1.
Keshav S. How to read a paper. ACM SIGCOMM Computer Communication Review. 2007;37(3). doi:10.1145/1273445.1273458
2.
Tufte ER. The Cognitive Style of Powerpoint. Graphics Press; 2003.
3.
Michael Alley. The Craft of Scientific Presentations: Critical Steps to Succeed and Critical Errors to Avoid. Springer; 2nd ed. 2013 edition (April 30, 2013); 2013. http://www.amazon.com/gp/product/1441982787
4.
Alley M. The Craft of Scientific Presentations: Critical Steps to Succeed and Critical Errors to Avoid. Springer; 2003.
5.
Report of Columbia Accident Investigation Board. 1. https://www.nasa.gov/columbia/home/CAIB_Vol1.html
6.
Urban T. Doing a TED Talk: The Full Story. Published 2 March 2016. http://waitbutwhy.com/2016/03/doing-a-ted-talk-the-full-story.html
7.
Tufte ER. The Visual Display of Quantitative Information. 2nd ed. Graphics Press; 2001.
8.
Tufte ER. Beautiful Evidence. Graphics Press; 2006.
9.
Tufte ER. Envisioning Information. Graphics Press; 1990.
10.
Tufte ER. Visual Explanations: Images and Quantities, Evidence and Narrative. Graphics Press; 1997.
11.
Dittrich D, Kenneally E. The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research. https://www.caida.org/publications/papers/2012/menlo_report_actual_formatted/
12.
The Belmont Report. Published online 18AD. http://www.hhs.gov/ohrp/humansubjects/guidance/belmont.html
13.
Edwards MA, Roy S. Academic Research in the 21st Century: Maintaining Scientific Integrity in a Climate of Perverse Incentives and Hypercompetition. Environmental Engineering Science. 2017;34(1):51-61. doi:10.1089/ees.2016.0223
14.
Zhu Y. Surveillance, whistleblowing, and security engineering. Published 5 October 2016. https://diracdeltas.github.io/blog/surveillance/
15.
Which Stats Test. http://methods.sagepub.com/which-stats-test/
16.
Herley C, Oorschot PC van. SoK: Science, Security and the Elusive Goal of Security as a Scientific Pursuit. In: 2017 IEEE Symposium on Security and Privacy (SP). IEEE; 2017:99-120. doi:10.1109/SP.2017.38