1
Keshav S. How to read a paper. ACM SIGCOMM Computer Communication Review 2007;37. doi:10.1145/1273445.1273458
2
Tufte ER. The cognitive style of powerpoint. Cheshire, Conn: : Graphics Press 2003.
3
Michael Alley. The craft of scientific presentations: critical steps to succeed and critical errors to avoid. Springer; 2nd ed. 2013 edition (April 30, 2013) 2013. http://www.amazon.com/gp/product/1441982787
4
Alley M. The craft of scientific presentations: critical steps to succeed and critical errors to avoid. New York: : Springer 2003.
5
Report of Columbia Accident Investigation Board. ;1.https://www.nasa.gov/columbia/home/CAIB_Vol1.html
6
Urban T. Doing a TED Talk: The Full Story. 2016.http://waitbutwhy.com/2016/03/doing-a-ted-talk-the-full-story.html
7
Tufte ER. The visual display of quantitative information. 2nd ed. Cheshire, Conn: : Graphics Press 2001.
8
Tufte ER. Beautiful evidence. Cheshire, Conn: : Graphics Press 2006.
9
Tufte ER. Envisioning information. Cheshire, Conn: : Graphics Press 1990.
10
Tufte ER. Visual explanations: images and quantities, evidence and narrative. Cheshire, Conn: : Graphics Press 1997.
11
Dittrich D, Kenneally E. The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research. https://www.caida.org/publications/papers/2012/menlo_report_actual_formatted/
12
The Belmont Report. 18AD.http://www.hhs.gov/ohrp/humansubjects/guidance/belmont.html
13
Edwards MA, Roy S. Academic Research in the 21st Century: Maintaining Scientific Integrity in a Climate of Perverse Incentives and Hypercompetition. Environmental Engineering Science 2017;34:51–61. doi:10.1089/ees.2016.0223
14
Zhu Y. Surveillance, whistleblowing, and security engineering. 2016.https://diracdeltas.github.io/blog/surveillance/
15
Which Stats Test. http://methods.sagepub.com/which-stats-test/
16
Herley C, Oorschot PC van. SoK: Science, Security and the Elusive Goal of Security as a Scientific Pursuit. In: 2017 IEEE Symposium on Security and Privacy (SP). IEEE 2017. 99–120. doi:10.1109/SP.2017.38