1.
Keshav S. How to read a paper. ACM SIGCOMM Computer Communication Review. 2007 Jul 20;37(3).
2.
Tufte ER. The cognitive style of powerpoint. Cheshire, Conn: Graphics Press; 2003.
3.
Michael Alley. The craft of scientific presentations: critical steps to succeed and critical errors to avoid [Internet]. Springer; 2nd ed. 2013 edition (April 30, 2013); 2013. Available from: http://www.amazon.com/gp/product/1441982787
4.
Alley M. The craft of scientific presentations: critical steps to succeed and critical errors to avoid. New York: Springer; 2003.
5.
Report of Columbia Accident Investigation Board [Internet]. Available from: https://www.nasa.gov/columbia/home/CAIB_Vol1.html
6.
Urban T. Doing a TED Talk: The Full Story [Internet]. Wait But Why; 2016. Available from: http://waitbutwhy.com/2016/03/doing-a-ted-talk-the-full-story.html
7.
Tufte ER. The visual display of quantitative information. 2nd ed. Cheshire, Conn: Graphics Press; 2001.
8.
Tufte ER. Beautiful evidence. Cheshire, Conn: Graphics Press; 2006.
9.
Tufte ER. Envisioning information. Cheshire, Conn: Graphics Press; 1990.
10.
Tufte ER. Visual explanations: images and quantities, evidence and narrative. Cheshire, Conn: Graphics Press; 1997.
11.
Dittrich D, Kenneally E. The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research [Internet]. U.S. Department of Homeland Security; Available from: https://www.caida.org/publications/papers/2012/menlo_report_actual_formatted/
12.
The Belmont Report [Internet]. The National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research; 18AD. Available from: http://www.hhs.gov/ohrp/humansubjects/guidance/belmont.html
13.
Edwards MA, Roy S. Academic Research in the 21st Century: Maintaining Scientific Integrity in a Climate of Perverse Incentives and Hypercompetition. Environmental Engineering Science. 2017 Jan;34(1):51–61.
14.
Zhu Y. Surveillance, whistleblowing, and security engineering [Internet]. 2016. Available from: https://diracdeltas.github.io/blog/surveillance/
15.
Which Stats Test [Internet]. SAGE Publications; Available from: http://methods.sagepub.com/which-stats-test/
16.
Herley C, Oorschot PC van. SoK: Science, Security and the Elusive Goal of Security as a Scientific Pursuit. 2017 IEEE Symposium on Security and Privacy (SP) [Internet]. IEEE; 2017. p. 99–120. Available from: http://ieeexplore.ieee.org/document/7958573/