The Narrow Interpretation of the Computer Fraud and Abuse Act: A User Guide for Applying United States v. Nosal, PDF Jonathan Mayer George Washington Law Review, November 2016,
Characterizing and Avoiding Routing Detours Through Surveillance States, PDF Anne Edmundson, Roya Ensafi, Nick Feamster, Jennifer Rexford May 2016,
Evaluating the privacy properties of telephone metadata, PDF Proceedings of the National Academy of Sciences, National Academy of Sciences, May 2016,