Bareja, K (2022). Benford's Law: Managing Insider Threat Program. LinkedIn blog.
This work cites the following items of the Benford Online Bibliography:
Hamadeh, N (2004). Wireless Security and Traffic Modeling Using Benford's Law. Master’s Thesis, University of New Mexico, Albuquerque, NM, 2004 (99 pgs).
|
 |
|
|
|
Iorliam, A and Shangbum, FC (2017). On the Use of Benford’s Law to Detect JPEG Biometric Data Tampering. Journal of Information Security 8, pp. 240-256. DOI:10.4236/jis.2017.83016.
|
 |
|
|
|
Long, J (2014). Testing Benford's Law. Website: http://testingbenfordslaw.com/. Last accessed Apr 1, 2016.
|
 |
|
|
|
Nasser, L (2020). Digits. Netflix series - Connected: The Hidden Science of Everything, Episode 4.
|
 |
|
|
|
Prandl, S (2017). PEIMA: Harnessing Power Laws to Detect Malicious Activities from Denial of Service to Intrusion Detection Traffic Analysis and Beyond. Black Hat USA.
|
 |
|
|
|