Cross Reference Down

Bareja, K (2022). Benford's Law: Managing Insider Threat Program. LinkedIn blog.

This work cites the following items of the Benford Online Bibliography:


Hamadeh, N (2004). Wireless Security and Traffic Modeling Using Benford's Law. Master’s Thesis, University of New Mexico, Albuquerque, NM, 2004 (99 pgs). View Complete Reference Online information Works that this work references Works that reference this work
Iorliam, A and Shangbum, FC (2017). On the Use of Benford’s Law to Detect JPEG Biometric Data Tampering. Journal of Information Security 8, pp. 240-256. DOI:10.4236/jis.2017.83016. View Complete Reference Online information Works that this work references Works that reference this work
Long, J (2014). Testing Benford's Law. Website: http://testingbenfordslaw.com/. Last accessed Apr 1, 2016. View Complete Reference Online information No Bibliography works referenced by this work. Works that reference this work
Nasser, L (2020). Digits. Netflix series - Connected: The Hidden Science of Everything, Episode 4. View Complete Reference Online information Works that this work references Works that reference this work
Prandl, S (2017). PEIMA: Harnessing Power Laws to Detect Malicious Activities from Denial of Service to Intrusion Detection Traffic Analysis and Beyond. Black Hat USA. View Complete Reference Online information Works that this work references Works that reference this work