Cross Reference Up

Iorliam, A and Shangbum, FC (2017). On the Use of Benford’s Law to Detect JPEG Biometric Data Tampering. Journal of Information Security 8, pp. 240-256.

This work is cited by the following items of the Benford Online Bibliography:

Note that this list may be incomplete, and is currently being updated. Please check again at a later date.


Bareja, K (2022). Benford's Law: Managing Insider Threat Program. LinkedIn blog. View Complete Reference Online information Works that this work references No Bibliography works reference this work
Iorliam, A, Emmanual, O and Shehu, YI (2021). An Investigation of "Benford's" Law Divergence and Machine Learning Techniques for "Intra-Class" Separability of Fingerprint Images. Preprint arXiv:2201.01699 [cs.CV]; last accessed January 12, 2022. View Complete Reference Online information Works that this work references No Bibliography works reference this work
Kessel, E (2020). Benford’s law: Potential applications for insider threat detection. Carnegie Mellon University, Software Engineering Institute's Insights (SEI) Blog, last accessed 3 March 2023. View Complete Reference Online information Works that this work references Works that reference this work
McCarville, D (2021). A data transformation process for using Benford’s Law with bounded data. Preprint [version 1; peer review: awaiting peer review], Emerald Open Research 3(29). DOI:10.35241/emeraldopenres.14374.1. View Complete Reference Online information Works that this work references No Bibliography works reference this work
Pahuja, D (2021). Application of Benford’s Law to Detect if COVID-19 Data is under Reported or Manipulated. In: Rahul Srivastava & Aditya Kumar Singh Pundir (eds.), New Frontiers in Communication and Intelligent Systems, pp. 85–91. Computing & Intelligent Systems, SCRS, India . DOI:10.52458/978-81-95502-00-4-11. View Complete Reference Online information Works that this work references Works that reference this work
Reese, M (2019). Why Cyber Security Should Care About Benford's Law . LinkedIn blog. View Complete Reference Online information Works that this work references Works that reference this work
Satapathy, G, Bhattacharya, G, Puhan, NB and Ho, ATS (2020). Generalized Benford’s Law for Fake Fingerprint Detection. Proceedings of 2020 IEEE Applied Signal Processing Conference (ASPCON), Kolkata, pp. 242-246. DOI:10.1109/ASPCON49795.2020.9276660. View Complete Reference Online information Works that this work references Works that reference this work