Cross Reference Up

Arshadi, L and Jahangir, AH (2014). Benford's law behavior of Internet traffic. Journal of Network and Computer Applications, Volume 40, April 2014, pp. 194–205.

This work is cited by the following items of the Benford Online Bibliography:

Note that this list may be incomplete, and is currently being updated. Please check again at a later date.


Gauvrit, N, Houillon, J-C and Delahaye, J-P (2017). Generalized Benford’s Law as a Lie Detector. Advances in Cognitive Psychology 13(2), pp. 121-127. DOI:10.5709/acp-0212-x. View Complete Reference Online information Works that this work references Works that reference this work
Gottwalt, F, Waller, A and Liu, W (2016). Natural Laws as a Baseline for Network Anomaly Detection. In: Proceedings of 2016 IEEE Trustcom/BigDataSE/ISPA, pp. 370-377. DOI:10.1109/TrustCom.2016.0086. View Complete Reference Online information Works that this work references No Bibliography works reference this work
Iorliam, A, Tirunagari, S, Ho, ATS, Li, S, Waller, A and Poh, N (2017). "Flow Size Difference" Can Make a Difference: Detecting Malicious TCP Network Flows Based on Benford's Law. arXiv:1609.04214v2 [cs.CR], last accessed February 6, 2017. View Complete Reference Online information Works that this work references No Bibliography works reference this work
Miller, SJ (ed.) (2015). Benford's Law: Theory and Applications. Princeton University Press: Princeton and Oxford. ISSN/ISBN:978-0-691-14761-1. View Complete Reference Online information Works that this work references Works that reference this work