This work cites the following items of the Benford Online Bibliography:
Arshadi, L and Jahangir, AH (2014). Benford's law behavior of Internet traffic. Journal of Network and Computer Applications, Volume 40, April 2014, pp. 194–205. ISSN/ISBN:1084-8045. DOI:10.1016/j.jnca.2013.09.007. | ||||
Berger, A and Hill, TP (2015). An Introduction to Benford's Law. Princeton University Press: Princeton, NJ. ISSN/ISBN:9780691163062. | ||||
Cerioli, A, Barabesi, L, Cerasa, A, Menegatti, M and Perrotta, D (2019). Newcomb-Benford law and the detection of frauds in international trade. Proceedings of the National Academy of Sciences 116(1), pp. 106-115. DOI:10.1073/pnas.1806617115. | ||||
Gottwalt, F, Waller, A and Liu, W (2016). Natural Laws as a Baseline for Network Anomaly Detection. In: Proceedings of 2016 IEEE Trustcom/BigDataSE/ISPA, pp. 370-377. DOI:10.1109/TrustCom.2016.0086. | ||||
Hajdarevic, K, Pattinson, C and Besic, I (2022). Improving Learning Skills in Detection of Denial of Service Attacks with Newcombe - Benford's Law using Interactive Data Extraction and Analysis. TEM Journal 11(2), pp. 527-534. ISSN/ISBN:2217-8309. DOI:10.18421/TEM112-05. | ||||
Hill, TP (1995). The Significant-Digit Phenomenon. American Mathematical Monthly 102(4), pp. 322-327. DOI:10.2307/2974952. | ||||
Kurien, KL and Chikkamannur, A (2020). An Ameliorated hybrid model for Fraud Detection based on Tree based algorithms and Benford's Law. Proceedings of Third International Conference on Advances in Electronics, Computers and Communications (ICAECC), pp. 1-6 . DOI:10.1109/ICAECC50550.2020.9339471. | ||||
Le, T and Lobo, GJ (2022). Audit Quality Inputs and Financial Statement Conformity to Benford’s Law. Journal of Accounting, Auditing & Finance 37(3), pp. 586–602 . DOI:10.1177/0148558X20930467. | ||||
Milano, F and Gómez-Expósito, A (2021). Detection of Cyber-Attacks of Power Systems through Benford’s Law. IEEE Transactions on Smart Grid 12(3) pp. 2741-2744 . DOI:10.1109/TSG.2020.3042897. | ||||
Nigrini, MJ (2019). The patterns of the numbers used in occupational fraud schemes. Managerial Auditing Journal 34(5), pp. 606--626. DOI:10.1108/MAJ-11-2017-1717. | ||||
Nunes, A, Inácio, H and Marques, RP (2019). A Lei de Benford e a deteção de fraude em auditoria nas empresas Portuguesas [Benford’s Law and fraud detection in Portuguese enterprises]. Proceedings of Iberian Conference on Information Systems and Technologies, CISTI . DOI:10.23919/CISTI.2019.8760922. POR | ||||
Sethi, K, Kumar, R, Prajapati, N and Bera, P (2020). A Lightweight Intrusion Detection System using Benford's Law and Network Flow Size Difference. Proceedings of 2020 International Conference on COMmunication Systems NETworkS (COMSNETS). DOI:10.1109/COMSNETS48256.2020.9027422. | ||||
Wang, L and Ma, B-Q (2023). A concise proof of Benford’s law. Fundamental Research . DOI:10.1016/j.fmre.2023.01.002. |