[1]
Alley, M. 2003. The craft of scientific presentations: critical steps to succeed and critical errors to avoid. Springer.
[2]
Dittrich, D. and Kenneally, E. The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research. U.S. Department of Homeland Security.
[3]
Doing a TED Talk: The Full Story: 2016. http://waitbutwhy.com/2016/03/doing-a-ted-talk-the-full-story.html.
[4]
Edwards, M.A. and Roy, S. 2017. Academic Research in the 21st Century: Maintaining Scientific Integrity in a Climate of Perverse Incentives and Hypercompetition. Environmental Engineering Science. 34, 1 (Jan. 2017), 51–61. DOI:https://doi.org/10.1089/ees.2016.0223.
[5]
Herley, C. and Oorschot, P.C. van 2017. SoK: Science, Security and the Elusive Goal of Security as a Scientific Pursuit. 2017 IEEE Symposium on Security and Privacy (SP) (May 2017), 99–120.
[6]
Keshav, S. 2007. How to read a paper. ACM SIGCOMM Computer Communication Review. 37, 3 (Jul. 2007). DOI:https://doi.org/10.1145/1273445.1273458.
[7]
Michael Alley 2013. The craft of scientific presentations: critical steps to succeed and critical errors to avoid. Springer; 2nd ed. 2013 edition (April 30, 2013).
[8]
Surveillance, whistleblowing, and security engineering: 2016. https://diracdeltas.github.io/blog/surveillance/.
[9]
Tufte, E.R. 2006. Beautiful evidence. Graphics Press.
[10]
Tufte, E.R. 1990. Envisioning information. Graphics Press.
[11]
Tufte, E.R. 2003. The cognitive style of powerpoint. Graphics Press.
[12]
Tufte, E.R. 2001. The visual display of quantitative information. Graphics Press.
[13]
Tufte, E.R. 1997. Visual explanations: images and quantities, evidence and narrative. Graphics Press.
[14]
Which Stats Test: http://methods.sagepub.com/which-stats-test/.
[15]
Report of Columbia Accident Investigation Board.
[16]
18AD. The Belmont Report. The National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research.