Perla, Enrico, and Oldani Massimiliano. A Guide to Kernel Exploitation: Attacking the Core. 1st ed. Burlington, MA: Syngress, 2010.
Sutton, Richard S., and Andrew G. Barto. Reinforcement Learning: An Introduction. Second edition. Adaptive Computation and Machine Learning Series. Cambridge, Massachusetts: The MIT Press, 2018.
Sutton, Richard S., and Andrew G. Barto. Reinforcement Learning: An Introduction. Second edition. Adaptive Computation and Machine Learning Series. Cambridge, Massachusetts: The MIT Press, 2018.
Angwin, Julia, Jeff Larson, Surya Mattu, and Lauren Kirchner. “Machine Bias.” ProPublica, May 23, 2016.
https://www.propublica.org/article/machine-bias-risk-assessments-in-criminal-sentencing
Cranor, Lorrie Faith, and Simson Garfinkel. Security and Usability: Designing Secure Systems That People Can Use. Sebastopol, CA: O’Reilly Media, 2005.
Jurafsky, Daniel, and James H. Martin. Speech and Language Processing: An Introduction to Natural Language Processing, Computational Linguistics, and Speech Recognition. Prentice Hall Series in Artificial Intelligence. Upper Saddle River, N.J: Prentice Hall, 2000.
Bird, Steven, Ewan Klein, and Edward Loper. Natural Language Processing with Python. 1st ed. Beijing ; Cambridge [Mass.]: O’Reilly, 2009.
http://www.nltk.org/book/
Hutchings, Alice, and Thomas J. Holt. “A Crime Script Analysis of the Online Stolen Data Market.” The British Journal of Criminology 55, no. 3 (2015): 596–614.
https://www.jstor.org/stable/43819299
Vu, Anh V., Jack Hughes, Ildiko Pete, Ben Collier, Yi Ting Chua, Ilia Shumailov, and Alice Hutchings. “Turning Up the Dial: The Evolution of a Cybercrime Market Through Set-up, Stable, and Covid-19 Eras.” In Proceedings of the ACM Internet Measurement Conference, 551–66. Virtual Event USA: ACM, 2020.
https://doi.org/10.1145/3419394.3423636
Tcherni, M., A. Davies, G. Lopes, and A. Lizotte. “The Dark Figure of Online Property Crime: Is Cyberspace Hiding a Crime Wave?” Justice Quarterly 33, no. 5 (July 28, 2016): 890–911.
https://doi.org/10.1080/07418825.2014.994658
Anderson, Ross, Chris Barton, Rainer Böhme, Richard Clayton, Carlos Gañán, Tom Grasso, Michael Levi, Tyler Moore, and Marie Vasek. “Measuring the Changing Cost of Cybercrime.” Boston, 2019.
https://weis2019.econinfosec.org/wp-content/uploads/sites/6/2019/05/WEIS_2019_paper_25.pdf
Cohen, Lawrence E., and Marcus Felson. “Social Change and Crime Rate Trends: A Routine Activity Approach.” American Sociological Review 44, no. 4 (1979): 588–608.
https://doi.org/10.2307/2094589
De Kimpe, Lies, Koen Ponnet, Michel Walrave, Thom Snaphaan, Lieven Pauwels, and Wim Hardyns. “Help, I Need Somebody: Examining the Antecedents of Social Support Seeking among Cybercrime Victims.” Computers in Human Behavior 108 (2020): 106310.
https://doi.org/10.1016/j.chb.2020.106310
Grabosky, Peter N. “Virtual Criminality: Old Wine in New Bottles?” Social & Legal Studies 10, no. 2 (June 1, 2001): 243–49.
https://doi.org/10.1177/a017405
Wall, David S. “Policing Cybercrimes: Situating the Public Police in Networks of Security within Cyberspace.” Police Practice and Research: An International Journal 8, no. 2 (May 18, 2007): 183–205.
https://doi.org/10.1080/15614260701377729
Abelson, Harold, Ross Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, et al. “Keys under Doormats: Mandating Insecurity by Requiring Government Access to All Data and Communications.” Journal of Cybersecurity 1 (2015).
https://doi.org/10.1093/cybsec/tyv009
Clayton, Richard, Taylor Moore, and Nicolas Christin. “Concentrating Correctly on Cybercrime Concentration.” In Workshop on the Economics of Information Security. Delft, Netherlands, 2015.
http://infosecon.net/workshop/downloads/2015/pdf/presentation_of_Tylor_Moore_in_WEIS_2015.pdf
Smith, Russell G., Nicholas Wolanin, and Glen Worthington. “E-Crime Solutions and Crime Displacement.” Australian Institute of Criminology: Trends and Issues in Crime and Criminal Justice, no. 243 (January 2003): 6.
https://www.aic.gov.au/sites/default/files/2020-05/tandi243.pdf
Hutchings, Alice, Richard Clayton, and Ross Anderson. “Taking down Websites to Prevent Crime.” In 2016 APWG Symposium on Electronic Crime Research (ECrime), 1–10. IEEE, 2016.
https://doi.org/10.1109/ECRIME.2016.7487947
Collier, Ben, Daniel R. Thomas, Richard Clayton, and Alice Hutchings. “Booting the Booters: Evaluating the Effects of Police Interventions in the Market for Denial-of-Service Attacks.” In Proceedings of the Internet Measurement Conference, 50–64. Amsterdam Netherlands: ACM, 2019.
https://doi.org/10.1145/3355369.3355592
Brantingham, Paul J., and Frederic L. Faust. “A Conceptual Model of Crime Prevention.” Crime & Delinquency 22, no. 3 (1976): 284–96.
https://doi.org/10.1177/001112877602200302
Bogomolniy, Oleg. “Cyber Insurance Conundrum: Using CIS Critical Security Controls for Underwriting Cyber Risk.” SANS Institute, 2021, 32.
https://www.sans.org/white-papers/37572/
Kochman, Ben. “Insurers Set Limits On Risky Sectors Amid Cybercrime Spike.” Law 360, May 21, 2021.
https://www.law360.com/articles/1387175/insurers-set-limits-on-risky-sectors-amid-cybercrime-spike
Rice, Shawn. “Pipeline Ransomware Attack Could Raise Cyber Insurance Bar.” Law360, May 14, 2021.
https://www.law360.com/articles/1384435/pipeline-ransomware-attack-could-raise-cyber-insurance-bar
Sistrunk, Jeff. “The State Of Cyber Coverage Law: 4 Key Decisions.” Law360, April 19, 2016.
https://www.law360.com/articles/786246/the-state-of-cyber-coverage-law-4-key-decisions
U.S. Government Accountability Office. “Rising Cyberthreats Increase Cyber Insurance Premiums While Reducing Availability,” July 19, 2022.
https://www.gao.gov/blog/rising-cyberthreats-increase-cyber-insurance-premiums-while-reducing-availability
Johansmeyer, Tom. “The Cyber Insurance Market Needs More Money.” Harvard Business Review, March 10, 2022.
https://hbr.org/2022/03/the-cyber-insurance-market-needs-more-money
Bentz, Thomas H. Jr. “Cyber Insurance Gone Wrong: Insurance Mistakes That Have Cost Risk Managers Their Jobs.” Holland and Knight, PLI Current, The Journal of PLI Press 2, no. 2 (2018): 269–77.
https://www.hklaw.com/en/insights/publications/2018/05/cyber-insurance-gone-wrong-insurance-mistakes-that
S. Al-Shibib, Luma, and James A. Goodridge. “A Review of Cyber Coverage Decisions From 2022: A Policyholder’s Perspective.” New York Law Journal 269, no. 17 (January 26, 2023): 3.
https://andersonkill.com/article/a-review-of-cyber-coverage-decisions-from-2022-a-policyholders-perspective/
Tsohou, Aggeliki, Vasiliki Diamantopoulou, Stefanos Gritzalis, and Costas Lambrinoudakis. “Cyber Insurance: State of the Art, Trends and Future Directions.” International Journal of Information Security 22, no. 3 (2023): 737–48.
https://doi.org/10.1007/s10207-023-00660-8
ISACA. Risk IT Framework. 2nd ed. ISACA, 2020.
Stewart, James Michael, Mike Chapple, and Darril Gibson. CISSP: Certified Information Systems Security Professional Study Guide. 6th ed. SYBEX Serious Skills. Hoboken, N.J.: Chichester: Wiley; John Wiley [distributor], 2012.
Whitman, Michael E., and Herbert J. Mattord. Management of Information Security. 4th ed. Stamford, CT: Cengage Learning, 2012.
Brotby, W. Krag. Information Security Governance: A Practical Development and Implementation Approach. Wiley Series in Systems Engineering and Management. Hoboken, N.J: John Wiley & Sons, 2009.
Fitzgerald, Todd. Information Security Governance Simplified: From the Boardroom to the Keyboard. CRC PRESS, 2012.
Krause Nozaki, Micki, and Harold F. Tipton, eds. Information Security Management Handbook, Volume 5. 6th ed. Auerbach Publications, 2012.
https://doi.org/10.1201/b11250
Atkins, Christopher. Phishing Attacks: Advanced Attack Techniques. 2nd ed. NY: Independently Published, 2021.
Bittau, Andrea, Adam Belay, Ali Mashtizadeh, David Mazieres, and Dan Boneh. “Hacking Blind.” In 2014 IEEE Symposium on Security and Privacy, 227–42. San Jose, CA: IEEE, 2014.
https://doi.org/10.1109/SP.2014.22
Corradini, Isabella. Building a Cybersecurity Culture in Organizations: How to Bridge the Gap Between People and Digital Technology. Vol. 284. Studies in Systems, Decision and Control. Cham: Springer International Publishing, 2020.
https://doi.org/10.1007/978-3-030-43999-6
Solove, Daniel J. “Introduction: Privacy Self-Management and the Consent Dilemma.” Harvard Law Review 126, no. 7 (May 20, 2013).
https://harvardlawreview.org/print/vol-126/introduction-privacy-self-management-and-the-consent-dilemma/
Ur, Blase, Fumiko Noma, Jonathan Bees, Sean M. Segreti, Richard Shay, Lujo Bauer, Nicolas Christin, and Lorrie Faith Cranor. “‘I Added “!” at the End to Make It Secure’: Observing Password Creation in the Lab.” In Proceedings of the Eleventh USENIX Conference on Usable Privacy and Security, 123–40. SOUPS ’15. USA: USENIX Association, 2015.
