Asadi, AN (2015). An approach for detecting anomalies by assessing the inter-arrival time of UDP packets and flows using Benford's law. 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI), Tehran, pp. 257-262. DOI:10.1109/KBEI.2015.7436057.
|
 |
|
|
|
Benford, F (1938). The law of anomalous numbers. Proceedings of the American Philosophical Society, Vol. 78, No. 4 (Mar. 31, 1938), pp. 551-572.
|
 |
|
|
|
Durtschi, C, Hillison, W and Pacini, C (2004). The effective use of Benford’s law to assist in detecting fraud in accounting data. Journal of Forensic Accounting 1524-5586/Vol. V, pp. 17-34.
|
 |
|
|
|
Fu, D, Shi, YQ and Su, W (2007). A generalized Benford’s law for JPEG coefficients and its applications in image forensics. Proceedings of SPIE, Volume 6505, Security, Steganography and Watermarking of Multimedia Contents IX, San Jose, California, January 28 - February 1, 2007, pp. 65051L-65051L-11. DOI:10.1117/12.704723.
|
 |
|
|
|
Hill, TP (1995). A Statistical Derivation of the Significant-Digit Law. Statistical Science 10(4), pp. 354-363. ISSN/ISBN:0883-4237.
|
 |
|
|
|
Iorliam, A, Tirunagari, S, Ho, ATS, Li, S, Waller, A and Poh, N (2017). "Flow Size Difference" Can Make a Difference: Detecting Malicious TCP Network Flows Based on Benford's Law. arXiv:1609.04214v2 [cs.CR], last accessed February 6, 2017.
|
 |
|
|
|
Newcomb, S (1881). Note on the frequency of use of the different digits in natural numbers. American Journal of Mathematics 4(1), pp. 39-40. ISSN/ISBN:0002-9327. DOI:10.2307/2369148.
|
 |
|
|
|
Nigrini, MJ (2012). Benford's Law: Applications for Forensic Accounting, Auditing, and Fraud Detection . John Wiley & Sons: Hoboken, New Jersey. ISSN/ISBN:978-1-118-15285-0. DOI:10.1002/9781119203094.
|
 |
|
|
|
Sambridge, M, Tkalčić, H and Jackson, A (2010). Benford's law in the Natural Sciences. Geophysical Research Letters 37: L22301. DOI:10.1029/2010GL044830.
|
 |
|
|
|
Sun, L, Ho, ATS, Xia, Z, Chen, J, Huang, X and Zhang, Y (2017). Detection and Classification of Malicious Patterns In Network Traffic Using Benford’s Law. 2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC), Kuala Lumpur, pp. 864-872. DOI:10.1109/APSIPA.2017.8282154.
|
 |
|
|
|