, Oliver Hohlfeld, Juan Tapiador, and Narseo Vallina-Rodriguez. 2020. Mis-shapes, Mistakes, Misfits: An Analysis of Domain Classification Services. In 20th Internet Measurement Conference. 598\u2013618. https:\/\/doi.org\/10.1145\/3419394.3423660"},{"key":"e_1_3_2_1_110_1","doi-asserted-by":"crossref","first-page":"287","DOI":"10.13052\/jcsm2245-1439.543","article-title":"Ethics and Internet Measurements","volume":"5","author":"van\u00a0der Ham Jeroen","year":"2017","unstructured":"Jeroen van\u00a0der Ham and Roland van Rijswijk-Deij . 2017 . Ethics and Internet Measurements . Journal of Cyber Security and Mobility 5 , 4 (2017), 287 \u2013 308 . https:\/\/doi.org\/10.13052\/jcsm2245-1439.543 10.13052\/jcsm2245-1439.543 Jeroen van\u00a0der Ham and Roland van Rijswijk-Deij. 2017. Ethics and Internet Measurements. Journal of Cyber Security and Mobility 5, 4 (2017), 287\u2013308. https:\/\/doi.org\/10.13052\/jcsm2245-1439.543","journal-title":"Journal of Cyber Security and Mobility"},{"key":"e_1_3_2_1_111_1","volume-title":"SoK: Benchmarking Flaws in Systems Security. In 2019 IEEE European Symposium on Security and Privacy. 310\u2013325","author":"van\u00a0der Kouwe Erik","year":"2019","unstructured":"Erik van\u00a0der Kouwe , Gernot Heiser , Dennis Andriesse , Herbert Bos , and Cristiano Giuffrida . 2019 . SoK: Benchmarking Flaws in Systems Security. In 2019 IEEE European Symposium on Security and Privacy. 310\u2013325 . https:\/\/doi.org\/10.1109\/EuroSP.2019.00031 10.1109\/EuroSP.2019.00031 Erik van\u00a0der Kouwe, Gernot Heiser, Dennis Andriesse, Herbert Bos, and Cristiano Giuffrida. 2019. SoK: Benchmarking Flaws in Systems Security. In 2019 IEEE European Symposium on Security and Privacy. 310\u2013325. https:\/\/doi.org\/10.1109\/EuroSP.2019.00031"},{"key":"e_1_3_2_1_112_1","first-page":"5","article-title":"Conferences vs","volume":"52","author":"Vardi Y.","year":"2009","unstructured":"Moshe\u00a0 Y. Vardi . 2009 . Conferences vs . Journals in Computing Research. Commun. ACM 52 , 5 (May 2009), 5. https:\/\/doi.org\/10.1145\/1506409.1506410 10.1145\/1506409.1506410 Moshe\u00a0Y. Vardi. 2009. Conferences vs. Journals in Computing Research. Commun. ACM 52, 5 (May 2009), 5. https:\/\/doi.org\/10.1145\/1506409.1506410","journal-title":"Journals in Computing Research. Commun. ACM"},{"key":"e_1_3_2_1_113_1","first-page":"9","article-title":"Academic Rankings Considered Harmful!Commun","volume":"59","author":"Vardi Y.","year":"2016","unstructured":"Moshe\u00a0 Y. Vardi . 2016 . Academic Rankings Considered Harmful!Commun . ACM 59 , 9 (August 2016), 5. https:\/\/doi.org\/10.1145\/2980760 10.1145\/2980760 Moshe\u00a0Y. Vardi. 2016. Academic Rankings Considered Harmful!Commun. ACM 59, 9 (August 2016), 5. https:\/\/doi.org\/10.1145\/2980760","journal-title":"ACM"},{"key":"e_1_3_2_1_114_1","volume-title":"16th International Conference on Availability, Reliability and Security. Article 92","author":"Vrhovec Simon","year":"2021","unstructured":"Simon Vrhovec , Luca Caviglione , and Steffen Wendzel . 2021 . Cr\u00e8me de La Cr\u00e8me: Lessons from Papers in Security Publications . In 16th International Conference on Availability, Reliability and Security. Article 92 , 9\u00a0pages. https:\/\/doi.org\/10.1145\/3465481.3470027 10.1145\/3465481.3470027 Simon Vrhovec, Luca Caviglione, and Steffen Wendzel. 