Arshadi, L and Jahangir, AH (2014). Benford's law behavior of Internet traffic. Journal of Network and Computer Applications, Volume 40, April 2014, pp. 194–205. ISSN/ISBN:1084-8045. DOI:10.1016/j.jnca.2013.09.007.
|
|
|
|
|
Asadi, AN (2015). An approach for detecting anomalies by assessing the inter-arrival time of UDP packets and flows using Benford's law. 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI), Tehran, pp. 257-262. DOI:10.1109/KBEI.2015.7436057.
|
|
|
|
|
Benford, F (1938). The law of anomalous numbers. Proceedings of the American Philosophical Society, Vol. 78, No. 4 (Mar. 31, 1938), pp. 551-572.
|
|
|
|
|
Iorliam, A, Tirunagari, S, Ho, ATS, Li, S, Waller, A and Poh, N (2017). "Flow Size Difference" Can Make a Difference: Detecting Malicious TCP Network Flows Based on Benford's Law. arXiv:1609.04214v2 [cs.CR], last accessed February 6, 2017.
|
|
|
|
|
Jasak, Z and Banjanovic-Mehmedovic, L (2008). Detecting Anomalies by Benford's Law. In Proceedings of IEEE International Symposium on Signal Processing and Information Technology, 2008. ISSPIT 2008, pp. 453-458 . ISSN/ISBN:978-1-4244-3554-8. DOI:10.1109/ISSPIT.2008.4775660.
|
|
|
|
|
Li, XH, Zhao, YQ, Liao, M, Shih, FY and Shi, YQ (2012). Detection of tampered region for JPEG images by using mode-based first digit features. EURASIP Journal on Advances in Signal Processing, 2012:190. DOI:10.1186/1687-6180-2012-190.
|
|
|
|
|
Nigrini, MJ (1992). The Detection of Income Tax Evasion Through an Analysis of Digital Frequencies. PhD thesis, University of Cincinnati, OH, USA.
|
|
|
|
|
Sambridge, M, Tkalčić, H and Jackson, A (2010). Benford's law in the Natural Sciences. Geophysical Research Letters 37: L22301. DOI:10.1029/2010GL044830.
|
|
|
|
|