Prandl, S, Lazarescu, M, Pham, DS, Soh, ST and Kak, S (2017). An Investigation of Power Law Probability Distributions for Network Anomaly Detection. 2017 IEEE Security and Privacy Workshops (SPW), pp. 217-222, .
This work cites the following items of the Benford Online Bibliography:
Arshadi, L and Jahangir, AH (2014). Benford's law behavior of Internet traffic. Journal of Network and Computer Applications, Volume 40, April 2014, pp. 194–205. ISSN/ISBN:1084-8045. DOI:10.1016/j.jnca.2013.09.007.
|
|
|
|
|
Huang, SM, Yen, DC, Yang, LW and Hua, JS (2008). An investigation of Zipf's Law for fraud detection. Decision Support Systems 46(1), pp. 70-83. DOI:10.1016/j.dss.2008.05.003.
|
|
|
|
|
Lesperance, M, Reed, WJ, Stephens, MA, Tsao, C and Wilton, B (2016). Assessing Conformance with Benford’s Law: Goodness-Of-Fit Tests and Simultaneous Confidence Intervals. PLoS One 11(3): e0151235; published online 2016 Mar 28. DOI:10.1371/journal.pone.0151235.
|
|
|
|
|
Pietronero, L, Tosatti, E, Tosatti, V and Vespignani, A (2001). Explaining the uneven distribution of numbers in nature: the laws of Benford and Zipf. Physica A - Statistical Mechanics and its Applications 293(1-2), 297-304. ISSN/ISBN:0378-4371. DOI:10.1016/S0378-4371(00)00633-6.
|
|
|
|
|