Cross Reference Down

Mbona, I and Eloff, JHP (2022). Detecting Zero-day intrusion attacks using semi-supervised machine learning approaches. IEEE Access.

This work cites the following items of the Benford Online Bibliography:


Aleksandrova, EB, Lavrova, DS and Yarmak, AV (2019). Benford’s Law in the Detection of DoS Attacks on Industrial Systems. Automatic Control and Computer Sciences 53(8), pp. 954–962. DOI:10.3103/S0146411619080030. View Complete Reference Online information Works that this work references Works that reference this work
Arshadi, L and Jahangir, AH (2014). Benford's law behavior of Internet traffic. Journal of Network and Computer Applications, Volume 40, April 2014, pp. 194–205. ISSN/ISBN:1084-8045. DOI:10.1016/j.jnca.2013.09.007. View Complete Reference Online information Works that this work references Works that reference this work
Druica, E, Oancea, B and Valsan, C (2018). Benford's law and the limits of digit analysis. International Journal of Accounting Information Systems 31, pp. 75–82. DOI:10.1016/j.accinf.2018.09.004. View Complete Reference Online information Works that this work references Works that reference this work
Iorliam, A (2019). Natural Laws (Benford’s Law and Zipf’s Law) for Network Traffic Analysis. In: Cybersecurity in Nigeria. SpringerBriefs in Cybersecurity. Springer, Cham, pp. 3-22. ISSN/ISBN:978-3-030-15210-9. DOI:10.1007/978-3-030-15210-9_2. View Complete Reference Online information Works that this work references Works that reference this work
Iorliam, A, Tirunagari, S, Ho, ATS, Li, S, Waller, A and Poh, N (2017). "Flow Size Difference" Can Make a Difference: Detecting Malicious TCP Network Flows Based on Benford's Law. arXiv:1609.04214v2 [cs.CR], last accessed February 6, 2017. View Complete Reference Online information Works that this work references Works that reference this work
Mbona, I and Eloff, JHP (2021). Evaluating a Semi-Supervised Intrusion Detection Algorithm Through Benford's Law. The 2021 World Congress in Computer Science, Computer Engineering, and Applied Computing; CSCE 2021 Book of Abstracts, p. 106. View Complete Reference Online information No Bibliography works referenced by this work. Works that reference this work
Miller, SJ (ed.) (2015). Benford's Law: Theory and Applications. Princeton University Press: Princeton and Oxford. ISSN/ISBN:978-0-691-14761-1. View Complete Reference Online information Works that this work references Works that reference this work
Nigrini, MJ (2011). Forensic Analytics: Methods and Techniques for Forensic Accounting Investigations. John Wiley & Sons: Hoboken, New Jersey; (2nd edition published in 2020, isbn 978-1-119-58576-3). ISSN/ISBN:978-0-470-89046-2. View Complete Reference Online information Works that this work references Works that reference this work
Sethi, K, Kumar, R, Prajapati, N and Bera, P (2020). A Lightweight Intrusion Detection System using Benford's Law and Network Flow Size Difference. Proceedings of 2020 International Conference on COMmunication Systems NETworkS (COMSNETS). DOI:10.1109/COMSNETS48256.2020.9027422. View Complete Reference Online information Works that this work references Works that reference this work
Sun, L, Ho, A, Xia, Z, Chen, J and Zhang, M (2019). Development of an Early Warning System for Network Intrusion Detection Using Benford’s Law Features. In: Meng W., Furnell S. (eds) Security and Privacy in Social Networks and Big Data. SocialSec 2019. Communications in Computer and Information Science, vol 1095. Springer, Singapore. DOI:10.1007/978-981-15-0758-8_5. View Complete Reference Online information Works that this work references Works that reference this work