Cross Reference Down

Fernandes, P, Ciardhuáin, SÓ and Antunes, M (2024). Unveiling Malicious Network Flows Using Benford’s Law. Mathematics 12(15), p. 2299.

This work cites the following items of the Benford Online Bibliography:


Arshadi, L and Jahangir, AH (2014). Benford's law behavior of Internet traffic. Journal of Network and Computer Applications, Volume 40, April 2014, pp. 194–205. ISSN/ISBN:1084-8045. DOI:10.1016/j.jnca.2013.09.007. View Complete Reference Online information Works that this work references Works that reference this work
Berger, A and Hill, TP (2020). The mathematics of Benford’s law: a primer. Statistical Methods & Applications 30, pp. 779-795. DOI:10.1007/s10260-020-00532-8. View Complete Reference Online information Works that this work references Works that reference this work
Campanelli, L (2022). On the Euclidean distance statistic of Benford’s law. Communications in Statistics - Theory and Methods, pp. 1-24. DOI:10.1080/03610926.2022.2082480}. View Complete Reference Online information Works that this work references Works that reference this work
Cerqueti, R and Maggi, M (2021). Data validity and statistical conformity with Benford’s Law. Chaos, Solitons & Fractals 144, p. 110740 . DOI:10.1016/j.chaos.2021.110740. View Complete Reference Online information Works that this work references Works that reference this work
Fernandes, P and Antunes, M (2023). Benford’s law applied to digital forensic analysis. Forensic Science International: Digital Investigation 45, p. 301515. DOI:10.1016/J.FSIDI.2023.301515. View Complete Reference Online information Works that this work references Works that reference this work
Fernandes, P, Ó Ciardhuáin, S and Antunes, M (2024). Uncovering Manipulated Files Using Mathematical Natural Laws. In: Vasconcelos, V., Domingues, I., Paredes, S. (eds) Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications. CIARP 2023. Lecture Notes in Computer Science, vol 14469. Springer, Cham . DOI:10.1007/978-3-031-49018-7_4. View Complete Reference Online information Works that this work references Works that reference this work
Hajdarevic, K, Pattinson, C and Besic, I (2022). Improving Learning Skills in Detection of Denial of Service Attacks with Newcombe - Benford's Law using Interactive Data Extraction and Analysis. TEM Journal 11(2), pp. 527-534. ISSN/ISBN:2217-8309. DOI:10.18421/TEM112-05. View Complete Reference Online information Works that this work references Works that reference this work
Iorliam, A (2019). Natural Laws (Benford’s Law and Zipf’s Law) for Network Traffic Analysis. In: Cybersecurity in Nigeria. SpringerBriefs in Cybersecurity. Springer, Cham, pp. 3-22. ISSN/ISBN:978-3-030-15210-9. DOI:10.1007/978-3-030-15210-9_2. View Complete Reference Online information Works that this work references Works that reference this work
Kossovsky, AE (2021). On the Mistaken Use of the Chi-Square Test in Benford’s Law. Stats 4(2), pp. 419–453. DOI:10.3390/stats4020027. View Complete Reference Online information Works that this work references Works that reference this work
Mbona, I and Eloff, JHP (2022). Feature selection using Benford’s law to support detection of malicious social media bots. Information Sciences 582, pp. 369-381. DOI:10.1016/j.ins.2021.09.038. View Complete Reference Online information Works that this work references Works that reference this work
Mbona, I and Eloff, JHP (2022). Detecting Zero-day intrusion attacks using semi-supervised machine learning approaches. IEEE Access. DOI:10.1109/ACCESS.2022.3187116. View Complete Reference Online information Works that this work references Works that reference this work
Milano, F and Gómez-Expósito, A (2021). Detection of Cyber-Attacks of Power Systems through Benford’s Law. IEEE Transactions on Smart Grid 12(3) pp. 2741-2744 . DOI:10.1109/TSG.2020.3042897. View Complete Reference Online information Works that this work references Works that reference this work
Nigrini, MJ (2012). Benford's Law: Applications for Forensic Accounting, Auditing, and Fraud Detection . John Wiley & Sons: Hoboken, New Jersey. ISSN/ISBN:978-1-118-15285-0. DOI:10.1002/9781119203094. View Complete Reference Online information Works that this work references Works that reference this work
Sethi, K, Kumar, R, Prajapati, N and Bera, P (2020). A Lightweight Intrusion Detection System using Benford's Law and Network Flow Size Difference. Proceedings of 2020 International Conference on COMmunication Systems NETworkS (COMSNETS). DOI:10.1109/COMSNETS48256.2020.9027422. View Complete Reference Online information Works that this work references Works that reference this work
Sun, L, Ho, A, Xia, Z, Chen, J and Zhang, M (2019). Development of an Early Warning System for Network Intrusion Detection Using Benford’s Law Features. In: Meng W., Furnell S. (eds) Security and Privacy in Social Networks and Big Data. SocialSec 2019. Communications in Computer and Information Science, vol 1095. Springer, Singapore. DOI:10.1007/978-981-15-0758-8_5. View Complete Reference Online information Works that this work references Works that reference this work
Sun, L, Ho, ATS, Xia, Z, Chen, J, Huang, X and Zhang, Y (2017). Detection and Classification of Malicious Patterns In Network Traffic Using Benford’s Law. 2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC), Kuala Lumpur, pp. 864-872. DOI:10.1109/APSIPA.2017.8282154. View Complete Reference Online information Works that this work references Works that reference this work
Wang, L and Ma, B-Q (2023). A concise proof of Benford’s law. Fundamental Research . DOI:10.1016/j.fmre.2023.01.002. View Complete Reference Online information Works that this work references Works that reference this work