| Arshadi, L and Jahangir, AH (2014). Benford's law behavior of Internet traffic. Journal of Network and Computer Applications, Volume 40, April 2014, pp. 194–205. ISSN/ISBN:1084-8045. DOI:10.1016/j.jnca.2013.09.007.
|
 |
|
|
|
| Berger, A and Hill, TP (2020). The mathematics of Benford’s law: a primer. Statistical Methods & Applications 30, pp. 779-795. DOI:10.1007/s10260-020-00532-8.
|
 |
|
|
|
| Campanelli, L (2022). On the Euclidean distance statistic of Benford’s law. Communications in Statistics - Theory and Methods, pp. 1-24. DOI:10.1080/03610926.2022.2082480}.
|
 |
|
|
|
| Cerqueti, R and Maggi, M (2021). Data validity and statistical conformity with Benford’s Law. Chaos, Solitons & Fractals 144, p. 110740
. DOI:10.1016/j.chaos.2021.110740.
|
 |
|
|
|
| Fernandes, P and Antunes, M (2023). Benford’s law applied to digital forensic analysis. Forensic Science International: Digital Investigation 45, p. 301515. DOI:10.1016/J.FSIDI.2023.301515.
|
 |
|
|
|
| Fernandes, P, Ó Ciardhuáin, S and Antunes, M (2024). Uncovering Manipulated Files Using Mathematical Natural Laws. In: Vasconcelos, V., Domingues, I., Paredes, S. (eds) Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications. CIARP 2023. Lecture Notes in Computer Science, vol 14469. Springer, Cham
. DOI:10.1007/978-3-031-49018-7_4.
|
 |
|
|
|
| Hajdarevic, K, Pattinson, C and Besic, I (2022). Improving Learning Skills in Detection of Denial of Service Attacks with Newcombe - Benford's Law using Interactive Data Extraction and Analysis. TEM Journal 11(2), pp. 527-534. ISSN/ISBN:2217-8309. DOI:10.18421/TEM112-05.
|
 |
|
|
|
| Iorliam, A (2019). Natural Laws (Benford’s Law and Zipf’s Law) for Network Traffic Analysis. In: Cybersecurity in Nigeria. SpringerBriefs in Cybersecurity. Springer, Cham, pp. 3-22. ISSN/ISBN:978-3-030-15210-9. DOI:10.1007/978-3-030-15210-9_2.
|
 |
|
|
|
| Kossovsky, AE (2021). On the Mistaken Use of the Chi-Square Test in Benford’s Law. Stats 4(2), pp. 419–453. DOI:10.3390/stats4020027.
|
 |
|
|
|
| Mbona, I and Eloff, JHP (2022). Feature selection using Benford’s law to support detection of malicious social media bots. Information Sciences 582, pp. 369-381. DOI:10.1016/j.ins.2021.09.038.
|
 |
|
|
|
| Mbona, I and Eloff, JHP (2022). Detecting Zero-day intrusion attacks using semi-supervised machine learning approaches. IEEE Access. DOI:10.1109/ACCESS.2022.3187116.
|
 |
|
|
|
| Milano, F and Gómez-Expósito, A (2021). Detection of Cyber-Attacks of Power Systems through Benford’s Law. IEEE Transactions on Smart Grid 12(3) pp. 2741-2744
. DOI:10.1109/TSG.2020.3042897.
|
 |
|
|
|
| Nigrini, MJ (2012). Benford's Law: Applications for Forensic Accounting, Auditing, and Fraud Detection . John Wiley & Sons: Hoboken, New Jersey. ISSN/ISBN:978-1-118-15285-0. DOI:10.1002/9781119203094.
|
 |
|
|
|
| Sethi, K, Kumar, R, Prajapati, N and Bera, P (2020). A Lightweight Intrusion Detection System using Benford's Law and Network Flow Size Difference. Proceedings of 2020 International Conference on COMmunication Systems NETworkS (COMSNETS). DOI:10.1109/COMSNETS48256.2020.9027422.
|
 |
|
|
|
| Sun, L, Ho, A, Xia, Z, Chen, J and Zhang, M (2019). Development of an Early Warning System for Network Intrusion Detection Using Benford’s Law Features. In: Meng W., Furnell S. (eds) Security and Privacy in Social Networks and Big Data. SocialSec 2019. Communications in Computer and Information Science, vol 1095. Springer, Singapore. DOI:10.1007/978-981-15-0758-8_5.
|
 |
|
|
|
| Sun, L, Ho, ATS, Xia, Z, Chen, J, Huang, X and Zhang, Y (2017). Detection and Classification of Malicious Patterns In Network Traffic Using Benford’s Law. 2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC), Kuala Lumpur, pp. 864-872. DOI:10.1109/APSIPA.2017.8282154.
|
 |
|
|
|
| Wang, L and Ma, B-Q (2023). A concise proof of Benford’s law. Fundamental Research
. DOI:10.1016/j.fmre.2023.01.002.
|
 |
|
|
|