Wen, Zikai Alex, Zhiqiu Lin, Rowena Chen, and Erik Andersen. “What.Hack: Engaging Anti-Phishing Training Through a Role-Playing Phishing Simulation Game.” In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 1–12. Glasgow Scotland Uk: ACM, 2019.
https://doi.org/10.1145/3290605.3300338
Wash, Rick, and Molly M. Cooper. “Who Provides Phishing Training?: Facts, Stories, and People Like Me.” In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 1–12. Montreal QC Canada: ACM, 2018.
https://doi.org/10.1145/3173574.3174066
Cohen, Julie E. “What Privacy Is For.” Harvard Law Review 126, no. 7 (May 20, 2013).
https://harvardlawreview.org/print/vol-126/what-privacy-is-for/
Brown, Ian. “Britain’s Smart Meter Programme: A Case Study in Privacy by Design.” International Review of Law, Computers & Technology 28, no. 2 (May 4, 2014): 172–84.
https://doi.org/10.1080/13600869.2013.801580
Lessig, Lawrence. “What Things Regulate Speech: Cda 2.0 Vs. Filtering.” Jurimetrics 38, no. 4 (1998): 629–70.
https://www.jstor.org/stable/29762575
Warren, Samuel D., and Louis D. Brandeis. “The Right to Privacy.” Harvard Law Review 4, no. 5 (December 15, 1890): 193–220.
https://doi.org/10.2307/1321160
Jesus Saenz, Maria, James Jnr. Rice, and Ken Cottrill. “Do You Have the DT’s? Why It’s Time to Bring Digital Transformation Down to Earth.” MIT Digital Supply Chain Transformation Lab (blog), April 1, 2019.
https://digitalsc.mit.edu/digital-transformation-in-supply-chain/
Saenz, Maria Jesus, Rochak Gupta, and Connor Makowski. “Finding Profit in Horizontal Collaboration.” New Supply Chain Management Review, January 12, 2017.
https://www.scmr.com/article/finding_profit_in_horizontal_collaboration
Seifert, Ralf W., and Richard Markoff. “Tetra Pak: A Digitally Enabled Supply Chain as a Competitive Advantage.” IMD, November 2018.
https://www.imd.org/research-knowledge/supply-chain/case-studies/tetra-pak-a-digitally-enabled-supply-chain-as-a-competitive-advantage/
Casey, Michael J., and Pindar Wong. “Global Supply Chains Are About to Get Better, Thanks to Blockchain.” Harvard Business Review, March 13, 2017.
https://hbr.org/2017/03/global-supply-chains-are-about-to-get-better-thanks-to-blockchain
Miller, Bradley N., and David L. Ranum. Problem Solving with Algorithms and Data Structures Using Python. 2nd ed. Wilsonville, OR: Franklin, Beedle & Associates, 2011.
Augenstein, Moshe, Yedidyah Langsam, and Aaron M. Tenenbaum. Data Structures Using Java. Upper Saddle River, N.J: Pearson Prentice Hall, 2003.
Carrano, Frank M., and Timothy Henry. Data Abstraction & Problem Solving with C++: Walls and Mirrors. 7th ed. Boston: Pearson, 2017.
Langsam, Yedidyah, Moshe Augenstein, Aaron M. Tenenbaum, and Aaron M. Tenenbaum. Data Structures Using C and C++. 2nd ed. Upper Saddle River, N.J: Prentice Hall, 1996.
Katz, Jonathan. Digital Signatures. Boston, MA: Springer US, 2010.
https://doi.org/10.1007/978-0-387-27712-7
Cormen, Thomas H., Charles E. Leiserson, and Ronald L. Rivest. “Chapter 28.” In Introduction to Algorithms, 24. print. The MIT Electrical Engineering and Computer Science Series. Cambridge, Mass.: MIT Press [u.a.], 2000.
Leighton, Frank Thomson. Introduction to Parallel Algorithms and Architectures: Arrays, Trees, Hypercubes. 1st ed. San Francisco, CA: Morgan Kaufmann Publications, 1991.
Hromkovič, Juraj, Ralf Klasing, Andrzej Pelc, Peter Ružička, and Walter Unger. Dissemination of Information in Communication Networks: Broadcasting, Gossiping, Leader Election, and Fault-Tolerance. Texts in Theoretical Computer Science. An EATCS Series (TTCS). Berlin ; New York: Springer, 2005.
Peleg, D. Distributed Computing: A Locality-Sensitive Approach. SIAM Monographs on Discrete Mathematics and Applications. Philadelphia: Society for Industrial and Applied Mathematics, 2000.
Alrawi, Omar, Chaoshun Zuo, Ruian Duan, Ranjita Pai Kasturi, Zhiqiang Lin, and Brendan Saltaformaggio. “The Betrayal At Cloud City: An Empirical Analysis Of Cloud-Based Mobile Backends,” 551–66, 2019.
https://www.usenix.org/conference/usenixsecurity19/presentation/alrawi
Pan, Xiaorui, Xueqiang Wang, Yue Duan, XiaoFeng Wang, and Heng Yin. “Dark Hazard: Learning-Based, Large-Scale Discovery of Hidden Sensitive Operations in Android Apps.” In Proceedings 2017 Network and Distributed System Security Symposium. San Diego, CA: Internet Society, 2017.
https://doi.org/10.14722/ndss.2017.23265
Liu, Bin, Mads Schaarup Andersen, Florian Schaub, Hazim Almuhimedi, Shikun Zhang, Norman Sadeh, Alessandro Acquisti, and Yuvraj Agarwal. “Follow My Recommendations: A Personalized Assistant for Mobile App Permissions.” In Proceedings of the Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), 199–212. SOUPS ’16. Denver, CO: USENIX Association, 2016.
https://www.usenix.org/conference/soups2016/technical-sessions/presentation/liu
Lin, Jialiu, Bin Liu, Norman Sadeh, and Jason I. Hong. “Modeling Users’ Mobile App Privacy Preferences: Restoring Usability in a Sea of Permission Settings.” In Proceedings of the Tenth USENIX Conference on Usable Privacy and Security, 199–212. SOUPS ’14. USA: USENIX Association, 2014.
Mutchler, Patrick, Adam Doup, John Mitchell, Chris Kruegel, and Giovanni Vigna. “A Large-Scale Study of Mobile Web App Security,” 2015.
Doherty, Jim. Wireless and Mobile Device Security. 2nd ed. ISSA. Burlington, Massachusetts: Jones & Bartlett Learning, 2022.
Bommisetty, Satish, Heather Mahalik, Oleg Skulkin, Rohit Tamma, and Igor Mikhaylov. Practical Mobile Forensics: A Hands-on Guide to Mastering Mobile Forensics for the IOS, Android, and the Windows Phone Platforms. 3rd ed. Birmingham: Packt Publishing, 2018.
Dwivedi, Himanshu, Chris Clark, and David Thiel. Mobile Application Security. New York: McGraw-Hill, 2010.
Boudriga, Noureddine. Security of Mobile Communications. Auerbach Publications, 2009.
Menezes, Alfred J., Paul C. Van Oorschot, and Scott A. Vanstone. Handbook of Applied Cryptography. 1st ed. CRC Press, 2018.
https://doi.org/10.1201/9780429466335
Stransky, Christian, Dominik Wermke, Johanna Schrader, Nicolas Huaman, Yasemin Acar, Anna Lena Fehlhaber, Miranda Wei, Blase Ur, and Sascha Fahl. “On the Limited Impact of Visualizing Encryption: Perceptions of E2E Messaging Security.” In Proceedings of the Seventeenth USENIX Conference on Usable Privacy and Security, 437–54. SOUPS’21. USA: USENIX Association, 2021.
Katz, Jonathan, and Yehuda Lindell. Introduction to Modern Cryptography. 2nd ed. Chapman & Hall/Crc Cryptography and Network Security Series. Boca Raton: CRC Press/Taylor & Francis, 2015.
Adams, Carlisle, and Steve Lloyd. Understanding PKI: Concepts, Standards, and Deployment Considerations. 2nd ed. Boston: Addison-Wesley, 2003.
Stinson, Douglas R., and Maura B. Paterson. Cryptography: Theory and Practice. 4th ed. Boca Raton: CRC Press, Taylor & Francis Group, 2019.
Stallings, William. Cryptography and network security: principles and practice. 7th ed. Uttar Pradesh, India: Pearson, 2022.
Alexander, David, Amanda Finch, and David Sutton. Information Security Management Principles. Edited by Andy Taylor. Second edition. Swindon, UK: BCS, the Chartered Institute for IT, 2013.
Hopkin, Paul. Fundamentals of Risk Management: Understanding, Evaluating and Implementing Effective Risk Management. 5th Edition. London ; New York: Kogan Page, 2018.
Kaufman, Charlie, Radia Perlman, and Michael Speciner. Network Security: Private Communication in a Public World. 2nd ed. Prentice Hall Series in Computer Networking and Distributed Systems. Upper Saddle River, NJ: Prentice Hall PTR, 2002.
Yanofsky, Noson S., and Mirco A. Mannucci. Quantum Computing for Computer Scientists. 1st ed. Cambridge University Press, 2008.
https://doi.org/10.1017/CBO9780511813887
Nielsen, Michael A., and Isaac L. Chuang. Quantum Computation and Quantum Information. 10th anniversary ed. Cambridge ; New York: Cambridge University Press, 2010.