2021. Cr\u00e8me de La Cr\u00e8me: Lessons from Papers in Security Publications. In 16th International Conference on Availability, Reliability and Security. Article 92, 9\u00a0pages. https:\/\/doi.org\/10.1145\/3465481.3470027"},{"key":"e_1_3_2_1_115_1","volume-title":"On the Origin of Scanning: The Impact of Location on Internet-Wide Scans. In 20th Internet Measurement Conference. 662\u2013679","author":"Wan Gerry","year":"2020","unstructured":"Gerry Wan , Liz Izhikevich , David Adrian , Katsunari Yoshioka , Ralph Holz , Christian Rossow , and Zakir Durumeric . 2020 . On the Origin of Scanning: The Impact of Location on Internet-Wide Scans. In 20th Internet Measurement Conference. 662\u2013679 . https:\/\/doi.org\/10.1145\/3419394.3424214 10.1145\/3419394.3424214 Gerry Wan, Liz Izhikevich, David Adrian, Katsunari Yoshioka, Ralph Holz, Christian Rossow, and Zakir Durumeric. 2020. On the Origin of Scanning: The Impact of Location on Internet-Wide Scans. In 20th Internet Measurement Conference. 662\u2013679. https:\/\/doi.org\/10.1145\/3419394.3424214"},{"key":"e_1_3_2_1_116_1","first-page":"1","article-title":"Not All Areas Are Equal","volume":"122","author":"Wendzel Steffen","year":"2020","unstructured":"Steffen Wendzel , C\u00e9dric L\u00e9vy-Bencheton , and Luca Caviglione . 2020 . Not All Areas Are Equal : Analysis of Citations in Information Security Research. Scientometrics 122 , 1 (January 2020), 267\u2013286. https:\/\/doi.org\/10.1007\/s11192-019-03279-6 10.1007\/s11192-019-03279-6 Steffen Wendzel, C\u00e9dric L\u00e9vy-Bencheton, and Luca Caviglione. 2020. Not All Areas Are Equal: Analysis of Citations in Information Security Research. Scientometrics 122, 1 (January 2020), 267\u2013286. https:\/\/doi.org\/10.1007\/s11192-019-03279-6","journal-title":"Analysis of Citations in Information Security Research. Scientometrics"},{"key":"e_1_3_2_1_117_1","volume-title":"Erik van Mulligen, Jan Velterop, Andra Waagmeester, Peter Wittenburg, Katherine Wolstencroft, Jun Zhao, and Barend Mons.","author":"Wilkinson D.","year":"2016","unstructured":"Mark\u00a0 D. Wilkinson , Michel Dumontier , I Jsbrand\u00a0Jan Aalbersberg , Gabrielle Appleton , Myles Axton , Arie Baak , Niklas Blomberg , Jan-Willem Boiten , Luiz\u00a0Bonino da Silva\u00a0Santos , Philip\u00a0 E. Bourne , Jildau Bouwman , Anthony\u00a0 J. Brookes , Tim Clark , Merc\u00e8 Crosas , Ingrid Dillo , Olivier Dumon , Scott Edmunds , Chris\u00a0 T. Evelo , Richard Finkers , Alejandra Gonzalez-Beltran , Alasdair\u00a0 J.G. Gray , Paul Groth , Carole Goble , Jeffrey\u00a0 S. Grethe , Jaap Heringa , Peter\u00a0 A.C \u2019t Hoen , Rob Hooft , Tobias Kuhn , Ruben Kok , Joost Kok , Scott\u00a0 J. Lusher , Maryann\u00a0 E. Martone , Albert Mons , Abel\u00a0 L. Packer , Bengt Persson , Philippe Rocca-Serra , Marco Roos , Rene van Schaik , Susanna-Assunta Sansone , Erik Schultes , Thierry Sengstag , Ted Slater , George Strawn , Morris\u00a0 A. Swertz , Mark Thompson , Johan van\u00a0der Lei , Erik van Mulligen, Jan Velterop, Andra Waagmeester, Peter Wittenburg, Katherine