Iorliam, A and Shangbum, FC (2017). On the Use of Benford’s Law to Detect JPEG Biometric Data Tampering. Journal of Information Security 8, pp. 240-256.
This work is cited by the following items of the Benford Online Bibliography:
Note that this list may be incomplete, and is currently being updated. Please check again at a later date.
Bareja, K (2022). Benford's Law: Managing Insider Threat Program. LinkedIn blog.
|
|
|
|
|
Iorliam, A, Emmanual, O and Shehu, YI (2021). An Investigation of "Benford's" Law Divergence and Machine Learning Techniques for "Intra-Class" Separability of Fingerprint Images. Preprint arXiv:2201.01699 [cs.CV]; last accessed January 12, 2022.
|
|
|
|
|
Kessel, E (2020). Benford’s law: Potential applications for insider threat detection. Carnegie Mellon University, Software Engineering Institute's Insights (SEI) Blog, last accessed 3 March 2023.
|
|
|
|
|
McCarville, D (2021). A data transformation process for using Benford’s Law with bounded data. Preprint [version 1; peer review: awaiting peer review], Emerald Open Research 3(29). DOI:10.35241/emeraldopenres.14374.1.
|
|
|
|
|
Pahuja, D (2021). Application of Benford’s Law to Detect if COVID-19 Data is under Reported or Manipulated. In: Rahul Srivastava & Aditya Kumar Singh Pundir (eds.), New Frontiers in Communication and Intelligent Systems, pp. 85–91. Computing & Intelligent Systems, SCRS, India
. DOI:10.52458/978-81-95502-00-4-11.
|
|
|
|
|
Reese, M (2019). Why Cyber Security Should Care About Benford's Law . LinkedIn blog.
|
|
|
|
|
Satapathy, G, Bhattacharya, G, Puhan, NB and Ho, ATS (2020). Generalized Benford’s Law for Fake Fingerprint Detection. Proceedings of 2020 IEEE Applied Signal Processing Conference (ASPCON), Kolkata, pp. 242-246. DOI:10.1109/ASPCON49795.2020.9276660.
|
|
|
|
|