Barroso, Luiz André, Urs Hölzle, and Parthasarathy Ranganathan. The Datacenter as a Computer: Designing Warehouse-Scale Machines. 3rd ed. Synthesis Lectures on Computer Architecture. Cham: Springer International Publishing, 2018.
https://doi.org/10.1007/978-3-031-01761-2
Tanenbaum, Andrew S., and Herbert Bos. Modern Operating Systems. Fourth edition. Boston: Pearson, 2015.
Leskovec, Jurij, Anand Rajaraman, and Jeffrey D. Ullman. Mining of Massive Datasets. Second edition. Cambridge: Cambridge University Press, 2014.
Marinescu, Dan C. Cloud Computing: Theory and Practice. 2nd ed. San Francisco, CA, USA: Morgan Kaufmann Publishers Inc., 2017.
Mrzygłód, Kamil. Azure for Developers: Implement rich Azure PaaS ecosystems using containers, serverless services, and storage solutions. 2nd ed. Birmingham, UK: Packt Publishing Ltd., 2022.
Sanderson, Dan. Programming Google App Engine: Build & Run Scalable Web Applications on Google’s Infrastructure. 2nd ed. Sebastopol, CA: O’Reilly Media, 2012.
Song, Sukhyun, Kyung Dong Ryu, and Dilma Da Silva. “Blue Eyes: Scalable and Reliable System Management for Cloud Computing.” In 2009 IEEE International Symposium on Parallel & Distributed Processing, 1–8, 2009.
https://doi.org/10.1109/IPDPS.2009.5161232
Varia, Jinesh. “Building GrepTheWeb in the Cloud, Part 1: Cloud Architectures.” Amazon Web Services, Inc., July 16, 2008.
https://aws.amazon.com/articles/building-greptheweb-in-the-cloud-part-1-cloud-architectures/
Dotson, Chris. Practical Cloud Security: A Guide for Secure Design and Deployment. Sebastopol, CA: O’Reilly Media, Inc, 2019.
Vacca, John R., ed. Cloud Computing Security: Foundations and Challenges. 2nd ed. Boca Raton: CRC Press/Taylor & Francis Group, 2021.
Smart, Nigel P. Cryptography Made Simple. Information Security and Cryptography (ISC). Cham Heidelberg New York Dordrecht London: Springer, 2016.
Antonopoulos, Andreas M., and Gavin Wood. Mastering Ethereum: Building Smart Contracts and DApps. 1st ed. Sebastopol, CA: O’Reilly Media, 2018.
Fernández Anta, Antonio, Chryssis Georgiou, Maurice Herlihy, and Maria Potop-Butucaru. Principles of Blockchain Systems. 1st ed. Synthesis Lectures on Computer Science. Cham: Springer International Publishing, 2021.
Narayanan, Arvind, Joseph Bonneau, Edward Felten, Andrew Miller, and Steven Goldfeder. Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction. Princeton, NJ: Princeton University Press, 2016.
Viega, John, Gary McGraw, and Bruce Schneier. Building Secure Software: How to Avoid Security Problems the Right Way. Addison-Wesley Professional Computing Series. Boston: Addison-Wesley, 2001.
Sommerville, Ian. Software Engineering. 6th ed. International Computer Science Series. Harlow, England ; New York: Addison-Wesley, 2001.
Bishop, Matt. Computer Security: Art and Science. 2nd ed. Boston: Pearson Education, 2003.
Anderson, Ross. Security Engineering: A Guide to Building Dependable Distributed Systems. 3rd ed. Indianapolis: John Wiley and Sons, 2021.
Erickson, Jon. Hacking: The Art of Exploitation. 2nd ed. San Francisco, CA: No Starch Press, 2008.
McGraw, Gary. Software Security: Building Security In. Addison-Wesley Software Security Series. Upper Saddle River, NJ: Addison-Wesley, 2006.
Pressman, Roger S. Software Engineering: A Practitioner’s Approach. 8th ed. New York, NY: McGraw-Hill Education, 2014.
OWASP. “OWASP Foundation, the Open Source Foundation for Application Security | OWASP Foundation.”
https://owasp.org/
Chess, Brian, and Jacob West. Secure Programming with Static Analysis. Addison-Wesley Software Security Series. Upper Saddle River, NJ: Addison-Wesley, 2007.
Long, Fred, Dhruv Mohindra, Robert C. Seacord, Dean F. Sutherland, and David Svoboda. The CERT Oracle Secure Coding Standard for Java. 1st ed. The SEI Series in Software Engineering. Upper Saddle River, NJ: Addison-Wesley, 2011.
Basin, David, Patrick Schaller, and Michael Schläpfer. Applied Information Security: A Hands-on Approach. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011.
https://doi.org/10.1007/978-3-642-24474-2
Howard, Michael, and David LeBlanc. Writing Secure Code, Second Edition. 2nd ed. Microsoft Press, 2003.
Viega, John, Gary McGraw, and Bruce Schneier. Building Secure Software: How to Avoid Security Problems the Right Way. Addison-Wesley Professional Computing Series. Boston: Addison-Wesley, 2001.
Lipp, Moritz, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Jann Horn, Stefan Mangard, et al. “Meltdown: Reading Kernel Memory from User Space.” Communications of the ACM 63, no. 6 (May 21, 2020): 46–56.
https://doi.org/10.1145/3357033
Kocher, Paul, Jann Horn, Anders Fogh, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, et al. “Spectre Attacks: Exploiting Speculative Execution.” In 2019 IEEE Symposium on Security and Privacy (SP). San Francisco, CA, USA: IEEE, 2019.
https://doi.org/10.1109/SP.2019.00002
Hill, Mark D., Jon Masters, Parthasarathy Ranganathan, Paul Turner, and John L. Hennessy. “On the Spectre and Meltdown Processor Security Vulnerabilities.” IEEE Micro 39, no. 2 (February 2019): 9–19.
https://doi.org/10.1109/MM.2019.2897677
Patterson, David A., and John L. Hennessy. Computer Organization and Design: The Hardware / Software Interface. 1st ed., RISC-V Edition. Morgan Kaufmann Pub, 2017.
Dally, William J., and R. Curtis Harting. Digital Design: A Systems Approach. Illustrated Edition. Cambridge University Press, 2012.
Swaminathan, Karthik, Nandhini Chandramoorthy, Chen-Yong Cher, Ramon Bertran, Alper Buyuktosunoglu, and Pradip Bose. “BRAVO: Balanced Reliability-Aware Voltage Optimization.” In 2017 IEEE International Symposium on High Performance Computer Architecture (HPCA), 97–108. IEEE, 2017.
https://doi.org/10.1109/HPCA.2017.56
Dixit, Harish Dattatraya, Laura Boyle, Gautham Vunnam, Sneha Pendharkar, Matt Beadon, and Sriram Sankar. “Detecting Silent Data Corruptions in the Wild.” arXiv, March 16, 2022.
https://doi.org/10.48550/arXiv.2203.08989
Papadimitriou, George, and Dimitris Gizopoulos. “Demystifying the System Vulnerability Stack: Transient Fault Effects Across the Layers.” In 2021 ACM/IEEE 48th Annual International Symposium on Computer Architecture (ISCA), 902–15. Valencia, Spain: IEEE, 2021.
https://doi.org/10.1109/ISCA52012.2021.00075
Leng, Jingwen, Alper Buyuktosunoglu, Ramon Bertran, Pradip Bose, Quan Chen, Minyi Guo, and Vijay Janapa Reddi. “Asymmetric Resilience: Exploiting Task-Level Idempotency for Transient Error Recovery in Accelerator-Based Systems.” In 2020 IEEE International Symposium on High Performance Computer Architecture (HPCA), 44–57. IEEE, 2020.
https://doi.org/10.1109/HPCA47549.2020.00014
Nomura, Shuou, Matthew D. Sinclair, Chen-Han Ho, Venkatraman Govindaraju, Marc de Kruijf, and Karthikeyan Sankaralingam. “Sampling + DMR: Practical and Low-Overhead Permanent Fault Detection.” In 2011 38th Annual International Symposium on Computer Architecture (ISCA), 201–12. IEEE, 2011.
https://doi.org/10.1145/2000064.2000089
Jaeger, Trent. Operating System Security. Synthesis Lectures on Information Security, Privacy and Trust 1. San Rafael, Calif.: Morgan & Claypool, 2008.
Peleg, D. Distributed Computing: A Locality-Sensitive Approach. SIAM Monographs on Discrete Mathematics and Applications. Philadelphia: Society for Industrial and Applied Mathematics, 1987.
Tanenbaum, Andrew, and Maarten van Steen. Distributed Systems: Principles and Paradigms. 2nd ed. Pearson Education Inc., 2016.
Bryant, Randal E., and David R. O’Hallaron. Computer Systems: A Programmer’s Perspective. 2nd ed. Addison Wesley, 1994.
Levin, Jonathan. OS Internals. Volume 3: Security & Insecurity / by Jonathan Levin. 2nd edition. Edison, N.J: Technologeeks.com, 2018.
Yosifovich, Pavel, Mark E. Russinovich, Alex Ionescu, and David A. Solomon. Windows Internals, Part 1: System Architecture, Processes, Threads, Memory Management, and More. 7th ed. Developer Reference. Pearson, 2017.
https://www.microsoftpressstore.com/store/windows-internals-part-1-system-architecture-processes-9780735684188
Tanenbaum, Andrew S. Modern Operating Systems. 3rd ed. Upper Saddle River, N.J: Pearson/Prentice Hall, 2008.
