Cross Reference Up

Hamadeh, N (2004). Wireless Security and Traffic Modeling Using Benford's Law. Master’s Thesis, University of New Mexico, Albuquerque, NM, 2004 (99 pgs).

This work is cited by the following items of the Benford Online Bibliography:

Note that this list may be incomplete, and is currently being updated. Please check again at a later date.


Bareja, K (2022). Benford's Law: Managing Insider Threat Program. LinkedIn blog. View Complete Reference Online information Works that this work references No Bibliography works reference this work
Iorliam, A, Tirunagari, S, Ho, ATS, Li, S, Waller, A and Poh, N (2017). "Flow Size Difference" Can Make a Difference: Detecting Malicious TCP Network Flows Based on Benford's Law. arXiv:1609.04214v2 [cs.CR], last accessed February 6, 2017. View Complete Reference Online information Works that this work references Works that reference this work
Reese, M (2019). Why Cyber Security Should Care About Benford's Law . LinkedIn blog. View Complete Reference Online information Works that this work references Works that reference this work