Maurus, S and Plant, C (2017). Let's See Your Digits: Anomalous-State Detection using Benford's Law. Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, August 2017, pp. 977–986.
This work cites the following items of the Benford Online Bibliography:
Alexander, J (2009). Remarks on the use of Benford's law. Social Science Research Network (November 13, 2009). Available at SSRN: http://ssrn.com/abstract=1505147 or . DOI:10.2139/ssrn.1505147.
|
|
|
|
|
Asadi, AN (2015). An approach for detecting anomalies by assessing the inter-arrival time of UDP packets and flows using Benford's law. 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI), Tehran, pp. 257-262. DOI:10.1109/KBEI.2015.7436057.
|
|
|
|
|
Benford, F (1938). The law of anomalous numbers. Proceedings of the American Philosophical Society, Vol. 78, No. 4 (Mar. 31, 1938), pp. 551-572.
|
|
|
|
|
Berger, A and Hill, TP (2011). Benford's Law Strikes Back: No Simple Explanation in Sight for Mathematical Gem. The Mathematical Intelligencer 33(1), pp. 85-91. DOI:10.1007/ s00283-010-9182-3.
|
|
|
|
|
Berger, A and Hill, TP (2015). An Introduction to Benford's Law. Princeton University Press: Princeton, NJ. ISSN/ISBN:9780691163062.
|
|
|
|
|
Golbeck, J (2015). Benford’s Law Applies to Online Social Networks. PLoS ONE 10(8): e0135169. DOI:10.1371/journal.pone.0135169.
|
|
|
|
|
Iorliam, A, Ho, ATS, Poh, N, Tirunagari, S and Bours, P (2015). Data forensic techniques using
Benford’s law and Zipf’s law for keystroke dynamics. In: Proceedings of 3rd International Workshop on
Biometrics and Forensics (IWBF 2015). IEEE, pp. 1–6. DOI:10.1109/IWBF.2015.7110238.
|
|
|
|
|
Nigrini, MJ (2012). Benford's Law: Applications for Forensic Accounting, Auditing, and Fraud Detection . John Wiley & Sons: Hoboken, New Jersey. ISSN/ISBN:978-1-118-15285-0. DOI:10.1002/9781119203094.
|
|
|
|
|