Garfinkel, Simson, Daniel Weise, and Steven Strassmann, eds. “Richard P. Gabriel, ‘The Rise of “Worse Is Better.”’” In The UNIX-HATERS Handbook, 1st ed. San Mateo, CA: IDG Books Worldwide, Inc, 1994.
https://web.stanford.edu/class/archive/cs/cs240/cs240.1236/old//sp2014/readings/worse-is-better.html
Hennessy, John L., and David A. Patterson. Computer Architecture: A Quantitative Approach. 6th ed. The Morgan Kaufmann Series in Computer Architecture and Design. Cambridge, MA: Morgan Kaufmann Publishers, 2019.
Anderson, Thomas, and Michael Dahlin. Operating Systems: Principles and Practice. 2nd ed. Recursive Books, 2014.
Saltzer, J. H., D. P. Reed, and D. D. Clark. “End-to-End Arguments in System Design.” ACM Transactions on Computer Systems 2, no. 4 (1984): 277–88.
https://doi.org/10.1145/357401.357402
Kaashoek, Frans M, and Jerome H. Saltzer. “Principles of Computer System Design,” Morgan Kaufmann, 2009.
Palmer, Chris. “Secure Session Management With Cookies for Web Applications.” San Francisco, CA: iSEC Partners, Inc, September 10, 2008.
Stuttard, Dafydd, and Marcus Pinto. The Web Application Hacker’s Handbook: Finding and Exploiting Security Flaws. 2nd ed. Indianapolis, IN : Chichester: Wiley, 2011.
Zalewski, Michal. The Tangled Web: A Guide to Securing Modern Web Applications. San Francisco: No Starch Press, 2011.
Bau, Jason, Frank Wang, Elie Bursztein, Patrick Mutchler, and John C. Mitchell. “Vulnerability Factors in New Web Applications : Audit Tools, Developer Selection & Languages,” 2013.
https://www.semanticscholar.org/paper/Vulnerability-Factors-in-New-Web-Applications-%3A-%2C-%26-Bau-Wang/3c97fad7f822a3ae08340e4f8102312f8b9643c0
Purewal, Semmy. Learning Web App Development: Build Quickly with Proven JavaScript Techniques. 1st ed. Beijing: O’Reilly, 2014.
Bojinov, Hristo, Elie Bursztein, and Dan Boneh. “XCS: Cross Channel Scripting and Its Impact on Web Applications.” In Proceedings of the 16th ACM Conference on Computer and Communications Security, 420–31. CCS ’09. New York, NY, USA: Association for Computing Machinery, 2009.
https://doi.org/10.1145/1653662.1653713
Felt, Adrienne Porter, Alex Ainslie, Robert W. Reeder, Sunny Consolvo, Somas Thyagaraja, Alan Bettes, Helen Harris, and Jeff Grimes. “Improving SSL Warnings: Comprehension and Adherence.” In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2893–2902. Seoul, Republic of Korea: ACM, 2015.
https://doi.org/10.1145/2702123.2702442
Dowd, Mark, John McDonald, and Justin Schuh. The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities. Indianapolis, Ind: Addison-Wesley, 2007.
Sandvine. “The Global Internet Phenomena Report.” Sandvine, January 2023.
https://www.sandvine.com/hubfs/Sandvine_Redesign_2019/Downloads/2023/reports/Sandvine%20GIPR%202023.pdf
Honda, Michio, Yoshifumi Nishida, Costin Raiciu, Adam Greenhalgh, Mark Handley, and Hideyuki Tokuda. “Is It Still Possible to Extend TCP?” In Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference, 181–94. Berlin Germany: ACM, 2011.
https://doi.org/10.1145/2068816.2068834
Baset, Salman A., and Henning Schulzrinne. “An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol.” arXiv, December 4, 2004.
https://doi.org/10.48550/arXiv.cs/0412017
Floyd, Sally, and Van Jacobson. “The Synchronization of Periodic Routing Messages.” In Conference Proceedings on Communications Architectures, Protocols and Applications, 33–44. San Francisco California USA: ACM, 1993.
https://doi.org/10.1145/166237.166241
Doherty, Jim. Wireless and Mobile Device Security. 2nd edition. ISSA. Burlington, Massachusetts: Jones & Bartlett Learning, 2021.
Dwork, Cynthia. “Differential Privacy: A Survey of Results.” In Theory and Applications of Models of Computation, edited by Manindra Agrawal, Dingzhu Du, Zhenhua Duan, and Angsheng Li, 1–19. Berlin, Heidelberg: Springer, 2008.
https://doi.org/10.1007/978-3-540-79228-4_1
Kaufman, Charlie, Radia Perlman, and Michael Speciner. Network Security: Private Communication in a Public World. 2nd ed. Prentice Hall Series in Computer Networking and Distributed Systems. Upper Saddle River, NJ: Prentice Hall PTR, 2002.
McNab, Chris. Network Security Assessment: Know Your Network. 3rd ed. Sebastopol, CA: O’Reilly Media, Inc, 2017.
Saltzer, J. H., and Frans Kaashoek. “Chapter 7, Chapter 8.” In Principles of Computer System Design: An Introduction, 1st ed. Burlington, MA: Morgan Kaufmann, 2009.
Barroso, Luis, Hölzle, Urs, and Partha Ranganathan. “The Datacenter as a Computer,” 3rd edition, Springer, 2018.
Greenberg, Albert, James R. Hamilton, Navendu Jain, Srikanth Kandula, Changhoon Kim, Parantap Lahiri, David A. Maltz, Parveen Patel, and Sudipta Sengupta. “VL2: A Scalable and Flexible Data Center Network.” ACM SIGCOMM Computer Communication Review 39, no. 4 (August 16, 2009): 51–62.
https://doi.org/10.1145/1594977.1592576
Anderson, Thomas E., Susan S. Owicki, James B. Saxe, and Charles P. Thacker. “High-Speed Switch Scheduling for Local-Area Networks.” ACM Transactions on Computer Systems 11, no. 4 (1993): 319–52.
https://doi.org/10.1145/161541.161736
Kurose, James F., and Keith W. Ross. Computer Networking: A Top-down Approach. 8th edition, Global edition. Harlow: Pearson, 2022.
Chesney, Robert. “Cybersecurity Law, Policy, and Institutions (Version 3.0).” SSRN Electronic Journal 716 (August 23, 2021).
https://doi.org/10.2139/ssrn.3547103
Schwartz, Paul M. “Global Data Privacy: The EU Way.” SSRN Scholarly Paper. Rochester, NY, October 10, 2019.
https://papers.ssrn.com/abstract=3468554
Hoofnagle, Chris Jay, Bart Van Der Sloot, and Frederik Zuiderveen Borgesius. “The European Union General Data Protection Regulation: What It Is and What It Means.” Information & Communications Technology Law 28, no. 1 (January 2, 2019): 65–98.
https://doi.org/10.1080/13600834.2019.1573501
Ausloos, Jef. “Foundations of Data Protection Law.” In The Right to Erasure in EU Data Protection Law: From Individual Rights to Effective Protection, First edition. Oxford Data Protection and Privacy Law. Oxford; New York: Oxford University Press, 2020.
Lynskey, Orla. Courts, Privacy and Data Protection in the Digital Environment. Edited by Maja Brkan and Evangelia Psychogiopoulou. Edward Elgar Publishing, 2017.
Barbosa, Natã M., Zhuohao Zhang, and Yang Wang. “Do Privacy and Security Matter to Everyone? Quantifying and Clustering User-Centric Considerations about Smart Home Device Adoption.” In Proceedings of the Sixteenth USENIX Conference on Usable Privacy and Security, 417–35. SOUPS’20. USA: USENIX Association, 2020.
Nanayakkara, Priyanka, Mary Anne Smart, Rachel Cummings, Gabriel Kaptchuk, and Elissa M. Redmiles. “What Are the Chances? Explaining the Epsilon Parameter in Differential Privacy.” In Proceedings of the 32nd USENIX Conference on Security Symposium, 1613–30. SEC ’23. USA: USENIX Association, 2023.
Alma, Whitten, and J. D. Tygar. “Why Johnny Can’t Encrypt: A Usability Evaluation of PGP 5.0.” In Proceedings of the 8th USENIX Security Symposium, 169–83, 1999.
https://people.eecs.berkeley.edu/~tygar/papers/Why_Johnny_Cant_Encrypt/USENIX.pdf
Woodruff, Allison, Vasyl Pihur, Sunny Consolvo, Laura Brandimarte, and Alessandro Acquisti. “Would a Privacy Fundamentalist Sell Their DNA for $1000…If Nothing Bad Happened as a Result? The Westin Categories, Behavioral Intentions, and Consequences,” 1–18, 2014.
https://www.usenix.org/conference/soups2014/proceedings/presentation/woodruff
Kizza, Joseph Migga, ed. Ethical And Social Issues In The Information Age. 2nd ed. Texts in Computer Science. New York, NY: Springer, 2003.
https://doi.org/10.1007/b98842
Bryant, Randal E., and David R. O’Hallaron. Computer Systems: A Programmer’s Perspective Beta Version. Upper Saddle River, NJ: Prentice Hall, 2003.
Saxe, Joshua, and Hillary Sanders. Malware Data Science: Attack Detection and Attribution. San Francisco, CA: No Starch Press, 2018.
Klein, Tobias. A Bug Hunter’s Diary: A Guided Tour Through the Wilds of Software Security. 1st ed. No Starch Press, 2011.
Dang, Bruce, Alexandre Gazet, Elias Bachaalany, and Sébastien Josse. Practical Reverse Engineering: X86, X64, ARM, Windows Kernel, Reversing Tools, and Obfuscation. Indianapolis, Indiana: Wiley, 2014.
Sutton, Michael, Adam Greene, and Pedram Amini. Fuzzing: Brute Force Vulnerability Discovery. Upper Saddle River, NJ: Addison-Wesley, 2007.
Eilam, Eldad. Reversing: Secrets of Reverse Engineering. Wiley, 2005.
Wardle, Patrick. The Art of Mac Malware. No Starch Press, 2022.
