Cross Reference Up

Huang, SM, Yen, DC, Yang, LW and Hua, JS (2008). An investigation of Zipf's Law for fraud detection. Decision Support Systems 46(1), pp. 70-83.

This work is cited by the following items of the Benford Online Bibliography:

Note that this list may be incomplete, and is currently being updated. Please check again at a later date.


Bhattacharya, S, Xu, D and Kumar, K (2010). An ANN-based auditor decision support system using Benford's Law. Decision support systems, 50 (3), pp. 576-584. View Complete Reference Online information Works that this work references Works that reference this work
Cerqueti, R, Maggi, M and Riccioni, J (2022). Statistical methods for decision support systems in finance: how Benford’s law predicts financial risk. Annals of Operations Research. DOI:10.1007/s10479-022-04742-z. View Complete Reference Online information Works that this work references No Bibliography works reference this work
Costa, JI (2012). Desenvolvimento de metodologias contabilométricas aplicadas a auditoria contábil digital: uma proposta de análise da lei de Newcomb-Benford para os Tribunais de Contas. Thesis, Universidade Federal de Pernambuco, Recife, Brasil. POR View Complete Reference Online information Works that this work references Works that reference this work
Gottwalt, F, Waller, A and Liu, W (2016). Natural Laws as a Baseline for Network Anomaly Detection. In: Proceedings of 2016 IEEE Trustcom/BigDataSE/ISPA, pp. 370-377. DOI:10.1109/TrustCom.2016.0086. View Complete Reference Online information Works that this work references Works that reference this work
Horton, J, Kumar, DK and Wood, A (2020). Detecting academic fraud using Benford law: The case of Professor James Hunton. Research Policy 49(8), 104084 . DOI:10.1016/j.respol.2020.104084. View Complete Reference Online information Works that this work references Works that reference this work
Iorliam, A (2019). Combination of Natural Laws (Benford’s Law and Zipf’s Law) for Fake News Detection. In: Cybersecurity in Nigeria. SpringerBriefs in Cybersecurity. Springer, Cham. DOI:10.1007/978-3-030-15210-9_3. View Complete Reference Online information Works that this work references No Bibliography works reference this work
Iorliam, A (2019). Natural Laws (Benford’s Law and Zipf’s Law) for Network Traffic Analysis. In: Cybersecurity in Nigeria. SpringerBriefs in Cybersecurity. Springer, Cham, pp. 3-22. ISSN/ISBN:978-3-030-15210-9. DOI:10.1007/978-3-030-15210-9_2. View Complete Reference Online information Works that this work references Works that reference this work
Iorliam, A, Ho, ATS, Poh, N, Tirunagari, S and Bours, P (2015). Data forensic techniques using 
Benford’s law and Zipf’s law for keystroke dynamics. In: Proceedings of 3rd International Workshop on 
Biometrics and Forensics (IWBF 2015). IEEE, pp. 1–6. DOI:10.1109/IWBF.2015.7110238. View Complete Reference Online information Works that this work references Works that reference this work
Odueke, A and Weir, GRS (2012). Triage in Forensic Accounting using Zipf's Law. Issues in Cybercrime, Security and Digtal Forensics. Edited by G. R. S. Weir and A. Al-Nemrat. Glasgow. University of Strathclyde Publishing, pp. 33-43. View Complete Reference Online information Works that this work references Works that reference this work
Parnes, D (2022). Banks’ Off-Balance Sheet Manipulations. Quarterly Review of Economics and Finance. DOI:10.1016/j.qref.2022.07.011. View Complete Reference Online information Works that this work references Works that reference this work
Pérez-Melián, JA, Conejero, JA and Ferri, C (2017). Zipf's and Benford's laws in Twitter hashtags. Proceedings of the Student Research Workshop at the 15th Conference of the European Chapter of the Association for Computational Linguistics. DOI:10.18653/v1/E17-4009. View Complete Reference Online information Works that this work references No Bibliography works reference this work
Prandl, S, Lazarescu, M, Pham, DS, Soh, ST and Kak, S (2017). An Investigation of Power Law Probability Distributions for Network Anomaly Detection. 2017 IEEE Security and Privacy Workshops (SPW), pp. 217-222, . DOI:10.1109/SPW.2017.20. View Complete Reference Online information Works that this work references Works that reference this work