Cross Reference Down

Hajdarevic, K, Pattinson, C and Besic, I (2022). Improving Learning Skills in Detection of Denial of Service Attacks with Newcombe - Benford's Law using Interactive Data Extraction and Analysis. TEM Journal 11(2), pp. 527-534.

This work cites the following items of the Benford Online Bibliography:


Amouzegar, M and Moshirvaziri, K (2018). Information Security and Benford’s Law . Posted on Decision Sciences Institute blog May 3; last accessed October 11, 2019. View Complete Reference Online information Works that this work references Works that reference this work
Arshadi, L and Jahangir, AH (2014). Benford's law behavior of Internet traffic. Journal of Network and Computer Applications, Volume 40, April 2014, pp. 194–205. ISSN/ISBN:1084-8045. DOI:10.1016/j.jnca.2013.09.007. View Complete Reference Online information Works that this work references Works that reference this work
Benford, F (1938). The law of anomalous numbers. Proceedings of the American Philosophical Society, Vol. 78, No. 4 (Mar. 31, 1938), pp. 551-572. View Complete Reference Online information No Bibliography works referenced by this work. Works that reference this work
Berger, A and Hill, TP (2011). A basic theory of Benford's Law . Probability Surveys 8, pp. 1-126. DOI:10.1214/11-PS175. View Complete Reference Online information Works that this work references Works that reference this work
Newcomb, S (1881). Note on the frequency of use of the different digits in natural numbers. American Journal of Mathematics 4(1), pp. 39-40. ISSN/ISBN:0002-9327. DOI:10.2307/2369148. View Complete Reference Online information No Bibliography works referenced by this work. Works that reference this work
Prandl, S (2017). PEIMA: Harnessing Power Laws to Detect Malicious Activities from Denial of Service to Intrusion Detection Traffic Analysis and Beyond. Black Hat USA. View Complete Reference Online information Works that this work references Works that reference this work
Prandl, S, Lazarescu, M, Pham, DS, Soh, ST and Kak, S (2017). An Investigation of Power Law Probability Distributions for Network Anomaly Detection. 2017 IEEE Security and Privacy Workshops (SPW), pp. 217-222, . DOI:10.1109/SPW.2017.20. View Complete Reference Online information Works that this work references Works that reference this work
Sun, L, Ho, ATS, Xia, Z, Chen, J, Huang, X and Zhang, Y (2017). Detection and Classification of Malicious Patterns In Network Traffic Using Benford’s Law. 2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC), Kuala Lumpur, pp. 864-872. DOI:10.1109/APSIPA.2017.8282154. View Complete Reference Online information Works that this work references Works that reference this work