| Berger, A and Hill, TP (2015). An Introduction to Benford's Law. Princeton University Press: Princeton, NJ. ISSN/ISBN:9780691163062.
|
 |
|
|
|
| Cho, WKT and Gaines, BJ (2007). Breaking the (Benford) law: Statistical fraud detection in campaign finance. American Statistician 61(3), pp. 218-223. ISSN/ISBN:0003-1305. DOI:10.1198/000313007X223496.
|
 |
|
|
|
| Durtschi, C, Hillison, W and Pacini, C (2004). The effective use of Benford’s law to assist in detecting fraud in accounting data. Journal of Forensic Accounting 1524-5586/Vol. V, pp. 17-34.
|
 |
|
|
|
| Fernandes, P and Antunes, M (2023). Benford’s law applied to digital forensic analysis. Forensic Science International: Digital Investigation 45, p. 301515. DOI:10.1016/J.FSIDI.2023.301515.
|
 |
|
|
|
| Fernandes, P, Ciardhuáin, SÓ and Antunes, M (2024). Unveiling Malicious Network Flows Using Benford’s Law. Mathematics 12(15), p. 2299. DOI:10.3390/math12152299.
|
 |
|
|
|
| Fernandes, P, Ó Ciardhuáin, S and Antunes, M (2024). Uncovering Manipulated Files Using Mathematical Natural Laws. In: Vasconcelos, V., Domingues, I., Paredes, S. (eds) Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications. CIARP 2023. Lecture Notes in Computer Science, vol 14469. Springer, Cham
. DOI:10.1007/978-3-031-49018-7_4.
|
 |
|
|
|
| Mbona, I and Eloff, JHP (2022). Detecting Zero-day intrusion attacks using semi-supervised machine learning approaches. IEEE Access. DOI:10.1109/ACCESS.2022.3187116.
|
 |
|
|
|
| Nigrini, MJ (2012). Benford's Law: Applications for Forensic Accounting, Auditing, and Fraud Detection . John Wiley & Sons: Hoboken, New Jersey. ISSN/ISBN:978-1-118-15285-0. DOI:10.1002/9781119203094.
|
 |
|
|
|
| Sastroredjo, PE (2025). Benford's Laws Analysis on Tax Irregularities in Banking and Investment Activities: The Case of the FTSE All-Share Index. Review of Integrative Business and Economics Research 14(2), pp. 674-686.
|
 |
|
|
|
| Taimori, A, Razzazi, F, Behrad, A, Ahmadi, A and Babaie-Zadeh, M (2012). A proper transform for satisfying Benford's Law and its application to double JPEG image forensics. Proceedings of 2012 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), pp. 000240-000244. DOI:10.1109/ISSPIT.2012.6621294.
|
 |
|
|
|