Cross Reference Down

Reese, M (2019). Why Cyber Security Should Care About Benford's Law . LinkedIn blog.

This work cites the following items of the Benford Online Bibliography:


Hamadeh, N (2004). Wireless Security and Traffic Modeling Using Benford's Law. Master’s Thesis, University of New Mexico, Albuquerque, NM, 2004 (99 pgs). View Complete Reference Online information Works that this work references Works that reference this work
Iorliam, A and Shangbum, FC (2017). On the Use of Benford’s Law to Detect JPEG Biometric Data Tampering. Journal of Information Security 8, pp. 240-256. DOI:10.4236/jis.2017.83016. View Complete Reference Online information Works that this work references Works that reference this work
Long, J (2014). Testing Benford's Law. Website: http://testingbenfordslaw.com/. Last accessed Apr 1, 2016. View Complete Reference Online information No Bibliography works referenced by this work. Works that reference this work
Nigrini, MJ (2012). Benford's Law: Applications for Forensic Accounting, Auditing, and Fraud Detection . John Wiley & Sons: Hoboken, New Jersey. ISSN/ISBN:978-1-118-15285-0. DOI:10.1002/9781119203094. View Complete Reference Online information Works that this work references Works that reference this work
Prandl, S (2017). PEIMA: Harnessing Power Laws to Detect Malicious Activities from Denial of Service to Intrusion Detection Traffic Analysis and Beyond. Black Hat USA. View Complete Reference Online information Works that this work references Works that reference this work