Arshadi, L and Jahangir, AH (2014). Benford's law behavior of Internet traffic. Journal of Network and Computer Applications, Volume 40, April 2014, pp. 194–205. ISSN/ISBN:10848045. DOI:10.1016/j.jnca.2013.09.007.





Beebe, NHF (2012). Newcomb, Benford, Pareto, Heaps, and Zipf Are arbitrary numbers random?. Posted on StudyLib, January 12, 2012.





Benford, F (1938). The law of anomalous numbers. Proceedings of the American Philosophical Society, Vol. 78, No. 4 (Mar. 31, 1938), pp. 551572.





Berger, A and Hill, TP (2011). Benford's Law Strikes Back: No Simple Explanation in Sight for Mathematical Gem. The Mathematical Intelligencer 33(1), pp. 8591. DOI:10.1007/ s0028301091823.





Cristelli, M, Batty, M and Pietronero, L (2012). There is more than a power law in Zipf. Scientific Reports 2:812. DOI:10.1038/srep00812.





Del Acebo, E and Sbert, M (2005). Benford's Law for Natural and Synthetic Images. Proc. of the First Workshop on Computational Aesthetics in Graphics, Visualization and Imaging, L. Neumann, M. Sbert, B. Gooch, and W. Purgathofer, Eds., Girona, Spain, May 2005, pp. 169–176. ISSN/ISBN:18160859. DOI:10.2312/COMPAESTH/COMPAESTH05/169176.





Durtschi, C, Hillison, W and Pacini, C (2004). The effective use of Benford’s law to assist in detecting fraud in accounting data. Journal of Forensic Accounting 15245586/Vol. V, pp. 1734.





Fewster, RM (2009). A Simple Explanation of Benford's Law. American Statistician 63(1), pp. 2632. DOI:10.1198/tast.2009.0005.





Fu, D, Shi, YQ and Su, W (2007). A generalized Benford’s law for JPEG coefficients and its applications in image forensics. Proceedings of SPIE, Volume 6505, Security, Steganography and Watermarking of Multimedia Contents IX, San Jose, California, January 28  February 1, 2007, pp. 65051L65051L11. DOI:10.1117/12.704723.





Golbeck, J (2015). Benford’s Law Applies to Online Social Networks. PLoS ONE 10(8): e0135169. DOI:10.1371/journal.pone.0135169.





Hildebrandt, M and Dittmann, J (2015). Benford’s Law based detection of latent fingerprint forgeries on the example of artificial sweat printed fingerprints captured by confocal laser scanning microscopes. In: Proceedings SPIE 9409, Media Watermarking, Security, and Forensics 94090A (4 March 2015). DOI:10.1117/12.2077531.





Hill, TP (1995). A Statistical Derivation of the SignificantDigit Law. Statistical Science 10(4), pp. 354363. ISSN/ISBN:08834237.





Hill, TP (1995). BaseInvariance Implies Benford's Law. Proceedings of the American Mathematical Society 123(3), pp. 887895. ISSN/ISBN:00029939. DOI:10.2307/2160815.





Iorliam, A, Ho, ATS, Poh, N and Shi, YQ (2014). Do Biometric Images Follow Benford's Law?. Proceedings of the 22nd European Signal Processing Conf.(Eusipco). DOI:10.1109/IWBF.2014.6914261.





Iorliam, A, Ho, ATS, Poh, N, Tirunagari, S and Bours, P (2015). Data forensic techniques using
Benford’s law and Zipf’s law for keystroke dynamics. In: Proceedings of 3rd International Workshop on
Biometrics and Forensics (IWBF 2015). IEEE, pp. 1–6. DOI:10.1109/IWBF.2015.7110238.





Jolion, JM (2001). Images and Benford's Law. Journal of Mathematical Imaging and Vision 14(1), pp. 7381. ISSN/ISBN:09249907. DOI:10.1023/A:1008363415314.





