Cross Reference Down

Sun, L, Ho, A, Xia, Z, Chen, J and Zhang, M (2019). Development of an Early Warning System for Network Intrusion Detection Using Benfordís Law Features. In: Meng W., Furnell S. (eds) Security and Privacy in Social Networks and Big Data. SocialSec 2019. Communications in Computer and Information Science, vol 1095. Springer, Singapore.

This work cites the following items of the Benford Online Bibliography:


Asadi, AN (2015). An approach for detecting anomalies by assessing the inter-arrival time of UDP packets and flows using Benford's law. 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI), Tehran, pp. 257-262. DOI:10.1109/KBEI.2015.7436057. View Complete Reference Online information Works that this work references Works that reference this work
Benford, F (1938). The law of anomalous numbers. Proceedings of the American Philosophical Society, Vol. 78, No. 4 (Mar. 31, 1938), pp. 551-572. View Complete Reference Online information No Bibliography works referenced by this work. Works that reference this work
Durtschi, C, Hillison, W and Pacini, C (2004). The effective use of Benfordís law to assist in detecting fraud in accounting data. Journal of Forensic Accounting 1524-5586/Vol. V, pp. 17-34. View Complete Reference Online information Works that this work references Works that reference this work
Fu, D, Shi, YQ and Su, W (2007). A generalized Benfordís law for JPEG coefficients and its applications in image forensics. Proceedings of SPIE, Volume 6505, Security, Steganography and Watermarking of Multimedia Contents IX, San Jose, California, January 28 - February 1, 2007, pp. 65051L-65051L-11. DOI:10.1117/12.704723. View Complete Reference Online information Works that this work references Works that reference this work
Hill, TP (1995). A Statistical Derivation of the Significant-Digit Law. Statistical Science 10(4), pp. 354-363. ISSN/ISBN:0883-4237. View Complete Reference Online information Works that this work references Works that reference this work
Iorliam, A, Tirunagari, S, Ho, ATS, Li, S, Waller, A and Poh, N (2017). "Flow Size Difference" Can Make a Difference: Detecting Malicious TCP Network Flows Based on Benford's Law. arXiv:1609.04214v2 [cs.CR], last accessed February 6, 2017. View Complete Reference Online information Works that this work references Works that reference this work
Newcomb, S (1881). Note on the frequency of use of the different digits in natural numbers. American Journal of Mathematics 4(1), pp. 39-40. ISSN/ISBN:0002-9327. DOI:10.2307/2369148. View Complete Reference Online information No Bibliography works referenced by this work. Works that reference this work
Nigrini, MJ (2012). Benford's Law: Applications for Forensic Accounting, Auditing, and Fraud Detection . John Wiley & Sons: Hoboken, New Jersey. ISSN/ISBN:978-1-118-15285-0. DOI:10.1002/9781119203094. View Complete Reference Online information Works that this work references Works that reference this work
Sambridge, M, Tkalčić, H and Jackson, A (2010). Benford's law in the Natural Sciences. Geophysical Research Letters 37: L22301. DOI:10.1029/2010GL044830. View Complete Reference Online information Works that this work references Works that reference this work
Sun, L, Ho, ATS, Xia, Z, Chen, J, Huang, X and Zhang, Y (2017). Detection and Classification of Malicious Patterns In Network Traffic Using Benfordís Law. 2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC), Kuala Lumpur, pp. 864-872. DOI:10.1109/APSIPA.2017.8282154. View Complete Reference Online information Works that this work references Works that reference this work