Asadi, AN (2015). An approach for detecting anomalies by assessing the interarrival time of UDP packets and flows using Benford's law. 2nd International Conference on KnowledgeBased Engineering and Innovation (KBEI), Tehran, pp. 257262. DOI:10.1109/KBEI.2015.7436057.





Beebe, NHF (2018). A bibliography of publications about Benford's law, Heap's law and Zipf's law. Available online from: ftp://ftp.math.utah.edu/public_html/public_html/
pub/tex/bib/benfordslaw.pdf (last accessed Feb 6, 2019).





Benford, F (1938). The law of anomalous numbers. Proceedings of the American Philosophical Society, Vol. 78, No. 4 (Mar. 31, 1938), pp. 551572.





Berger, A and Hill, TP (2011). A basic theory of Benford's Law . Probability Surveys 8, pp. 1126. DOI:10.1214/11PS175.





Del Acebo, E and Sbert, M (2005). Benford's Law for Natural and Synthetic Images. Proc. of the First Workshop on Computational Aesthetics in Graphics, Visualization and Imaging, L. Neumann, M. Sbert, B. Gooch, and W. Purgathofer, Eds., Girona, Spain, May 2005, pp. 169–176. ISSN/ISBN:18160859. DOI:10.2312/COMPAESTH/COMPAESTH05/169176.





Fu, D, Shi, YQ and Su, W (2007). A generalized Benford’s law for JPEG coefficients and its applications in image forensics. Proceedings of SPIE, Volume 6505, Security, Steganography and Watermarking of Multimedia Contents IX, San Jose, California, January 28  February 1, 2007, pp. 65051L65051L11. DOI:10.1117/12.704723.





Hill, TP (1995). A Statistical Derivation of the SignificantDigit Law. Statistical Science 10(4), pp. 354363. ISSN/ISBN:08834237.





Iorliam, A, Tirunagari, S, Ho, ATS, Li, S, Waller, A and Poh, N (2017). "Flow Size Difference" Can Make a Difference: Detecting Malicious TCP Network Flows Based on Benford's Law. arXiv:1609.04214v2 [cs.CR], last accessed February 6, 2017.





Li, B, Shi, YQ and Huang, J (2008). Detecting doubly compressed JPEG images by using mode based first digit features. Proceedings of 2008 IEEE 10th Workshop on Multimedia Signal Processing, pp. 730–735. DOI:10.1109/MMSP.2008.4665171.





Li, XH, Zhao, YQ, Liao, M, Shih, FY and Shi, YQ (2012). Detection of tampered region for JPEG images by using modebased first digit features. EURASIP Journal on Advances in Signal Processing, 2012:190. DOI:10.1186/168761802012190.





Newcomb, S (1881). Note on the frequency of use of the different digits in natural numbers. American Journal of Mathematics 4(1), pp. 3940. ISSN/ISBN:00029327. DOI:10.2307/2369148.





Nigrini, MJ (1992). The Detection of Income Tax Evasion Through an Analysis of Digital Frequencies. PhD thesis, University of Cincinnati, OH, USA.





Orita, M, Hagiwara, Y, Moritomo, A, Tsunoyama, K, Watanabe, T and Ohno, K (2013). Agreement of drug discovery data with Benford's law. Expert Opinion on Drug Discovery 8(1), pp. 15. DOI:10.1517/17460441.2013.740007.





Qadir, G, Zhao, X and Ho, ATS (2010). Estimating JPEG2000 Compression for Image Forensics Using the
Benford’s Law. Proc. of SPIE Vol. 7723, pp. 77230J1 77230J10. DOI:10.1117/12.855085.





Sambridge, M, Tkalčić, H and Jackson, A (2010). Benford's law in the Natural Sciences. Geophysical Research Letters 37: L22301. DOI:10.1029/2010GL044830.




