Kessel, E (2020). Benford’s law: Potential applications for insider threat detection. Carnegie Mellon University, Software Engineering Institute's Insights (SEI) Blog, last accessed 3 March 2023.
This work cites the following items of the Benford Online Bibliography:
Iorliam, A and Shangbum, FC (2017). On the Use of Benford’s Law to Detect JPEG Biometric Data Tampering. Journal of Information Security 8, pp. 240-256. DOI:10.4236/jis.2017.83016.
|
|
|
|
|
Prandl, S (2017). PEIMA: Harnessing Power Laws to Detect Malicious Activities from Denial of Service to Intrusion Detection Traffic Analysis and Beyond. Black Hat USA.
|
|
|
|
|
Reese, M (2019). Why Cyber Security Should Care About Benford's Law . LinkedIn blog.
|
|
|
|
|
Sarkar, T (2018). What is Benford’s Law and why is it important for data science?. Posted on: towardsdatascience.com, last accessed September 3, 2019.
|
|
|
|
|