Maurus, S and Plant, C (2017). Let's See Your Digits: Anomalous-State Detection using Benford's Law. Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, August 2017, pp. 977–986.
This work cites the following items of the Benford Online Bibliography:
Alexander, J (2009). Remarks on the use of Benford's law. Social Science Research Network (November 13, 2009). Available at SSRN: http://ssrn.com/abstract=1505147 or . DOI:10.2139/ssrn.1505147.
|
![View Complete Reference View Complete Reference](http://www.benfordonline.net/assets/images/icons/viewcompletereference.gif) |
|
|
|
Asadi, AN (2015). An approach for detecting anomalies by assessing the inter-arrival time of UDP packets and flows using Benford's law. 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI), Tehran, pp. 257-262. DOI:10.1109/KBEI.2015.7436057.
|
![View Complete Reference View Complete Reference](http://www.benfordonline.net/assets/images/icons/viewcompletereference.gif) |
|
|
|
Benford, F (1938). The law of anomalous numbers. Proceedings of the American Philosophical Society, Vol. 78, No. 4 (Mar. 31, 1938), pp. 551-572.
|
![View Complete Reference View Complete Reference](http://www.benfordonline.net/assets/images/icons/viewcompletereference.gif) |
|
|
|
Berger, A and Hill, TP (2011). Benford's Law Strikes Back: No Simple Explanation in Sight for Mathematical Gem. The Mathematical Intelligencer 33(1), pp. 85-91. DOI:10.1007/ s00283-010-9182-3.
|
![View Complete Reference View Complete Reference](http://www.benfordonline.net/assets/images/icons/viewcompletereference.gif) |
|
|
|
Berger, A and Hill, TP (2015). An Introduction to Benford's Law. Princeton University Press: Princeton, NJ. ISSN/ISBN:9780691163062.
|
![View Complete Reference View Complete Reference](http://www.benfordonline.net/assets/images/icons/viewcompletereference.gif) |
|
|
|
Golbeck, J (2015). Benford’s Law Applies to Online Social Networks. PLoS ONE 10(8): e0135169. DOI:10.1371/journal.pone.0135169.
|
![View Complete Reference View Complete Reference](http://www.benfordonline.net/assets/images/icons/viewcompletereference.gif) |
|
|
|
Iorliam, A, Ho, ATS, Poh, N, Tirunagari, S and Bours, P (2015). Data forensic techniques using
Benford’s law and Zipf’s law for keystroke dynamics. In: Proceedings of 3rd International Workshop on
Biometrics and Forensics (IWBF 2015). IEEE, pp. 1–6. DOI:10.1109/IWBF.2015.7110238.
|
![View Complete Reference View Complete Reference](http://www.benfordonline.net/assets/images/icons/viewcompletereference.gif) |
|
|
|
Nigrini, MJ (2012). Benford's Law: Applications for Forensic Accounting, Auditing, and Fraud Detection . John Wiley & Sons: Hoboken, New Jersey. ISSN/ISBN:978-1-118-15285-0. DOI:10.1002/9781119203094.
|
![View Complete Reference View Complete Reference](http://www.benfordonline.net/assets/images/icons/viewcompletereference.gif) |
|
|
|