1. Anderson, R. , & Kuhn, M. (1997). Low cost attacks on tamper resistant devices. In International Workshop on Security Protocols (Springer, Berlin, Heidelberg), 125–136.
2. Baig, K. , Mohamed, R. , Theus, A. L. , & Chiasson, S. (2020). “I’m hoping they’re an ethical company that won’t do anything that I’ll regret” Users Perceptions of At-home DNA Testing Companies. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, 1–13.
3. Berger, K. M. , & Roderick, J. (2014). National and transnational security implications of big data in the life sciences. New York, NY: American Association for the Advancement of Science.
4. National and transnational security implications of asymmetric access to and use of biological data;Frontiers in bioengineering and biotechnology,2019
5. Wild patterns: Ten years after the rise of adversarial machine learning;Pattern Recognition,2018