Kreuzer, M, Jordan, D, Antkowiak, B, Drexler, B, Kochs, EF and Schneider, G (2014). Brain electrical activity obeys Benford's law. Anesth. Analg. 118(1), pp. 18391. DOI:10.1213/ANE.0000000000000015.





Lee, J, Cho, WKT and Judge, GG (2009). Stigler’s approach to recovering the distribution of first significant digits in natural data sets. CUDARE Working Papers, Dept. of Agricultural and Resource Economics, UC Berkeley.





Li, B, Shi, YQ and Huang, J (2008). Detecting doubly compressed JPEG images by using mode based first digit features. Proceedings of 2008 IEEE 10th Workshop on Multimedia Signal Processing, pp. 730–735. DOI:10.1109/MMSP.2008.4665171.





Li, XH, Zhao, YQ, Liao, M, Shih, FY and Shi, YQ (2012). Detection of tampered region for JPEG images by using modebased first digit features. EURASIP Journal on Advances in Signal Processing, 2012:190. DOI:10.1186/168761802012190.





Logan, JL and Goudsmit, SA (1978). The First Digit Phenomenon. Proceedings of the American Philosophical Society 122(4), pp. 193197. ISSN/ISBN:0003049X.





Newcomb, S (1881). Note on the frequency of use of the different digits in natural numbers. American Journal of Mathematics 4(1), pp. 3940. ISSN/ISBN:00029327. DOI:10.2307/2369148.





Nigrini, MJ (1996). A taxpayer compliance application of Benford’s law. Journal of the American Taxation Association 18(1), pp. 7291.





PerezGonzalez, F, Heileman, GL and Abdallah, CT (2007). Benford's Law in Image Processing. Image Processing, pp I405  I408. ICIP 2007. IEEE International Conference. ISSN/ISBN:15224880. DOI:10.1109/ICIP.2007.4378977.





Pietronero, L, Tosatti, E, Tosatti, V and Vespignani, A (2001). Explaining the uneven distribution of numbers in nature: the laws of Benford and Zipf. Physica A  Statistical Mechanics and its Applications 293(12), 297304. ISSN/ISBN:03784371. DOI:10.1016/S03784371(00)006336.





Pinkham, RS (1961). On the Distribution of First Significant Digits. Annals of Mathematical Statistics 32(4), pp. 12231230. ISSN/ISBN:00034851.





Qadir, G, Zhao, X and Ho, ATS (2010). Estimating JPEG2000 Compression for Image Forensics Using the
Benford’s Law. Proc. of SPIE Vol. 7723, pp. 77230J1 77230J10. DOI:10.1117/12.855085.





Tao, T (2009). Benford’s law, Zipf’s law, and the Pareto distribution
. Terence Tao's math blog site.





Tong, SF, Zhang, Z, Xie, Y and Wu, X (2013). Image Splicing Detection Based on Statistical Properties of Benford Model. Proceedings of the 2nd
International Conference on Computer Science and Electronics Engineering (ICCSEE 2013), pp. 07920795. ISSN/ISBN:9789078677611. DOI:10.2991/iccsee.2013.200.





Wallace, WA (2002). Assessing the quality of data used for benchmarking and decisionmaking. The Journal of Government Financial Management 51(3), pp. 1622.





Weisstein, EW (2009). Benford's Law. MathWorld (A Wolfram Web Resource).





Xu, B, Wang, J, Liu, G and Dai, Y (2011). Photorealistic computer graphics forensics based on leading digit law. Journal of Electronics (China) 28(1) pp. 95100. DOI:10.1007/s1176701104743.





Zhao, X, Ho, ATS and Shi, YQ (2009). Image forensics using generalised Benford's Law for accurate detection of unknown JPEG compression in watermarked images. 16th International Conference on Digital Signal Processing, July 2009, pp. 18. DOI:10.1109/ICDSP.2009.5201261.