Sikorski, Michael. “Practical Malware Analysis.” No Starch Press, 2012. (https://learning.oreilly.com/library/view/practical-malware-analysis/9781593272906/)
Dowd, Mark, John McDonald, and Justin Schuh. The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities. Indianapolis, Ind: Addison-Wesley, 2007.
Engebretson, Pat. The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy. Edited by David Kennedy. Second Edition. Amsterdam ; Boston: Syngress, an imprint of Elsevier, 2013.
Simpson, Michael T., and Nicholas Antill. Hands-on Ethical Hacking and Network Defense. 3rd ed. Boston, MA, USA: Cengage Learning, 2017.
Weidman, Georgia. Penetration Testing: A Hands-on Introduction to Hacking. 1st ed. San Francisco: No Starch Press, 2014.
Marvy, Julius. Cyber Security: A Complete Guide to Getting Started Learning the Fundamentals of Hacking, Penetration Testing and Basic Networking. Fortugno, 2021.
Laurence, Norman. Hacking for Beginners: A Step by Step Guide to Learn the Concept of Ethical Hacking. How to Use the Essential Command Line, Penetration Testing and Basic Security. Independently published, 2020.
Du, Wenliang. Computer Security: A Hands-on Approach. 2nd ed. Syracuse: Wenliang Du, 2019.
Treadwell, Scott, and Mian Zhou. “A Heuristic Approach for Detection of Obfuscated Malware.” In 2009 IEEE International Conference on Intelligence and Security Informatics, 291–99. Dallas, TX: IEEE, 2009.
https://doi.org/10.1109/ISI.2009.5137328
Stevens, Didier. “Malicious PDF Documents Explained.” IEEE Security & Privacy 9, no. 1 (January 2011): 80–82.
https://doi.org/10.1109/MSP.2011.14
Shin, Seungwon, and Guofei Gu. “Conficker and beyond: A Large-Scale Empirical Study.” In Proceedings of the 26th Annual Computer Security Applications Conference, 151–60. Austin Texas USA: ACM, 2010.
https://doi.org/10.1145/1920261.1920285
Egele, Manuel, Theodoor Scholte, Engin Kirda, and Christopher Kruegel. “A Survey on Automated Dynamic Malware-Analysis Techniques and Tools.” ACM Computing Surveys 44, no. 2 (2012): 1–42.
https://doi.org/10.1145/2089125.2089126
He, Liang, Yan Cai, Hong Hu, Purui Su, Zhenkai Liang, Yi Yang, Huafeng Huang, Jia Yan, Xiangkun Jia, and Dengguo Feng. “Automatically Assessing Crashes from Heap Overflows.” In 2017 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE), 274–79. Urbana, IL: IEEE, 2017.
https://doi.org/10.1109/ASE.2017.8115640
Coogan, Kevin, Gen Lu, and Saumya Debray. “Deobfuscation of Virtualization-Obfuscated Software: A Semantics-Based Approach.” In Proceedings of the 18th ACM Conference on Computer and Communications Security, 275–84. Chicago Illinois USA: ACM, 2011.
https://doi.org/10.1145/2046707.2046739
Sharif, Monirul, Andrea Lanzi, Jonathon Giffin, and Wenke Lee. “Automatic Reverse Engineering of Malware Emulators.” In 2009 30th IEEE Symposium on Security and Privacy, 94–109, 2009.
https://doi.org/10.1109/SP.2009.27
Lee, JongHyup, Thanassis Avgerinos, and David Brumley. “TIE: Principled Reverse Engineering of Types in Binary Programs.” In Network and Distributed System Security Symposium, 1471860 Bytes, 2011.
https://doi.org/10.1184/R1/6469466.V1
Sun, Mingshen, Tao Wei, and John C.S. Lui. “TaintART: A Practical Multi-Level Information-Flow Tracking System for Android RunTime.” In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 331–42. Vienna Austria: ACM, 2016.
https://doi.org/10.1145/2976749.2978343
Sikorski, Michael, and Andrew Honig. Practical Malware Analysis: The Hands-on Guide to Dissecting Malicious Software. San Francisco: No Starch Press, 2012.
Kävrestad, Joakim. Guide to Digital Forensics: A Concise and Practical Introduction. 1st ed. SpringerBriefs in Computer Science. New York, NY: Springer Berlin Heidelberg, 2017.
Easttom, Chuck, and Jeff Taylor. Computer Crime, Investigation, and the Law. 1st ed. Boston, MA: Cengage Learning PTR, 2010.
Casey, Eoghan, ed. Handbook of Digital Forensics and Investigation. Elsevier, 2010.
https://doi.org/10.1016/C2009-0-01683-3
Raggo, Michael T., and Chet Hosmer. Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols. 1st ed. Waltham, MA: Syngress, 2012.
Hayes, Darren R. A Practical Guide to Digital Forensics Investigations. Second edition. Pearson IT Cybersecurity Curriculum. Hoboken, NJ: Pearson, 2021.
Cahyani, Niken Dwi Wahyu, Nurul Hidayah Ab Rahman, William Bradley Glisson, and Kim-Kwang Raymond Choo. “The Role of Mobile Forensics in Terrorism Investigations Involving the Use of Cloud Storage Service and Communication Apps.” Mobile Networks and Applications 22, no. 2 (2017): 240–54.
https://doi.org/10.1007/s11036-016-0791-8
Quick, Darren, Ben Martini, and Kim-Kwang Raymond Choo. Cloud Storage Forensics. Elsevier, 2014.
https://doi.org/10.1016/C2013-0-09718-6
Philipp, Aaron, David Cowen, and Chris Davis. Hacking Exposed Computer Forensics. 2nd ed. New York: McGraw-Hill/Osborne, 2010.
Casey, Eoghan. “Clearly Conveying Digital Forensic Results.” Digital Investigation 24 (2018): 1–3.
https://doi.org/10.1016/j.diin.2018.03.001
Honan, Mat. “How Apple and Amazon Security Flaws Led to My Epic Hacking.” Wired, August 6, 2012.
https://www.wired.com/2012/08/apple-amazon-mat-honan-hacking/
Jagatic, Tom N., Nathaniel A. Johnson, Markus Jakobsson, and Filippo Menczer. “Social Phishing.” Communications of the ACM 50, no. 10 (October 1, 2007): 94–100.
https://doi.org/10.1145/1290958.1290968
Bonneau, Joseph, Cormac Herley, Paul C. van Oorschot, and Frank Stajano. “The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes.” In 2012 IEEE Symposium on Security and Privacy, 553–67, 2012.
https://doi.org/10.1109/SP.2012.44
Adams, Anne, and Martina Angela Sasse. “Users Are Not the Enemy.” Communications of the ACM 42, no. 12 (December 1, 1999): 40–46.
https://doi.org/10.1145/322796.322806
Morris, Robert, and Ken Thompson. “Password Security: A Case History.” Communications of the ACM 22, no. 11 (November 1, 1979): 594–97.
https://doi.org/10.1145/359168.359172
Wondracek, Gilbert, Thorsten Holz, Christian Platzer, E. Kirda, and Christopher Krügel. “Is the Internet for Porn? An Insight Into the Online Adult Industry,” 2010.
https://www.semanticscholar.org/paper/Is-the-Internet-for-Porn-An-Insight-Into-the-Online-Wondracek-Holz/943fe422f1e1b8e863be7c9496a9a9c3a63f2ecd
Anderson, Ross, Chris Barton, Rainer Böhme, Richard Clayton, Carlos Gañán, Tom Grasso, Michael Levi, Tyler Moore, and Marie Vasek. “Measuring the Changing Cost of Cybercrime.” Boston, 2019.
https://weis2019.econinfosec.org/wp-content/uploads/sites/6/2019/05/WEIS_2019_paper_25.pdf
Vasek, Marie, and Tyler Moore. “There’s No Free Lunch, Even Using Bitcoin: Tracking the Popularity and Profits of Virtual Currency Scams.” In Financial Cryptography and Data Security, edited by Rainer Böhme and Tatsuaki Okamoto, 44–61. Berlin, Heidelberg: Springer, 2015.
https://doi.org/10.1007/978-3-662-47854-7_4
Eeten, Michel J. G. van, Johannes M. Bauer, Hadi Asghari, and Shirin Tabatabaie. “The Role of Internet Service Providers in Botnet Mitigation: An Empirical Analysis Based on Spam Data.” Paris: OECD, November 12, 2010.
https://doi.org/10.1787/5km4k7m9n3vj-en
Anderson, Ross, and Tyler Moore. “Information Security: Where Computer Science, Economics and Psychology Meet.” Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 367, no. 1898 (July 13, 2009): 2717–27.
https://doi.org/10.1098/rsta.2009.0027
Lampson, Butler W. “A Note on the Confinement Problem.” Communications of the ACM 16, no. 10 (1973): 613–15.
https://doi.org/10.1145/362375.362389
Bell, David E., and Leonard J. La Padula. “Secure Computer System: Unified Exposition and Multics Interpretation.” Technical Report ESD-TR-75-306, ESD/AFSC, Hanscom AFB, Bedford, MA 01731, 1975.
Watson, Robert N. M. “A Decade of OS Access-Control Extensibility.” Communications of the ACM 56, no. 2 (2013): 52–63.
https://doi.org/10.1145/2408776.2408792
Wagner, David, and Dean Tribble. “A Security Analysis of the Combex DarpaBrowser Architecture,” March 4, 2002.
http://www.combex.com/papers/darpa-review/security-review.pdf
Bell, David E, and Leonard J. La Padula. “Secure Computer Systems: Mathematical Foundations.” ESD-TR-73-278 Electronic Systems Division, Air Force Systems Command, Hanscom AFB, Bedford, MA 01731 1 (November 1973).
https://apps.dtic.mil/sti/pdfs/AD0770768.pdf
Valasek, Chris, and Charlie Miller. “Remote Exploitation of an Unaltered Passenger Vehicle.” IOActive, 2015.
https://ioactive.com/pdfs/IOActive_Remote_Car_Hacking.pdf
Kocher, Paul, Jann Horn, Anders Fogh, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, et al. “Spectre Attacks: Exploiting Speculative Execution.” In 2019 IEEE Symposium on Security and Privacy (SP), 1–19. San Francisco, CA, USA: IEEE, 2019.
https://doi.org/10.1109/SP.2019.00002
Bond, Mike, Omar Choudary, Steven J. Murdoch, Sergei Skorobogatov, and Ross Anderson. “Chip and Skim: Cloning EMV Cards with the Pre-Play Attack.” In IEEE Symposium on Security and Privacy, 49–64. IEEE Computer Society, 2014.
