1.
Keshav, S. How to read a paper. ACM SIGCOMM Computer Communication Review 37, (2007).
2.
Tufte, E. R. The cognitive style of powerpoint. (Graphics Press, 2003).
3.
Michael Alley. The craft of scientific presentations: critical steps to succeed and critical errors to avoid. (Springer; 2nd ed. 2013 edition (April 30, 2013), 2013).
4.
Alley, M. The craft of scientific presentations: critical steps to succeed and critical errors to avoid. (Springer, 2003).
5.
Report of Columbia Accident Investigation Board. vol. 1.
6.
Urban, T. Doing a TED Talk: The Full Story. http://waitbutwhy.com/2016/03/doing-a-ted-talk-the-full-story.html (2016).
7.
Tufte, E. R. The visual display of quantitative information. (Graphics Press, 2001).
8.
Tufte, E. R. Beautiful evidence. (Graphics Press, 2006).
9.
Tufte, E. R. Envisioning information. (Graphics Press, 1990).
10.
Tufte, E. R. Visual explanations: images and quantities, evidence and narrative. (Graphics Press, 1997).
11.
Dittrich, D. & Kenneally, E. The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research.
12.
The Belmont Report. (18AD).
13.
Edwards, M. A. & Roy, S. Academic Research in the 21st Century: Maintaining Scientific Integrity in a Climate of Perverse Incentives and Hypercompetition. Environmental Engineering Science 34, 51–61 (2017).
14.
Zhu, Y. Surveillance, whistleblowing, and security engineering. https://diracdeltas.github.io/blog/surveillance/ (2016).
15.
Which Stats Test. http://methods.sagepub.com/which-stats-test/.
16.
Herley, C. & Oorschot, P. C. van. SoK: Science, Security and the Elusive Goal of Security as a Scientific Pursuit. in 2017 IEEE Symposium on Security and Privacy (SP) 99–120 (IEEE, 2017). doi:10.1109/SP.2017.38.