Reese, M (2019). Why Cyber Security Should Care About Benford's Law . LinkedIn blog.
This work cites the following items of the Benford Online Bibliography:
Hamadeh, N (2004). Wireless Security and Traffic Modeling Using Benford's Law. Master’s Thesis, University of New Mexico, Albuquerque, NM, 2004 (99 pgs).
|
|
|
|
|
Iorliam, A and Shangbum, FC (2017). On the Use of Benford’s Law to Detect JPEG Biometric Data Tampering. Journal of Information Security 8, pp. 240-256. DOI:10.4236/jis.2017.83016.
|
|
|
|
|
Long, J (2014). Testing Benford's Law. Website: http://testingbenfordslaw.com/. Last accessed Apr 1, 2016.
|
|
|
|
|
Nigrini, MJ (2012). Benford's Law: Applications for Forensic Accounting, Auditing, and Fraud Detection . John Wiley & Sons: Hoboken, New Jersey. ISSN/ISBN:978-1-118-15285-0. DOI:10.1002/9781119203094.
|
|
|
|
|
Prandl, S (2017). PEIMA: Harnessing Power Laws to Detect Malicious Activities from Denial of Service to Intrusion Detection Traffic Analysis and Beyond. Black Hat USA.
|
|
|
|
|