This work is cited by the following items of the Benford Online Bibliography:
Bhattacharya, S, Xu, D and Kumar, K (2010). An ANN-based auditor decision support system using Benford's Law. Decision support systems, 50 (3), pp. 576-584. | ||||
Cerqueti, R, Maggi, M and Riccioni, J (2022). Statistical methods for decision support systems in finance: how Benford’s law predicts financial risk. Annals of Operations Research. DOI:10.1007/s10479-022-04742-z. | ||||
Costa, JI (2012). Desenvolvimento de metodologias contabilométricas aplicadas a auditoria contábil digital: uma proposta de análise da lei de Newcomb-Benford para os Tribunais de Contas. Thesis, Universidade Federal de Pernambuco, Recife, Brasil. POR | ||||
Gottwalt, F, Waller, A and Liu, W (2016). Natural Laws as a Baseline for Network Anomaly Detection. In: Proceedings of 2016 IEEE Trustcom/BigDataSE/ISPA, pp. 370-377. DOI:10.1109/TrustCom.2016.0086. | ||||
Horton, J, Kumar, DK and Wood, A (2020). Detecting academic fraud using Benford law: The case of Professor James Hunton. Research Policy 49(8), 104084 . DOI:10.1016/j.respol.2020.104084. | ||||
Iorliam, A (2019). Combination of Natural Laws (Benford’s Law and Zipf’s Law) for Fake News Detection. In: Cybersecurity in Nigeria. SpringerBriefs in Cybersecurity. Springer, Cham. DOI:10.1007/978-3-030-15210-9_3. | ||||
Iorliam, A (2019). Natural Laws (Benford’s Law and Zipf’s Law) for Network Traffic Analysis. In: Cybersecurity in Nigeria. SpringerBriefs in Cybersecurity. Springer, Cham, pp. 3-22. ISSN/ISBN:978-3-030-15210-9. DOI:10.1007/978-3-030-15210-9_2. | ||||
Iorliam, A, Ho, ATS, Poh, N, Tirunagari, S and Bours, P (2015). Data forensic techniques using Benford’s law and Zipf’s law for keystroke dynamics. In: Proceedings of 3rd International Workshop on Biometrics and Forensics (IWBF 2015). IEEE, pp. 1–6. DOI:10.1109/IWBF.2015.7110238. | ||||
Odueke, A and Weir, GRS (2012). Triage in Forensic Accounting using Zipf's Law. Issues in Cybercrime, Security and Digtal Forensics. Edited by G. R. S. Weir and A. Al-Nemrat. Glasgow. University of Strathclyde Publishing, pp. 33-43. | ||||
Parnes, D (2022). Banks’ Off-Balance Sheet Manipulations. Quarterly Review of Economics and Finance. DOI:10.1016/j.qref.2022.07.011. | ||||
Pérez-Melián, JA, Conejero, JA and Ferri, C (2017). Zipf's and Benford's laws in Twitter hashtags. Proceedings of the Student Research Workshop at the 15th Conference of the European Chapter of the Association for Computational Linguistics. DOI:10.18653/v1/E17-4009. | ||||
Prandl, S, Lazarescu, M, Pham, DS, Soh, ST and Kak, S (2017). An Investigation of Power Law Probability Distributions for Network Anomaly Detection. 2017 IEEE Security and Privacy Workshops (SPW), pp. 217-222, . DOI:10.1109/SPW.2017.20. |