Cross Reference Up

Sun, L, Ho, ATS, Xia, Z, Chen, J, Huang, X and Zhang, Y (2017). Detection and Classification of Malicious Patterns In Network Traffic Using Benford’s Law. 2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC), Kuala Lumpur, pp. 864-872.

This work is cited by the following items of the Benford Online Bibliography:

Note that this list may be incomplete, and is currently being updated. Please check again at a later date.


Hajdarevic, K, Pattinson, C and Besic, I (2022). Improving Learning Skills in Detection of Denial of Service Attacks with Newcombe - Benford's Law using Interactive Data Extraction and Analysis. TEM Journal 11(2), pp. 527-534. ISSN/ISBN:2217-8309. DOI:10.18421/TEM112-05. View Complete Reference Online information Works that this work references Works that reference this work
Pahuja, D (2021). Application of Benford’s Law to Detect if COVID-19 Data is under Reported or Manipulated. In: Rahul Srivastava & Aditya Kumar Singh Pundir (eds.), New Frontiers in Communication and Intelligent Systems, pp. 85–91. Computing & Intelligent Systems, SCRS, India . DOI:10.52458/978-81-95502-00-4-11. View Complete Reference Online information Works that this work references Works that reference this work
Sun, L, Ho, A, Xia, Z, Chen, J and Zhang, M (2019). Development of an Early Warning System for Network Intrusion Detection Using Benford’s Law Features. In: Meng W., Furnell S. (eds) Security and Privacy in Social Networks and Big Data. SocialSec 2019. Communications in Computer and Information Science, vol 1095. Springer, Singapore. DOI:10.1007/978-981-15-0758-8_5. View Complete Reference Online information Works that this work references Works that reference this work