Arshadi, L and Jahangir, AH (2014). Benford's law behavior of Internet traffic. Journal of Network and Computer Applications, Volume 40, April 2014, pp. 194–205. ISSN/ISBN:10848045. DOI:10.1016/j.jnca.2013.09.007.





Beebe, NHF (2015). A bibliography of publications about Benford's law, Heap's law and Zipf's law. Available online from: ftp://ftp.math.utah.edu/public_html/public_html/
pub/tex/bib/benfordslaw.pdf (last accessed Feb 3, 2015).





Benford, F (1938). The law of anomalous numbers. Proceedings of the American Philosophical Society, Vol. 78, No. 4 (Mar. 31, 1938), pp. 551572.





Berger, A and Hill, TP (2011). Benford's Law Strikes Back: No Simple Explanation in Sight for Mathematical Gem. The Mathematical Intelligencer 33(1), 8591. DOI:10.1007/ s0028301091823.





Berger, A and Hill, TP (2011). A basic theory of Benford's Law . Probability Surveys 8, pp. 1126. DOI:10.1214/11PS175.





Berger, A and Hill, TP (2015). An Introduction to Benford's Law. Princeton University Press: Princeton, NJ. ISSN/ISBN:9780691163062.





Del Acebo, E and Sbert, M (2005). Benford's Law for Natural and Synthetic Images. Proc. of the First Workshop on Computational Aesthetics in Graphics, Visualization and Imaging, L. Neumann, M. Sbert, B. Gooch, and W. Purgathofer, Eds., Girona, Spain, May 2005, pp. 169–176. ISSN/ISBN:18160859. DOI:10.2312/COMPAESTH/COMPAESTH05/169176.





Diekmann, A and Jann, B (2010). Benford’s Law and Fraud Detection: Facts and Legends. German Economic Review 11(3), 397–401.





Durtschi, C, Hillison, W and Pacini, C (2004). The effective use of Benford’s law to assist in detecting fraud in accounting data. Journal of Forensic Accounting 15245586/Vol. V, 1734.





Formann, AK (2010). The NewcombBenford Law in Its Relation to Some Common Distributions. PLoS ONE 5(5): e10541. doi:10.1371/journal.pone.0010541.





Fu, D, Shi, YQ and Su, W (2007). A generalized Benford’s law for JPEG coefficients
and its applications in image forensics. Proceedings of SPIE, Volume 6505, Security, Steganography and Watermarking of Multimedia Contents IX, San Jose, California, January 28  February 1, 2007, pp. 65051L65051L11. DOI:10.1117/12.704723.





Hamadeh, N (2004). Wireless Security and Traffic Modeling Using Benford's Law. Master’s Thesis, University of New Mexico, Albuquerque, NM, 2004 (99 pgs).





Hill, TP (1995). A Statistical Derivation of the SignificantDigit Law. Statistical Science 10(4), pp. 354363. ISSN/ISBN:08834237.





Hill, TP (1995). BaseInvariance Implies Benford's Law. Proceedings of the American Mathematical Society 123(3), pp. 887895. ISSN/ISBN:00029939. DOI:10.2307/2160815.





Irmay, S (1997). The relationship between Zipf's law and the distribution of first digits. Journal of Applied Statistics 24(4), pp. 383393. ISSN/ISBN:02664763. DOI:10.1080/02664769723594.





Lee, J, Cho, WKT and Judge, G (2010). Stigler’s approach to recovering the distribution of first significant digits in natural data sets. Statistics and Probability Letters 80(2), pp. 8288. DOI:10.1016/j.spl.2009.09.015.





Li, XH, Zhao, YQ, Liao, M, Shih, FY and Shi, YQ (2012). Detection of tampered region for JPEG images by using modebased first digit features. EURASIP Journal on Advances in Signal Processing, 2012:190. DOI:10.1186/168761802012190.





Newcomb, S (1881). Note on the frequency of use of the different digits in natural numbers. American Journal of Mathematics 4(1), 3940. ISSN/ISBN:00029327.





Nigrini, MJ (2012). Benford's Law: Applications for Forensic Accounting, Auditing, and Fraud Detection . John Wiley & Sons, Hoboken, New Jersey. ISSN/ISBN:9781118152850.





Pinkham, RS (1961). On the Distribution of First Significant Digits. Annals of Mathematical Statistics 32(4), 12231230. ISSN/ISBN:00034851.





Qadir, G, Zhao, X and Ho, ATS (2010). Estimating JPEG2000 Compression for Image Forensics Using the
Benford’s Law. Proc. of SPIE Vol. 7723, pp. 77230J1 77230J10. DOI:10.1117/12.855085.





Tao, T (2009). Benford’s law, Zipf’s law, and the Pareto distribution
. Terence Tao's math blog site.




