Egghe, L and Guns, R (2012). Applications of the generalized law of Benford to informetric data. Journal of the American Society for Information Science and Technology 63(8), pp. 16621665. ISSN/ISBN:15322882. DOI:10.1002/asi.22690.





Iorliam, A (2019). Combination of Natural Laws (Benford’s Law and Zipf’s Law) for Fake News Detection. In: Cybersecurity in Nigeria. SpringerBriefs in Cybersecurity. Springer, Cham. DOI:10.1007/9783030152109_3.





Iorliam, A, Ho, ATS, Poh, N, Tirunagari, S and Bours, P (2015). Data forensic techniques using
Benford’s law and Zipf’s law for keystroke dynamics. In: Proceedings of 3rd International Workshop on
Biometrics and Forensics (IWBF 2015). IEEE, pp. 1–6. DOI:10.1109/IWBF.2015.7110238.





Iorliam, A, Tirunagari, S, Ho, ATS, Li, S, Waller, A and Poh, N (2017). "Flow Size Difference" Can Make a Difference: Detecting Malicious TCP Network Flows Based on Benford's Law. arXiv:1609.04214v2 [cs.CR], last accessed February 6, 2017.





Kowalski, JM (2016). Few more Comments on Benford’s Law. arXiv:1612.04200 [math.HO], last accessed February 16, 2017.





Odueke, A and Weir, GRS (2012). Triage in Forensic Accounting using Zipf's Law. Issues in Cybercrime, Security and Digtal Forensics. Edited by G. R. S. Weir and A. AlNemrat. Glasgow. University of Strathclyde Publishing, pp. 3343.





Regan, KW (2012). Benford’s Law and Baseball. Gödel’s Lost Letter and P=NP website, last accessed April 1, 2019.





Srivastava, TK (2013). First Digit 1. Resonance 18(12), pp 10731085. ISSN/ISBN:09718044.





Valadier, M (2012). The Benford phenomenon for random variables. Discussion of Feller's way. Math arXiv:1203.2518; posted 19 Apr 2012.