Wolstencroft, Jun Zhao, and Barend Mons. 2016 . The FAIR Guiding Principles for scientific data management and stewardship. Scientific Data 3, 1, Article 160018 (March 2016). https:\/\/doi.org\/10.1038\/sdata.2016.18 10.1038\/sdata.2016.18 Mark\u00a0D. Wilkinson, Michel Dumontier, IJsbrand\u00a0Jan Aalbersberg, Gabrielle Appleton, Myles Axton, Arie Baak, Niklas Blomberg, Jan-Willem Boiten, Luiz\u00a0Bonino da Silva\u00a0Santos, Philip\u00a0E. Bourne, Jildau Bouwman, Anthony\u00a0J. Brookes, Tim Clark, Merc\u00e8 Crosas, Ingrid Dillo, Olivier Dumon, Scott Edmunds, Chris\u00a0T. Evelo, Richard Finkers, Alejandra Gonzalez-Beltran, Alasdair\u00a0J.G. Gray, Paul Groth, Carole Goble, Jeffrey\u00a0S. Grethe, Jaap Heringa, Peter\u00a0A.C \u2019t Hoen, Rob Hooft, Tobias Kuhn, Ruben Kok, Joost Kok, Scott\u00a0J. Lusher, Maryann\u00a0E. Martone, Albert Mons, Abel\u00a0L. Packer, Bengt Persson, Philippe Rocca-Serra, Marco Roos, Rene van Schaik, Susanna-Assunta Sansone, Erik Schultes, Thierry Sengstag, Ted Slater, George Strawn, Morris\u00a0A. Swertz, Mark Thompson, Johan van\u00a0der Lei, Erik van Mulligen, Jan Velterop, Andra Waagmeester, Peter Wittenburg, Katherine Wolstencroft, Jun Zhao, and Barend Mons. 2016. The FAIR Guiding Principles for scientific data management and stewardship. Scientific Data 3, 1, Article 160018 (March 2016). https:\/\/doi.org\/10.1038\/sdata.2016.18"},{"key":"e_1_3_2_1_118_1","volume-title":"The Web Conference","author":"Zeber David","year":"2020","unstructured":"David Zeber , Sarah Bird , Camila Oliveira , Walter Rudametkin , Ilana Segall , Fredrik Wolls\u00e9n , and Martin Lopatka . 2020 . The Representativeness of Automated Web Crawls as a Surrogate for Human Browsing . In The Web Conference 2020. 167\u2013178. https:\/\/doi.org\/10.1145\/3366423.3380104 10.1145\/3366423.3380104 David Zeber, Sarah Bird, Camila Oliveira, Walter Rudametkin, Ilana Segall, Fredrik Wolls\u00e9n, and Martin Lopatka. 2020. The Representativeness of Automated Web Crawls as a Surrogate for Human Browsing. In The Web Conference 2020. 167\u2013178. https:\/\/doi.org\/10.1145\/3366423.3380104"},{"key":"e_1_3_2_1_119_1","volume-title":"2022 IEEE European Symposium on Security and Privacy Workshops. 538\u2013545","author":"Zhang Yiming","year":"2022","unstructured":"Yiming Zhang , Mingxuan Liu , Mingming Zhang , Chaoyi Lu , and Haixin Duan . 2022 . Ethics in Security Research: Visions, Reality, and Paths Forward . In 2022 IEEE European Symposium on Security and Privacy Workshops. 538\u2013545 . https:\/\/doi.org\/10.1109\/EuroSPW55150.2022.00064 10.1109\/EuroSPW55150.2022.00064 Yiming Zhang, Mingxuan Liu, Mingming Zhang, Chaoyi Lu, and Haixin Duan. 2022. Ethics in Security Research: Visions, Reality, and Paths Forward. In 2022 IEEE European Symposium on Security and Privacy Workshops. 538\u2013545. https:\/\/doi.org\/10.1109\/EuroSPW55150.2022.00064"},{"key":"e_1_3_2_1_120_1","volume-title":"11th USENIX Workshop on Cyber Security Experimentation and Test. 8\u00a0pages. https:\/\/www.usenix.org\/conference\/cset18\/presentation\/zheng","author":"Zheng Muwei","unstructured":"Muwei Zheng , Hannah Robbins , Zimo Chai , Prakash Thapa , and Tyler Moore . 