Cross Reference Up

Prandl, S (2017). PEIMA: Harnessing Power Laws to Detect Malicious Activities from Denial of Service to Intrusion Detection Traffic Analysis and Beyond. Black Hat USA.

This work is cited by the following items of the Benford Online Bibliography:

Note that this list may be incomplete, and is currently being updated. Please check again at a later date.


Bareja, K (2022). Benford's Law: Managing Insider Threat Program. LinkedIn blog. View Complete Reference Online information Works that this work references No Bibliography works reference this work
Hajdarevic, K, Pattinson, C and Besic, I (2022). Improving Learning Skills in Detection of Denial of Service Attacks with Newcombe - Benford's Law using Interactive Data Extraction and Analysis. TEM Journal 11(2), pp. 527-534. ISSN/ISBN:2217-8309. DOI:10.18421/TEM112-05. View Complete Reference Online information Works that this work references Works that reference this work
Kessel, E (2020). Benford’s law: Potential applications for insider threat detection. Carnegie Mellon University, Software Engineering Institute's Insights (SEI) Blog, last accessed 3 March 2023. View Complete Reference Online information Works that this work references Works that reference this work
McCarville, D (2021). A data transformation process for using Benford’s Law with bounded data. Preprint [version 1; peer review: awaiting peer review], Emerald Open Research 3(29). DOI:10.35241/emeraldopenres.14374.1. View Complete Reference Online information Works that this work references No Bibliography works reference this work
Reese, M (2019). Why Cyber Security Should Care About Benford's Law . LinkedIn blog. View Complete Reference Online information Works that this work references Works that reference this work