Razavi, Kaveh, Ben Gras, and Erik Bosman. “Flip Feng Shui: Hammering a Needle in the Software Stack.” In Proceedings of the 25th USENIX Security Symposium, 18. Austin, TX: USENIX The Advanced Computing Systems Association, 2016.
Koscher, Karl, Alexei Czeskis, Franziska Roesner, Shwetak Patel, Tadayoshi Kohno, Stephen Checkoway, Damon McCoy, et al. “Experimental Security Analysis of a Modern Automobile.” In Proceedings of the 2010 IEEE Symposium on Security and Privacy, edited by David Evans and Giovanni Vigna, 447–62. USA: IEEE Computer Society, 2010.
Murdoch, Steven J., Saar Drimer, Ross Anderson, and Mike Bond. “Chip and PIN Is Broken.” In Proceedings of the 2010 IEEE Symposium on Security and Privacy, 433–46. SP ’10. USA: IEEE Computer Society, 2010.
https://doi.org/10.1109/SP.2010.33
Thompson, Ken. “Reflections on Trusting Trust.” Communications of the ACM 27, no. 8 (1984): 761–63.
https://doi.org/10.1145/358198.358210
Garfinkel, Simson, and Heather Richter Lipford. Usable Security: History, Themes, and Challenges. Synthesis Lectures on Information Security, Privacy, and Trust. Cham: Springer International Publishing, 2014.
https://doi.org/10.1007/978-3-031-02343-9
Anderson, Ross J. Security Engineering: A Guide to Building Dependable Distributed Systems, Second Edition. Indianapolis, Indiana: Wiley Publishing, 2008.
Macher, Jeffrey T., David C. Mowery, and Alberto Di Minin. “The ‘Non-Globalization’ of Innovation in the Semiconductor Industry.” California Management Review 50, no. 1 (2007): 217–42.
https://doi.org/10.2307/41166425
Lee, Hau, Seungjin Whang, and Shiri Shneorson. “Taiwan Semiconductor Manufacturing Co.: The Semiconductor Services Company.” Stanford Business Graduate School, May 2, 2006.
https://hbsp.harvard.edu/product/GS40-PDF-ENG
Christensen, Clayton M., Scott D. Anthony, and Erik A. Roth. “Whither Moore’s Law?: The Future of Semiconductors.” In Seeing What’s next: Using the Theories of Innovation to Predict Industry Change. Boston: Harvard Business School Press, 2004.
Grindley, Peter C., and David J. Teece. “Managing Intellectual Capital: Licensing and Cross-Licensing in Semiconductors and Electronics.” California Management Review 39, no. 2 (1997): 8–41.
https://doi.org/10.2307/41165885
Shur, Michael, and Jasprit Singh. “Physics of Semiconductor Devices.” Physics Today 43, no. 10 (October 1, 1990): 98–99.
https://doi.org/10.1063/1.2810727
Anderson, Betty Lise, and Richard L. Anderson. Fundamentals of Semiconductor Devices. Boston: McGraw-Hill Higher Education, 2005.
Ananny, Mike. “Toward an Ethics of Algorithms: Convening, Observation, Probability, and Timeliness.” Science, Technology, & Human Values 41, no. 1 (2016): 93–117.
https://doi.org/10.1177/0162243915606523
Li, Yujia, David Choi, Junyoung Chung, Nate Kushman, Julian Schrittwieser, Rémi Leblond, Tom Eccles, et al. “Competition-Level Code Generation with AlphaCode.” Science 378, no. 6624 (December 9, 2022): 1092–97.
https://doi.org/10.1126/science.abq1158
Stiennon, Nisan, Long Ouyang, Jeff Wu, Daniel M. Ziegler, Ryan Lowe, Chelsea Voss, Alec Radford, Dario Amodei, and Paul Christiano. “Learning to Summarize from Human Feedback.” arXiv, February 15, 2022.
http://arxiv.org/abs/2009.01325
Garg, Shivam, Dimitris Tsipras, Percy Liang, and Gregory Valiant. “What Can Transformers Learn In-Context? A Case Study of Simple Function Classes.” arXiv, August 11, 2023.
http://arxiv.org/abs/2208.01066
He, Junxian, Chunting Zhou, Xuezhe Ma, Taylor Berg-Kirkpatrick, and Graham Neubig. “Towards a Unified View of Parameter-Efficient Transfer Learning.” arXiv, February 2, 2022.
http://arxiv.org/abs/2110.04366
Zhang, Susan, Stephen Roller, Naman Goyal, Mikel Artetxe, Moya Chen, Shuohui Chen, Christopher Dewan, et al. “OPT: Open Pre-Trained Transformer Language Models.” arXiv, 2022.
https://doi.org/10.48550/ARXIV.2205.01068
Clark, Kevin, Minh-Thang Luong, Quoc V. Le, and Christopher D. Manning. “ELECTRA: Pre-Training Text Encoders as Discriminators Rather Than Generators.” arXiv, 2020.
https://doi.org/10.48550/ARXIV.2003.10555
Liu, Yinhan, Myle Ott, Naman Goyal, Jingfei Du, Mandar Joshi, Danqi Chen, Omer Levy, Mike Lewis, Luke Zettlemoyer, and Veselin Stoyanov. “RoBERTa: A Robustly Optimized BERT Pretraining Approach.” arXiv, July 26, 2019.
http://arxiv.org/abs/1907.11692
Radford, Alec, and Karthik Narasimhan. “Improving Language Understanding by Generative Pre-Training,” 2018.
https://www.semanticscholar.org/paper/Improving-Language-Understanding-by-Generative-Radford-Narasimhan/cd18800a0fe0b668a1cc19f2ec95b5003d0a5035
Peters, Matthew E., Mark Neumann, Mohit Iyyer, Matt Gardner, Christopher Clark, Kenton Lee, and Luke Zettlemoyer. “Deep Contextualized Word Representations.” arXiv, 2018.
https://doi.org/10.48550/ARXIV.1802.05365
Manning, Christopher D. “Human Language Understanding & Reasoning.” Daedalus 151, no. 2 (May 1, 2022): 127–38.
https://doi.org/10.1162/daed_a_01905
Hartley, Richard, and Andrew Zisserman. Multiple View Geometry in Computer Vision. 2nd ed. Cambridge, UK ; New York: Cambridge University Press, 2003.
Gonzalez, Rafael C., and Richard E. Woods. Digital Image Processing. 3rd ed. Upper Saddle River, N.J: Prentice Hall, 2008.
Sonka, Milan, Vaclav Hlavac, and Roger Boyle. Image Processing, Analysis, and Machine Vision. Fourth edition. Stamford, CT, USA: Cengage Learning, 2015.
Szeliski, Richard. Computer Vision: Algorithms and Applications. 2nd ed. Texts in Computer Science. Cham: Springer International Publishing, 2022.
https://doi.org/10.1007/978-3-030-34372-9
Khan, Salman, Hossein Rahmani, Syed Afaq Ali Shah, and Mohammed Bennamoun. A Guide to Convolutional Neural Networks for Computer Vision. Synthesis Lectures on Computer Vision. Cham: Springer International Publishing, 2018.
https://doi.org/10.1007/978-3-031-01821-3
Goodfellow, Ian, Yoshua Bengio, and Aaron Courville. Deep Learning. Adaptive Computation and Machine Learning Series. The MIT Press, 2016.
Forsyth, David, and Jean Ponce. Computer Vision: A Modern Approach. 2nd ed. Boston: Pearson, 2012.
Bishop, Christopher M. Pattern Recognition and Machine Learning. Information Science and Statistics. New York: Springer, 2006.
Tambe, Prasanna, Peter Cappelli, and Valery Yakubovich. “Artificial Intelligence in Human Resources Management: Challenges and a Path Forward.” California Management Review 61, no. 4 (2019): 15–42.
https://doi.org/10.1177/0008125619867910
Chui, Michael, Martin Harrysson, James Manyika, Roger Roberts, Rita Chung, Pieter Nel, and Ashley van Heteren. “Applying AI for Social Good | McKinsey.” McKinsey Global Institute, December 2018.
https://www.mckinsey.com/featured-insights/artificial-intelligence/applying-artificial-intelligence-for-social-good
Thomas, Rachel. “What Do Machine Learning Practitioners Actually Do?” fast.ai, July 12, 2018.
https://www.fast.ai/posts/2018-07-12-auto-ml-1.html
Brynjolfsson, Erik, Daniel Rock, and Prasanna Tambe. “How Will Machine Learning Transform the Labor Market?” Hoover Institution, May 6, 2019.
https://www.hoover.org/research/how-will-machine-learning-transform-labor-market
Stevens, Nikki, and Os Keyes. “Seeing Infrastructure: Race, Facial Recognition and the Politics of Data.” Cultural Studies 35, no. 4–5 (September 3, 2021): 833–53.
https://doi.org/10.1080/09502386.2021.1895252
Silbey, Jessica, and Woodrow Hartzog. “The Upside of Deep Fakes.” Maryland Law Review 78, no. 4 (2019).
