Hamadeh, N (2004). Wireless Security and Traffic Modeling Using Benford's Law. Master’s Thesis, University of New Mexico, Albuquerque, NM, 2004 (99 pgs).
This work is cited by the following items of the Benford Online Bibliography:
Note that this list may be incomplete, and is currently being updated. Please check again at a later date.
Bareja, K (2022). Benford's Law: Managing Insider Threat Program. LinkedIn blog.
|
|
|
|
|
Iorliam, A, Tirunagari, S, Ho, ATS, Li, S, Waller, A and Poh, N (2017). "Flow Size Difference" Can Make a Difference: Detecting Malicious TCP Network Flows Based on Benford's Law. arXiv:1609.04214v2 [cs.CR], last accessed February 6, 2017.
|
|
|
|
|
Reese, M (2019). Why Cyber Security Should Care About Benford's Law . LinkedIn blog.
|
|
|
|
|