Cross Reference Down

Fernandes, P , Ciardhuáin, SÓ and Antunes, M (2025). Distance-based feature selection using Benford’s law for malware detection. Computers & Security 158, pp.104625.

This work cites the following items of the Benford Online Bibliography:


Berger, A and Hill, TP (2015). An Introduction to Benford's Law. Princeton University Press: Princeton, NJ. ISSN/ISBN:9780691163062. View Complete Reference Online information Works that this work references Works that reference this work
Cho, WKT and Gaines, BJ (2007). Breaking the (Benford) law: Statistical fraud detection in campaign finance. American Statistician 61(3), pp. 218-223. ISSN/ISBN:0003-1305. DOI:10.1198/000313007X223496. View Complete Reference Online information Works that this work references Works that reference this work
Durtschi, C, Hillison, W and Pacini, C (2004). The effective use of Benford’s law to assist in detecting fraud in accounting data. Journal of Forensic Accounting 1524-5586/Vol. V, pp. 17-34. View Complete Reference Online information Works that this work references Works that reference this work
Fernandes, P and Antunes, M (2023). Benford’s law applied to digital forensic analysis. Forensic Science International: Digital Investigation 45, p. 301515. DOI:10.1016/J.FSIDI.2023.301515. View Complete Reference Online information Works that this work references Works that reference this work
Fernandes, P, Ciardhuáin, SÓ and Antunes, M (2024). Unveiling Malicious Network Flows Using Benford’s Law. Mathematics 12(15), p. 2299. DOI:10.3390/math12152299. View Complete Reference Online information Works that this work references Works that reference this work
Fernandes, P, Ó Ciardhuáin, S and Antunes, M (2024). Uncovering Manipulated Files Using Mathematical Natural Laws. In: Vasconcelos, V., Domingues, I., Paredes, S. (eds) Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications. CIARP 2023. Lecture Notes in Computer Science, vol 14469. Springer, Cham . DOI:10.1007/978-3-031-49018-7_4. View Complete Reference Online information Works that this work references Works that reference this work
Mbona, I and Eloff, JHP (2022). Detecting Zero-day intrusion attacks using semi-supervised machine learning approaches. IEEE Access. DOI:10.1109/ACCESS.2022.3187116. View Complete Reference Online information Works that this work references Works that reference this work
Nigrini, MJ (2012). Benford's Law: Applications for Forensic Accounting, Auditing, and Fraud Detection . John Wiley & Sons: Hoboken, New Jersey. ISSN/ISBN:978-1-118-15285-0. DOI:10.1002/9781119203094. View Complete Reference Online information Works that this work references Works that reference this work
Sastroredjo, PE (2025). Benford's Laws Analysis on Tax Irregularities in Banking and Investment Activities: The Case of the FTSE All-Share Index. Review of Integrative Business and Economics Research 14(2), pp. 674-686. View Complete Reference Online information Works that this work references Works that reference this work
Taimori, A, Razzazi, F, Behrad, A, Ahmadi, A and Babaie-Zadeh, M (2012). A proper transform for satisfying Benford's Law and its application to double JPEG image forensics. Proceedings of 2012 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), pp. 000240-000244. DOI:10.1109/ISSPIT.2012.6621294. View Complete Reference Online information Works that this work references Works that reference this work