https://digitalcommons.law.umaryland.edu/cgi/viewcontent.cgi?article=3837&context=mlr
Franks, Mary Anne, and Ari Ezra Waldman. “Sex, Lies, and Videotape: Deep Fakes and Free Speech Delusions.” Maryland Law Review 78, no. 4 (2019).
https://digitalcommons.law.umaryland.edu/cgi/viewcontent.cgi?article=3835&context=mlr
Malhi, Mehhma. “To See No Longer Means to Believe: The Harms and Benefits of Deepfake.” THE ETHICS CENTRE (blog), February 18, 2022.
https://ethics.org.au/to-see-no-longer-means-to-believe-the-harms-and-benefits-of-deepfake/
Rini, Regina, and Leah Cohen. “Deepfakes, Deep Harms.” Journal of Ethics and Social Philosophy 22, no. 2 (July 26, 2022).
https://doi.org/10.26556/jesp.v22i2.1628
De Ruiter, Adrienne. “The Distinct Wrong of Deepfakes.” Philosophy & Technology 34, no. 4 (December 2021): 1311–32.
https://doi.org/10.1007/s13347-021-00459-2
Luca, Michael, Jon Kleinberg, and Sendhil Mullainathan. “Algorithms Need Managers, Too.” Harvard Business Review, January 2016.
https://hbr.org/2016/01/algorithms-need-managers-too
Kania, Elsa B. “Battlefield Singularity: Artificial Intelligence, Military Revolution, and China’s Future Military Power.” Center for a New American Security (CNAS), November 2017.
https://s3.amazonaws.com/files.cnas.org/documents/Battlefield-Singularity-November-2017.pdf
Harris, Elisa D., Robert Rosner, James M. Acton, and Herbert Lin. “Governance of Information Technology and Cyber Weapons.” In Governance of Dual-Use Technologies: Theory and Practice. Cambridge, Mass.: American Academy of Arts and Sciences, 2016.
https://www.amacad.org/sites/default/files/publication/downloads/GNF_Dual-Use-Technology.pdf
Buchanan, Ben. The Cybersecurity Dilemma. Vol. 1. Oxford University Press, 2017.
https://doi.org/10.1093/acprof:oso/9780190665012.001.0001
Sayler, Kelley M., and Daniel S. Hoadley. “Artificial Intelligence and National Security.” Congressional Research Service (CRS), November 10, 2020.
https://sgp.fas.org/crs/natsec/R45178.pdf
Horowitz, Michael C. “Artificial Intelligence, International Competition, and the Balance of Power (May 2018).” Texas National Security Review, 2018.
https://doi.org/10.15781/T2639KP49
Scharre, Paul. Army of None: Autonomous Weapons and the Future of War. First edition. New York ; London: W. W. Norton & Company, 2018.
Danzig, Richard. “TECHNOLOGY ROULETTE: Managing Loss of Control as Many Militaries Pursue Technological Superiority.” Center for a New American Security (CNAS), June 2018.
http://files.cnas.org/documents/CNASReport-Technology-Roulette-DoSproof2v2.pdf?mtime=20180628072101
Bostrom, Nick. “Decisive Strategic Advantage”, “Multipolar Scenarios”, and “The Strategic Picture.” In Superintelligence: Paths, Dangers, Strategies, 1st ed. Oxford: Oxford University Press, 2014.
Murphy, Kevin P. Machine Learning: A Probabilistic Perspective. Adaptive Computation and Machine Learning Series. Cambridge, Mass.: The MIT Press, 2012.
Kelleher, John D., Brian Mac Namee, and Aoife D’Arcy. Fundamentals of Machine Learning for Predictive Data Analytics: Algorithms, Worked Examples, and Case Studies. 2nd ed. Cambridge, Massachusetts: The MIT Press, 2020.
Solanas, Agusti, and Antoni Martínez-Ballesté. Advances in Artificial Intelligence for Privacy Protection and Security. Vol. 1. Intelligent Information Systems. WORLD SCIENTIFIC, 2009.
https://doi.org/10.1142/6707
Han, Jiawei, Micheline Kamber, and Jian Pei. Data Mining: Concepts and Techniques. 3rd ed. Waltham, MA: Morgan Kaufmann Publishers, 2012.
Witten, Ian H., Frank Eibe, and Mark A. Hall. Data Mining: Practical Machine Learning Tools and Techniques. 3rd ed. The Morgan Kaufmann Series in Data Management Systems. Burlington, MA: Morgan Kaufmann Publishers, 2011.
Gendreau, Michel, and Jean-Yves Potvin, eds. Handbook of Metaheuristics. 2nd ed. International Series in Operations Research & Management Science 1460. New York: Springer, 2010.
Brownlee, Jason. Clever Algorithms: Nature-Inspired Programming Recipes. Revision 2. s.l.: LuLu.com, 2012.
Zhang, David, Guangming Lu, and Lei Zhang. Advanced Biometrics. 1st ed. Cham: Springer International Publishing, 2018.
https://doi.org/10.1007/978-3-319-61545-5
Jain, Anil K., Arun A. Ross, and Karthik Nandakumar. Introduction to Biometrics. New York, NY: Springer, 2011.
Chio, Clarence, and David Freeman. Machine Learning and Security: Protecting Systems with Data and Algorithms. First edition. Sebastopol, CA: O’Reilly Media, 2018.
Wang, Bolun, Yuanshun Yao, Bimal Viswanath, Haitao Zheng, and Ben Y. Zhao. “With Great Training Comes Great Vulnerability: Practical Attacks against Transfer Learning.” In Proceedings of the 27th USENIX Conference on Security Symposium, 1281–97. SEC’18. USA: USENIX Association, 2018.
Anderson, Hyrum S., Jonathan Woodbridge, and Bobby Filar. “DeepDGA: Adversarially-Tuned Domain Generation and Detection.” arXiv, 2016.
https://doi.org/10.48550/ARXIV.1610.01969
Shirazi, Hossein, Bruhadeshwar Bezawada, Indrakshi Ray, and Charles Anderson. “Adversarial Sampling Attacks Against Phishing Detection.” In Data and Applications Security and Privacy XXXIII, edited by Simon N. Foley, 11559:83–101. Cham: Springer International Publishing, 2019.
https://doi.org/10.1007/978-3-030-22479-0_5
Erba, Alessandro, Riccardo Taormina, Stefano Galelli, Marcello Pogliani, Michele Carminati, Stefano Zanero, and Nils Ole Tippenhauer. “Constrained Concealment Attacks against Reconstruction-Based Anomaly Detectors in Industrial Control Systems.” In Annual Computer Security Applications Conference, 480–95, 2020.
https://doi.org/10.1145/3427228.3427660
Kuleshov, Volodymyr, Shantanu Thakoor, Tingfung Lau, and Stefano Ermon. “Adversarial Examples for Natural Language Classification Problems,” February 15, 2018.
https://openreview.net/forum?id=r1QZ3zbAZ
Demetrio, Luca, Battista Biggio, Giovanni Lagorio, Fabio Roli, and Alessandro Armando. “Explaining Vulnerabilities of Deep Learning to Adversarial Malware Binaries.” arXiv, 2019.
https://doi.org/10.48550/ARXIV.1901.03583
Kuppa, Aditya, Slawomir Grzonkowski, Muhammad Rizwan Asghar, and Nhien-An Le-Khac. “Black Box Attacks on Deep Anomaly Detectors.” In Proceedings of the 14th International Conference on Availability, Reliability and Security, 1–10. Canterbury CA United Kingdom: ACM, 2019.
https://doi.org/10.1145/3339252.3339266
Gibert, Daniel, Carles Mateu, and Jordi Planes. “The Rise of Machine Learning for Detection and Classification of Malware: Research Developments, Trends and Challenges.” Journal of Network and Computer Applications 153 (2020): 102526.
https://doi.org/10.1016/j.jnca.2019.102526
Rosenberg, Ihai, Asaf Shabtai, Yuval Elovici, and Lior Rokach. “Adversarial Machine Learning Attacks and Defense Methods in the Cyber Security Domain.” arXiv, March 13, 2021.
https://doi.org/10.48550/arXiv.2007.02407
Grira, Nizar, and M. Crucianu. “Unsupervised and Semi-Supervised Clustering : A Brief Survey,” 2004.
https://www.semanticscholar.org/paper/Unsupervised-and-Semi-supervised-Clustering-%3A-a-%E2%88%97-Grira-Crucianu/acb799150e4cd3a75fe79ca262047612bd8e5194
Olteanu, Alexandra, Carlos Castillo, Fernando Diaz, and Emre Kıcıman. “Social Data: Biases, Methodological Pitfalls, and Ethical Boundaries.” Frontiers in Big Data 2 (July 11, 2019): 13.
https://doi.org/10.3389/fdata.2019.00013
Mehrabi, Ninareh, Fred Morstatter, Nanyun Peng, and Aram Galstyan. “Debiasing Community Detection: The Importance of Lowly-Connected Nodes.” arXiv, 2019.
https://doi.org/10.48550/ARXIV.1903.08136
Fortunato, Santo, and Darko Hric. “Community Detection in Networks: A User Guide.” Physics Reports 659 (2016): 1–44.
https://doi.org/10.1016/j.physrep.2016.09.002
Zhao, Jieyu, Tianlu Wang, Mark Yatskar, Vicente Ordonez, and Kai-Wei Chang. “Men Also Like Shopping: Reducing Gender Bias Amplification Using Corpus-Level Constraints.” arXiv, 2017.
https://doi.org/10.48550/ARXIV.1707.09457
Mehrabi, Ninareh, Fred Morstatter, Nripsuta Saxena, Kristina Lerman, and Aram Galstyan. “A Survey on Bias and Fairness in Machine Learning.” ACM Computing Surveys 54, no. 6 (July 13, 2021): 1–35.
https://doi.org/10.1145/3457607
Wachter, Sandra, Brent Mittelstadt, and Luciano Floridi. “Why a Right to Explanation of Automated Decision-Making Does Not Exist in the General Data Protection Regulation.” International Data Privacy Law 7, no. 2 (2017): 76–99.
https://doi.org/10.1093/idpl/ipx005
Bostrom, Nick. Superintelligence: Paths, Dangers, Strategies. Oxford, United Kingdom ; New York, NY: Oxford University Press, 2016.
