{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T04:41:07Z","timestamp":1729658467498,"version":"3.28.0"},"reference-count":34,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,8]]},"DOI":"10.1109\/cibcb.2017.8058547","type":"proceedings-article","created":{"date-parts":[[2017,10,5]],"date-time":"2017-10-05T16:28:38Z","timestamp":1507220918000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["Using Benford's law to detect anomalies in electroencephalogram: An application to detecting alzheimer's disease"],"prefix":"10.1109","author":[{"given":"Santosh","family":"Tirunagari","sequence":"first","affiliation":[]},{"given":"Daniel","family":"Abasolo","sequence":"additional","affiliation":[]},{"given":"Aamo","family":"Iorliam","sequence":"additional","affiliation":[]},{"given":"Anthony T S","family":"Ho","sequence":"additional","affiliation":[]},{"given":"Norman","family":"Poh","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2406533"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/IWBF.2015.7110238"},{"key":"ref31","article-title":"flow size difference","author":"iorliam","year":"2016","journal-title":"can make a difference Detecting malicious tcp network flows based on benford's law"},{"key":"ref30","article-title":"A simple explanation of benford's law","author":"fewster","year":"2012","journal-title":"The American Statistician"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2015.7368599"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.2174\/156720510792231720"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.neuroimage.2009.06.056"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.4061\/2011\/539621"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2013.2271735"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.clinph.2004.01.001"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3390\/e19010031"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.clinph.2005.04.001"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.clinph.2005.06.011"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1049\/htl.2014.0106","article-title":"Classification of alzheimer's disease from quadratic sample entropy of electroencephalogram","volume":"2","author":"simons","year":"2015","journal-title":"Healthcare Technology Lett"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.2307\/2369148"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1213\/ANE.0000000000000015"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1056\/NEJMoa013128"},{"key":"ref27","first-page":"17","article-title":"The effective use of benford's law to assist in detecting fraud in accounting data","volume":"5","author":"durtschi","year":"2004","journal-title":"Journal of Forensic Accounting"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1212\/WNL.56.9.1143"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.bbr.2016.09.057"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s00283-010-9182-3"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/0013-4694(83)90124-4"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.clinph.2016.10.006"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1097\/WNP.0000000000000301"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jalz.2011.03.005"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.medengphy.2005.07.004"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s100480050011"},{"key":"ref20","first-page":"551","article-title":"The law of anomalous numbers","volume":"78","author":"benford","year":"1938","journal-title":"Proceedings of the American Philosophical Society"},{"key":"ref22","first-page":"887","article-title":"Base-invariance implies benfords law","volume":"123","author":"hill","year":"1995","journal-title":"Proceedings of the American Mathematical Society"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177704862"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1214\/ss\/1177009869"},{"key":"ref23","first-page":"193","article-title":"The first digit phenomenon","volume":"122","author":"logan","year":"1978","journal-title":"Proceedings of the American Philosophical Society"},{"key":"ref26","first-page":"72","article-title":"A taxpayer compliance application of benford's law","volume":"18","author":"nigrini","year":"1996","journal-title":"The Journal of the American Taxation Association"},{"key":"ref25","first-page":"16","article-title":"Assessing the quality of data used for benchmarking and decision-making","volume":"51","author":"wallace","year":"2002","journal-title":"The Journal of Government Financial Management"}],"event":{"name":"2017 IEEE Conference on Computational Intelligence in Bioinformatics and Computational Biology (CIBCB)","start":{"date-parts":[[2017,8,23]]},"location":"Manchester, United Kingdom","end":{"date-parts":[[2017,8,25]]}},"container-title":["2017 IEEE Conference on Computational Intelligence in Bioinformatics and Computational Biology (CIBCB)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8052580\/8058518\/08058547.pdf?arnumber=8058547","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,4]],"date-time":"2019-10-04T05:00:11Z","timestamp":1570165211000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8058547\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/cibcb.2017.8058547","relation":{},"subject":[],"published":{"date-parts":[[2017,8]]}}}