2018. Cybersecurity Research Datasets: Taxonomy and Empirical Analysis . In 11th USENIX Workshop on Cyber Security Experimentation and Test. 8\u00a0pages. https:\/\/www.usenix.org\/conference\/cset18\/presentation\/zheng Muwei Zheng, Hannah Robbins, Zimo Chai, Prakash Thapa, and Tyler Moore. 2018. Cybersecurity Research Datasets: Taxonomy and Empirical Analysis. In 11th USENIX Workshop on Cyber Security Experimentation and Test. 8\u00a0pages. https:\/\/www.usenix.org\/conference\/cset18\/presentation\/zheng"},{"key":"e_1_3_2_1_121_1","volume-title":"Top Cyber Security Conferences Ranking. http:\/\/jianying.space\/conference-ranking.html","author":"Zhou Jianying","year":"2022","unstructured":"Jianying Zhou . 2022 . Top Cyber Security Conferences Ranking. http:\/\/jianying.space\/conference-ranking.html Jianying Zhou. 2022. Top Cyber Security Conferences Ranking. http:\/\/jianying.space\/conference-ranking.html"},{"key":"e_1_3_2_1_122_1","volume-title":"Measuring and Modeling the Label Dynamics of Online Anti-Malware Engines. In 29th USENIX Security Symposium. 2361\u20132378","author":"Zhu Shuofei","year":"2020","unstructured":"Shuofei Zhu , Jianjun Shi , Limin Yang , Boqin Qin , Ziyi Zhang , Linhai Song , and Gang Wang . 2020 . Measuring and Modeling the Label Dynamics of Online Anti-Malware Engines. In 29th USENIX Security Symposium. 2361\u20132378 . https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/zhu Shuofei Zhu, Jianjun Shi, Limin Yang, Boqin Qin, Ziyi Zhang, Linhai Song, and Gang Wang. 2020. Measuring and Modeling the Label Dynamics of Online Anti-Malware Engines. In 29th USENIX Security Symposium. 2361\u20132378. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/zhu"},{"key":"e_1_3_2_1_123_1","first-page":"2","article-title":"Thoughts about Artifact Badging","volume":"50","author":"Zilberman Noa","year":"2020","unstructured":"Noa Zilberman and Andrew\u00a0 W. Moore . 2020 . Thoughts about Artifact Badging . ACM SIGCOMM Computer Communication Review 50 , 2 (May 2020), 60\u201363. https:\/\/doi.org\/10.1145\/3402413.3402422 10.1145\/3402413.3402422 Noa Zilberman and Andrew\u00a0W. Moore. 2020. Thoughts about Artifact Badging. ACM SIGCOMM Computer Communication Review 50, 2 (May 2020), 60\u201363. https:\/\/doi.org\/10.1145\/3402413.3402422","journal-title":"ACM SIGCOMM Computer Communication Review"}],"event":{"name":"CSET 2023: 2023 Cyber Security Experimentation and Test Workshop","location":"Marina del Rey CA USA","acronym":"CSET 2023"},"container-title":["2023 Cyber Security Experimentation and Test Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3607505.3607523","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3607505.3607523","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:28Z","timestamp":1750178188000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3607505.3607523"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,7]]},"references-count":126,"alternative-id":["10.1145\/3607505.3607523","10.1145\/3607505"],"URL":"https:\/\/doi.org\/10.1145\/3607505.3607523","relation":{},"subject":[],"published":{"date-parts":[[2023,8,7]]},"assertion":[{"value":"2023-08-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}