Bibliography

  1. 37 Signals. “Aggressive, spiky button vs. rounded corner button,” Signal vs. Noise, April 5, 2010, https://37signals.com/svn/posts/2255-aggressive-spiky-button-vs-rounded-corner-button.
  2. Abi-Antoun, Marwan, and Jonathan Aldrich. “Static Extraction and Conformance Analysis of Hierarchical Runtime Architectural Structure Using Annotations.” In ACM SIGPLAN Notices, vol. 44, no. 10, pp. 321–40 (ACM, 2009).
  3. Abi-Antoun, Marwan, and Jeffrey M. Barnes. “Analyzing Security Architectures,” Proceedings of the IEEE/ACM International Conference on Automated Software Engineering, pp. 3–12 (ACM, 2010).
  4. Acquisti, Alessandro, Ralph Gross, and Fred Stutzman. “Faces of Facebook: Or, How the Largest Real ID Database in the World Came to Be.” BlackHat USA, August, 2011. Draft available online at http://www.heinz.cmu.edu/~acquisti/face-recognition-study-FAQ/acquisti-faces-BLACKHAT-draft.pdf.
  5. Adams, A. A., and S. A. Williams, “What’s Yours Is Mine and What’s Mine’s My Own,” unpublished draft, May 8, 2012, http://opendepot.org/id/eprint/1096.
  6. Adams, Scott, Dilbert cartoon, published November 13, 1995, http://thedilbertstore.com/comic_strips/1995/11/13.
  7. Adida, Ben, et al. “CALEA II: Risks of Wiretap Modifications to Endpoints,” Center for Democracy and Technology, May 17 2013, https://www.cdt.org/files/pdfs/CALEAII-techreport.pdf.
  8. Adler, Andy. “Images Can Be Regenerated from Quantized Biometric Match Score Data,” Electrical and Computer Engineering, Canadian Conference on, vol. 1, pp. 469–72 ...

Get Threat Modeling now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.