Cross Reference Down

Iorliam, A (2019). Natural Laws (Benford’s Law and Zipf’s Law) for Network Traffic Analysis. In: Cybersecurity in Nigeria. SpringerBriefs in Cybersecurity. Springer, Cham, pp. 3-22.

This work cites the following items of the Benford Online Bibliography:


Arshadi, L and Jahangir, AH (2014). Benford's law behavior of Internet traffic. Journal of Network and Computer Applications, Volume 40, April 2014, pp. 194–205. ISSN/ISBN:1084-8045. DOI:10.1016/j.jnca.2013.09.007. View Complete Reference Online information Works that this work references Works that reference this work
Benford, F (1938). The law of anomalous numbers. Proceedings of the American Philosophical Society, Vol. 78, No. 4 (Mar. 31, 1938), pp. 551-572. View Complete Reference Online information No Bibliography works referenced by this work. Works that reference this work
Cristelli, M, Batty, M and Pietronero, L (2012). There is more than a power law in Zipf. Scientific Reports 2:812. DOI:10.1038/srep00812. View Complete Reference Online information Works that this work references Works that reference this work
Durtschi, C, Hillison, W and Pacini, C (2004). The effective use of Benford’s law to assist in detecting fraud in accounting data. Journal of Forensic Accounting 1524-5586/Vol. V, pp. 17-34. View Complete Reference Online information Works that this work references Works that reference this work
Fu, D, Shi, YQ and Su, W (2007). A generalized Benford’s law for JPEG coefficients and its applications in image forensics. Proceedings of SPIE, Volume 6505, Security, Steganography and Watermarking of Multimedia Contents IX, San Jose, California, January 28 - February 1, 2007, pp. 65051L-65051L-11. DOI:10.1117/12.704723. View Complete Reference Online information Works that this work references Works that reference this work
Hill, TP (1995). Base-Invariance Implies Benford's Law. Proceedings of the American Mathematical Society 123(3), pp. 887-895. ISSN/ISBN:0002-9939. DOI:10.2307/2160815. View Complete Reference Online information Works that this work references Works that reference this work
Huang, SM, Yen, DC, Yang, LW and Hua, JS (2008). An investigation of Zipf's Law for fraud detection. Decision Support Systems 46(1), pp. 70-83. DOI:10.1016/j.dss.2008.05.003. View Complete Reference Online information Works that this work references Works that reference this work
Iorliam, A, Ho, ATS, Poh, N, Tirunagari, S and Bours, P (2015). Data forensic techniques using 
Benford’s law and Zipf’s law for keystroke dynamics. In: Proceedings of 3rd International Workshop on 
Biometrics and Forensics (IWBF 2015). IEEE, pp. 1–6. DOI:10.1109/IWBF.2015.7110238. View Complete Reference Online information Works that this work references Works that reference this work
Li, XH, Zhao, YQ, Liao, M, Shih, FY and Shi, YQ (2012). Detection of tampered region for JPEG images by using mode-based first digit features. EURASIP Journal on Advances in Signal Processing, 2012:190. DOI:10.1186/1687-6180-2012-190. View Complete Reference Online information Works that this work references Works that reference this work
Nigrini, MJ and Mittermaier, LJ (1997). The use of Benford's Law as an aid in analytical procedures. Auditing - A Journal of Practice & Theory 16(2), 52-67. ISSN/ISBN:0278-0380. View Complete Reference Online information Works that this work references Works that reference this work
Perez-Gonzalez, F, Heileman, GL and Abdallah, CT (2007). Benford's Law in Image Processing. Image Processing, pp I-405 - I-408. ICIP 2007. IEEE International Conference. ISSN/ISBN:1522-4880. DOI:10.1109/ICIP.2007.4378977. View Complete Reference Online information Works that this work references Works that reference this work
Sambridge, M, Tkalčić, H and Jackson, A (2010). Benford's law in the Natural Sciences. Geophysical Research Letters 37: L22301. DOI:10.1029/2010GL044830. View Complete Reference Online information Works that this work references Works that reference this work
Tao, T (2009). Benford’s law, Zipf’s law, and the Pareto distribution . Terence Tao's math blog site. View Complete Reference Online information No Bibliography works referenced by this work. Works that reference this work
Xu, B, Wang, J, Liu, G and Dai, Y (2011). Photorealistic computer graphics forensics based on leading digit law. Journal of Electronics (China) 28(1) pp. 95-100. DOI:10.1007/s11767-011-0474-3. View Complete Reference Online information Works that this work references Works that reference this work