Cross Reference Down

Sun, L, Ho, ATS, Xia, Z, Chen, J, Huang, X and Zhang, Y (2017). Detection and Classification of Malicious Patterns In Network Traffic Using Benford’s Law. 2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC), Kuala Lumpur, pp. 864-872.

This work cites the following items of the Benford Online Bibliography:


Asadi, AN (2015). An approach for detecting anomalies by assessing the inter-arrival time of UDP packets and flows using Benford's law. 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI), Tehran, pp. 257-262. DOI:10.1109/KBEI.2015.7436057. View Complete Reference Online information Works that this work references Works that reference this work
Beebe, NHF (2018). A bibliography of publications about Benford's law, Heap's law and Zipf's law. Available online from: ftp://ftp.math.utah.edu/public_html/public_html/ pub/tex/bib/benfords-law.pdf (last accessed July 16, 2021). View Complete Reference Online information No Bibliography works referenced by this work. Works that reference this work
Benford, F (1938). The law of anomalous numbers. Proceedings of the American Philosophical Society, Vol. 78, No. 4 (Mar. 31, 1938), pp. 551-572. View Complete Reference Online information No Bibliography works referenced by this work. Works that reference this work
Berger, A and Hill, TP (2011). A basic theory of Benford's Law . Probability Surveys 8, pp. 1-126. DOI:10.1214/11-PS175. View Complete Reference Online information Works that this work references Works that reference this work
Del Acebo, E and Sbert, M (2005). Benford's Law for Natural and Synthetic Images. Proc. of the First Workshop on Computational Aesthetics in Graphics, Visualization and Imaging, L. Neumann, M. Sbert, B. Gooch, and W. Purgathofer, Eds., Girona, Spain, May 2005, pp. 169–176. ISSN/ISBN:1816-0859. DOI:10.2312/COMPAESTH/COMPAESTH05/169-176. View Complete Reference Online information Works that this work references Works that reference this work
Fu, D, Shi, YQ and Su, W (2007). A generalized Benford’s law for JPEG coefficients and its applications in image forensics. Proceedings of SPIE, Volume 6505, Security, Steganography and Watermarking of Multimedia Contents IX, San Jose, California, January 28 - February 1, 2007, pp. 65051L-65051L-11. DOI:10.1117/12.704723. View Complete Reference Online information Works that this work references Works that reference this work
Hill, TP (1995). A Statistical Derivation of the Significant-Digit Law. Statistical Science 10(4), pp. 354-363. ISSN/ISBN:0883-4237. View Complete Reference Online information Works that this work references Works that reference this work
Iorliam, A, Tirunagari, S, Ho, ATS, Li, S, Waller, A and Poh, N (2017). "Flow Size Difference" Can Make a Difference: Detecting Malicious TCP Network Flows Based on Benford's Law. arXiv:1609.04214v2 [cs.CR], last accessed February 6, 2017. View Complete Reference Online information Works that this work references Works that reference this work
Li, B, Shi, YQ and Huang, J (2008). Detecting doubly compressed JPEG images by using mode based first digit features. Proceedings of 2008 IEEE 10th Workshop on Multimedia Signal Processing, pp. 730–735. DOI:10.1109/MMSP.2008.4665171. View Complete Reference Online information Works that this work references Works that reference this work
Li, XH, Zhao, YQ, Liao, M, Shih, FY and Shi, YQ (2012). Detection of tampered region for JPEG images by using mode-based first digit features. EURASIP Journal on Advances in Signal Processing, 2012:190. DOI:10.1186/1687-6180-2012-190. View Complete Reference Online information Works that this work references Works that reference this work
Newcomb, S (1881). Note on the frequency of use of the different digits in natural numbers. American Journal of Mathematics 4(1), pp. 39-40. ISSN/ISBN:0002-9327. DOI:10.2307/2369148. View Complete Reference Online information No Bibliography works referenced by this work. Works that reference this work
Nigrini, MJ (1992). The Detection of Income Tax Evasion Through an Analysis of Digital Frequencies. PhD thesis, University of Cincinnati, OH, USA. View Complete Reference Online information Works that this work references Works that reference this work
Orita, M, Hagiwara, Y, Moritomo, A, Tsunoyama, K, Watanabe, T and Ohno, K (2013). Agreement of drug discovery data with Benford's law. Expert Opinion on Drug Discovery 8(1), pp. 1-5. DOI:10.1517/17460441.2013.740007. View Complete Reference Online information Works that this work references Works that reference this work
Qadir, G, Zhao, X and Ho, ATS (2010). Estimating JPEG2000 Compression for Image Forensics Using the Benford’s Law. Proc. of SPIE Vol. 7723, pp. 77230J1 -77230J10. DOI:10.1117/12.855085. View Complete Reference Online information Works that this work references Works that reference this work
Sambridge, M, Tkalčić, H and Jackson, A (2010). Benford's law in the Natural Sciences. Geophysical Research Letters 37: L22301. DOI:10.1029/2010GL044830. View Complete Reference Online information Works that this work references Works that reference this work