Prandl, S (2017). PEIMA: Harnessing Power Laws to Detect Malicious Activities from Denial of Service to Intrusion Detection Traffic Analysis and Beyond. Black Hat USA.
This work is cited by the following items of the Benford Online Bibliography:
Note that this list may be incomplete, and is currently being updated. Please check again at a later date.
Bareja, K (2022). Benford's Law: Managing Insider Threat Program. LinkedIn blog.
|
|
|
|
|
Hajdarevic, K, Pattinson, C and Besic, I (2022). Improving Learning Skills in Detection of Denial of Service Attacks with Newcombe - Benford's Law using Interactive Data Extraction and Analysis. TEM Journal 11(2), pp. 527-534. ISSN/ISBN:2217-8309. DOI:10.18421/TEM112-05.
|
|
|
|
|
Kessel, E (2020). Benford’s law: Potential applications for insider threat detection. Carnegie Mellon University, Software Engineering Institute's Insights (SEI) Blog, last accessed 3 March 2023.
|
|
|
|
|
McCarville, D (2021). A data transformation process for using Benford’s Law with bounded data. Preprint [version 1; peer review: awaiting peer review], Emerald Open Research 3(29). DOI:10.35241/emeraldopenres.14374.1.
|
|
|
|
|
Reese, M (2019). Why Cyber Security Should Care About Benford's Law . LinkedIn blog.
|
|
|
|
|