Cross Reference Down

Kessel, E (2020). Benford’s law: Potential applications for insider threat detection. Carnegie Mellon University, Software Engineering Institute's Insights (SEI) Blog, last accessed 3 March 2023.

This work cites the following items of the Benford Online Bibliography:


Iorliam, A and Shangbum, FC (2017). On the Use of Benford’s Law to Detect JPEG Biometric Data Tampering. Journal of Information Security 8, pp. 240-256. DOI:10.4236/jis.2017.83016. View Complete Reference Online information Works that this work references Works that reference this work
Prandl, S (2017). PEIMA: Harnessing Power Laws to Detect Malicious Activities from Denial of Service to Intrusion Detection Traffic Analysis and Beyond. Black Hat USA. View Complete Reference Online information Works that this work references Works that reference this work
Reese, M (2019). Why Cyber Security Should Care About Benford's Law . LinkedIn blog. View Complete Reference Online information Works that this work references Works that reference this work
Sarkar, T (2018). What is Benford’s Law and why is it important for data science?. Posted on: towardsdatascience.com, last accessed September 3, 2019. View Complete Reference Online information Works that this work references Works that reference this work