[1]
S. Keshav, ‘How to read a paper’, ACM SIGCOMM Computer Communication Review, vol. 37, no. 3, Jul. 2007, doi: 10.1145/1273445.1273458.
[2]
E. R. Tufte, The cognitive style of powerpoint. Cheshire, Conn: Graphics Press, 2003.
[3]
Michael Alley, The craft of scientific presentations: critical steps to succeed and critical errors to avoid. Springer; 2nd ed. 2013 edition (April 30, 2013), 2013 [Online]. Available: http://www.amazon.com/gp/product/1441982787
[4]
M. Alley, The craft of scientific presentations: critical steps to succeed and critical errors to avoid. New York: Springer, 2003.
[5]
‘Report of Columbia Accident Investigation Board’, vol. 1. [Online]. Available: https://www.nasa.gov/columbia/home/CAIB_Vol1.html
[6]
T. Urban, ‘Doing a TED Talk: The Full Story’, Mar. 02, 2016. [Online]. Available: http://waitbutwhy.com/2016/03/doing-a-ted-talk-the-full-story.html
[7]
E. R. Tufte, The visual display of quantitative information, 2nd ed. Cheshire, Conn: Graphics Press, 2001.
[8]
E. R. Tufte, Beautiful evidence. Cheshire, Conn: Graphics Press, 2006.
[9]
E. R. Tufte, Envisioning information. Cheshire, Conn: Graphics Press, 1990.
[10]
E. R. Tufte, Visual explanations: images and quantities, evidence and narrative. Cheshire, Conn: Graphics Press, 1997.
[11]
D. Dittrich and E. Kenneally, ‘The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research’. U.S. Department of Homeland Security [Online]. Available: https://www.caida.org/publications/papers/2012/menlo_report_actual_formatted/
[12]
‘The Belmont Report’. The National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research, 18AD [Online]. Available: http://www.hhs.gov/ohrp/humansubjects/guidance/belmont.html
[13]
M. A. Edwards and S. Roy, ‘Academic Research in the 21st Century: Maintaining Scientific Integrity in a Climate of Perverse Incentives and Hypercompetition’, Environmental Engineering Science, vol. 34, no. 1, pp. 51–61, Jan. 2017, doi: 10.1089/ees.2016.0223.
[14]
Y. Zhu, ‘Surveillance, whistleblowing, and security engineering’, Oct. 05, 2016. [Online]. Available: https://diracdeltas.github.io/blog/surveillance/
[15]
‘Which Stats Test’. [Online]. Available: http://methods.sagepub.com/which-stats-test/
[16]
C. Herley and P. C. van Oorschot, ‘SoK: Science, Security and the Elusive Goal of Security as a Scientific Pursuit’, in 2017 IEEE Symposium on Security and Privacy (SP), May 2017, pp. 99–120, doi: 10.1109/SP.2017.38 [Online]. Available: http://ieeexplore.ieee.org/document/7958573/