Bibliography

  1. 37 Signals. “Aggressive, spiky button vs. rounded corner button,” Signal vs. Noise, April 5, 2010, https://37signals.com/svn/posts/2255-aggressive-spiky-button-vs-rounded-corner-button.
  2. Abi-Antoun, Marwan, and Jonathan Aldrich. “Static Extraction and Conformance Analysis of Hierarchical Runtime Architectural Structure Using Annotations.” In ACM SIGPLAN Notices, vol. 44, no. 10, pp. 321–40 (ACM, 2009).
  3. Abi-Antoun, Marwan, and Jeffrey M. Barnes. “Analyzing Security Architectures,” Proceedings of the IEEE/ACM International Conference on Automated Software Engineering, pp. 3–12 (ACM, 2010).
  4. Acquisti, Alessandro, Ralph Gross, and Fred Stutzman. “Faces of Facebook: Or, How the Largest Real ID Database in the World Came to Be.” BlackHat USA, August, 2011. Draft available online at http://www.heinz.cmu.edu/˜acquisti/face-recognition-study-FAQ/acquisti-faces-BLACKHAT-draft.pdf.
  5. Adams, A. A., and S. A. Williams, “What's Yours Is Mine and What's Mine's My Own,” unpublished draft, May 8, 2012, http://opendepot.org/id/eprint/1096.
  6. Adams, Scott, Dilbert cartoon, published November 13, 1995, http://thedilbertstore.com/comic_strips/1995/11/13.
  7. Adida, Ben, et al. “CALEA II: Risks of Wiretap Modifications to Endpoints,” Center for Democracy and Technology, May 17 2013, https://www.cdt.org/files/pdfs/CALEAII-techreport.pdf.
  8. Adler, Andy. “Images Can Be Regenerated from Quantized Biometric Match Score Data,” Electrical and Computer Engineering, Canadian Conference on, vol. 1, pp. 469–72 ...

Get Threat Modeling: Designing for Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.