European Commission for the Efficiency of Justice (CEPEJ). “European Ethical Charter on the Use of Artificial Intelligence in judicial Systems and Their Environment.” Adopted at the 31st plenary meeting of the CEPEJ (Strasbourg): CEPEJ, December 3-4, 2018.
https://rm.coe.int/ethical-charter-en-for-publication-4-december-2018/16808f699c
Brownsword, Roger, Eloise Scotford, and Karen Yeung, eds. “Leta Jones, Meg and Jason Millar, ‘Hacking Metaphors in the Anticipatory Governance of Emerging Technology: The Case of Regulating Robots.’” In The Oxford Handbook of Law, Regulation and Technology, Vol. 1. Oxford University Press, 2016.
https://doi.org/10.1093/oxfordhb/9780199680832.001.0001
Guadamuz, Andres. “Do Androids Dream of Electric Copyright? Comparative Analysis of Originality in Artificial Intelligence Generated Works.” Intellectual Property Quarterly 2017, no. 2 (February 9, 2017): 169–86.
https://sussex.figshare.com/articles/journal_contribution/Do_androids_dream_of_electric_copyright_Comparative_analysis_of_originality_in_artificial_intelligence_generated_works/23441399/1
Independent High-Level Expert Group on Artificial Intelligence Set up by the European Commission: Set up by the European Commission. “Ethics Guidelines For Trustworthy AI,” April 8, 2019.
https://www.aepd.es/sites/default/files/2019-12/ai-ethics-guidelines.pdf
Leenes, Ronald, Erica Palmerini, Bert-Jaap Koops, Andrea Bertolini, Pericle Salvini, and Federica Lucivero. “Regulatory Challenges of Robotics: Some Guidelines for Addressing Legal and Ethical Issues.” Law, Innovation and Technology 9, no. 1 (January 2, 2017): 1–44.
https://doi.org/10.1080/17579961.2017.1304921
Calo, Ryan. “Artificial Intelligence Policy: A Roadmap.” SSRN Electronic Journal, 2017.
https://doi.org/10.2139/ssrn.3015350
Sutton, Richard S., and Andrew G. Barto. Reinforcement Learning: An Introduction. Second edition. Adaptive Computation and Machine Learning Series. Cambridge, Massachusetts: The MIT Press, 2018.
Theodoridis, Sergios, and Konstantinos Koutroumbas. Pattern Recognition. 4th ed. Burlington Heidelberg: Academic Press, 2009.
Zhang, Aston, Zachary C. Lipton, Mu Li, and Alexander J. Smola. “Dive into Deep Learning.” arXiv, August 22, 2023.
http://arxiv.org/abs/2106.11342
Nielsen, Michael A. Neural Networks and Deep Learning, 2019.
http://neuralnetworksanddeeplearning.com
Tunstall, Lewis, Leandro von Werra, and Thomas Wolf. Natural Language Processing with Transformers: Building Language Applications with Hugging Face. First edition. Sebastopol, CA: O’Reilly Media, 2022.
Rao, Delip, and Brian McMahan. Natural Language Processing with PyTorch: Build Intelligent Language Applications Using Deep Learning. First edition. Sebastopol, CA: O’Reilly Media, 2019.
Goodfellow, Ian, Yoshua Bengio, and Aaron Courville. Deep Learning. Adaptive Computation and Machine Learning Series. The MIT Press, 2016.
Goldberg, Yoav. “A Primer on Neural Network Models for Natural Language Processing.” arXiv, 2015.
https://doi.org/10.48550/ARXIV.1510.00726
Eisenstein, Jacob. Introduction to Natural Language Processing. Adaptive Computation and Machine Learning. The MIT Press, 2019.
Jurafsky, Daniel, and James H. Martin. Speech and Language Processing: An Introduction to Natural Language Processing, Computational Linguistics, and Speech Recognition. Prentice Hall Series in Artificial Intelligence. Upper Saddle River, N.J: Prentice Hall, 2000.
Kochenderfer, Mykel J., Tim A. Wheeler, and Kyle H. Wray. Algorithms for Decision Making. Cambridge, Massachusetts: The MIT Press, 2022.
Agarwal, Alekh, Nan Jiang, and S. Kakade. “Reinforcement Learning: Theory and Algorithms,” 2019.
https://www.semanticscholar.org/paper/Reinforcement-Learning%3A-Theory-and-Algorithms-Agarwal-Jiang/8ef87e938b53c7f3ffdf47dfc317aa9b82848535
Bertsekas, Dimitri P. Reinforcement Learning and Optimal Control. 2nd printing (includes editorial revisions). Belmont, Massachusetts: Athena Scientific, 2019.
Barber, David. Bayesian Reasoning and Machine Learning. 1st ed. Cambridge University Press, 2012.
https://doi.org/10.1017/CBO9780511804779
MacKay, David J.C. Information Theory, Inference, and Learning Algorithms. Cambridge University Press, 2003.
Bishop, Christopher M. Pattern Recognition and Machine Learning. Information Science and Statistics. New York: Springer, 2006.
Mohri, Mehryar, Afshin Rostamizadeh, and Ameet Talwalkar. “Introduction.” In Foundations of Machine Learning, 504. The MIT Press, 2018.
https://mitpress.mit.edu/9780262039406/foundations-of-machine-learning/
Murphy, Kevin P. “Chapter 24: Markov Chain Monte Carlo (MCMC) Inference” and “Chapter 25: Clustering.” In Machine Learning A Probabilistic Perspective. London, England: The MIT Press, 2012.
Wyner, Abraham J., Matthew Olson, Justin Bleich, and David Mease. “Explaining the Success of AdaBoost and Random Forests as Interpolating Classifiers.” arXiv, April 29, 2017.
http://arxiv.org/abs/1504.07676
Hastie, Trevor, Robert Tibshirani, and Jerome Friedman. The Elements of Statistical Learning: Data Mining, Inference, and Prediction. 2nd ed. Springer Series in Statistics. New York, NY: Springer New York, 2009.
https://doi.org/10.1007/978-0-387-84858-7
Wasserman, Larry. All of Statistics: A Concise Course in Statistical Inference. Springer Texts in Statistics. New York, NY: Springer New York, 2004.
https://doi.org/10.1007/978-0-387-21736-9
Géron, Aurélien. Hands-on Machine Learning with Scikit-Learn, Keras and TensorFlow: Concepts, Tools, and Techniques to Build Intelligent Systems. 2nd ed. Sebastopol, CA: O’Reilly, 2019.
Artasanchez, Alberto, and Prateek Joshi. Artificial Intelligence with Python: Your Complete Guide to Building Intelligent Apps Using Python 3.x. Second edition. Birmingham Mumbai: Packt, 2020.
Beazley, David M., and Brian K. Jones. Python Cookbook. Third edition. Sebastopol, CA: O’Reilly, 2013.
Holm, Elizabeth A. “In Defense of the Black Box.” Science 364, no. 6435 (April 5, 2019): 26–27.
https://doi.org/10.1126/science.aax0162
Suresh, Harini, and J. Guttag. “A Framework for Understanding Unintended Consequences of Machine Learning.” ArXiv, January 28, 2019.
https://www.semanticscholar.org/paper/A-Framework-for-Understanding-Unintended-of-Machine-Suresh-Guttag/61c425bdda0e053074e96c3e6761ff1d7e0dd469
Miller, Alex P. “Want Less-Biased Decisions? Use Algorithms.” Harvard Business Review, July 26, 2018.
https://hbr.org/2018/07/want-less-biased-decisions-use-algorithms
Crawford, Kate. “The Hidden Biases in Big Data.” Harvard Business Review, April 1, 2013.
https://hbr.org/2013/04/the-hidden-biases-in-big-data
Hao, Karen. “When Algorithms Mess up, the Nearest Human Gets the Blame.” MIT Technology Review, May 28, 2019.
https://www.technologyreview.com/2019/05/28/65748/ai-algorithms-liability-human-blame/
Boddington, Paula. Towards a Code of Ethics for Artificial Intelligence. Artificial Intelligence: Foundations, Theory, and Algorithms. Cham: Springer International Publishing, 2017.
https://doi.org/10.1007/978-3-319-60648-4
Dignum, Virginia. “Responsible Artificial Intelligence: Designing Ai for Human Values,” 2017.
https://www.semanticscholar.org/paper/Responsible-Artificial-Intelligence%3A-Designing-Ai-Dignum/c9fd2a6b240caf3d18f641d5956e71cbd29930e3
Wallach, Wendell, and Colin Allen. Moral Machines. Oxford University Press, 2009.
https://doi.org/10.1093/acprof:oso/9780195374049.001.0001
Lin, Patrick, and Keith Abney, eds. Robot Ethics 2.0: From Autonomous Cars to Artifical Intelligence. New York, NY: Oxford University Press, 2017.
Russell, Stuart J., and Peter Norvig. Artificial Intelligence: A Modern Approach. 4th ed. Pearson Series in Artificial Intelligence. Hoboken: Pearson, 2021.
Brachman, Ronald J., and Hector J. Levesque. Knowledge Representation and Reasoning. Amsterdam ; Boston: Morgan Kaufmann, 2004.
Marsland, Stephen. Machine Learning: An Algorithmic Perspective. Chapman & Hall/CRC Machine Learning & Pattern Recognition Series. Boca Raton: CRC Press, 2009.
Poole, David L., and Alan K. Mackworth. Artificial Intelligence: Foundations of Computational Agents. 2nd ed. Cambridge University Press, 2017.
https://doi.org/10.1017/9781108164085