Cross Reference Up

Sethi, K, Kumar, R, Prajapati, N and Bera, P (2020). A Lightweight Intrusion Detection System using Benford's Law and Network Flow Size Difference. Proceedings of 2020 International Conference on COMmunication Systems NETworkS (COMSNETS).

This work is cited by the following items of the Benford Online Bibliography:

Note that this list may be incomplete, and is currently being updated. Please check again at a later date.


Fernandes, P, Ciardhuáin, SÓ and Antunes, M (2024). Unveiling Malicious Network Flows Using Benford’s Law. Mathematics 12(15), p. 2299. DOI:10.3390/math12152299. View Complete Reference Online information Works that this work references Works that reference this work
Fernandes, P, Ó Ciardhuáin, S and Antunes, M (2024). Uncovering Manipulated Files Using Mathematical Natural Laws. In: Vasconcelos, V., Domingues, I., Paredes, S. (eds) Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications. CIARP 2023. Lecture Notes in Computer Science, vol 14469. Springer, Cham . DOI:10.1007/978-3-031-49018-7_4. View Complete Reference Online information Works that this work references Works that reference this work
Mbona, I and Eloff, JHP (2022). Detecting Zero-day intrusion attacks using semi-supervised machine learning approaches. IEEE Access. DOI:10.1109/ACCESS.2022.3187116. View Complete Reference Online information Works that this work references Works that reference this work
Swain, M, Nishitha, CL, Maganti, M, Sethi, K and Tripathi, N (2025). Leveraging Benford’s Law for Effective Intrusion Detection in MQTT-IoT Networks. In: Proceedings of 2025 17th International Conference on COMmunication Systems & NETworkS (COMSNETS), pp. 348-355. DOI:10.1109/COMSNETS63942.2025.10885615. View Complete Reference Online information Works that this work references No Bibliography works reference this work