Cross Reference Up

Sethi, K, Kumar, R, Prajapati, N and Bera, P (2020). A Lightweight Intrusion Detection System using Benford's Law and Network Flow Size Difference. Proceedings of 2020 International Conference on COMmunication Systems NETworkS (COMSNETS).

This work is cited by the following items of the Benford Online Bibliography:

Note that this list may be incomplete, and is currently being updated. Please check again at a later date.


Fernandes, P, Ó Ciardhuáin, S and Antunes, M (2024). Uncovering Manipulated Files Using Mathematical Natural Laws. In: Vasconcelos, V., Domingues, I., Paredes, S. (eds) Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications. CIARP 2023. Lecture Notes in Computer Science, vol 14469. Springer, Cham . DOI:10.1007/978-3-031-49018-7_4. View Complete Reference Online information Works that this work references No Bibliography works reference this work
Mbona, I and Eloff, JHP (2022). Detecting Zero-day intrusion attacks using semi-supervised machine learning approaches. IEEE Access. DOI:10.1109/ACCESS.2022.3187116. View Complete Reference Online information Works that this work references No Bibliography works reference this work