Benford, F., 1938. The law of anomalous numbers. Proc. Am. Philosophical Society, 4: 551-572. Durtschi, C., W. Hillison and C. Pacini, 2004. The effective use of Benford’s law to assist in detecting fraud in accounting data. J. Forensic Account., 5: 17-34. Geyer, A. and J. Marti, 2012, Applying Benford's law to volcanology. Geology, 40: 327-330. DOI: 10.1130/G32787.1 Hand, D., H. Mannila and P. Smyth, 2001. Principles of Data Mining. 1st Edn., MIT Press, Cambridge, ISBN-10: 026208290X, pp: 546. Hesketh, D., 2010. Weaknesses in the supply chain: Who packed the box. World Customs J., 4: 3-20. Hoffman, W., 2008. Fighting supply-chain fraud. Traffic World. Hu, D., 2009. Exploratory study on computer forensics technology. Proceedings of the 2nd International Conference on Computer and Electrical Engineering, Dec. 28-30, IEEE Xplore Press, Dubai, pp: 608-611. DOI: 10.1109/ICCEE.2009.258 Kroll Advisory, 2012. Global fraud report. Kroll Consulting, USA, Fall. Massa, D. and R. Valverde, 2014. A fraud detection system based on anomaly intrusion detection systems for e-commerce applications. Comput. Inform. Sci., 7: 117-140. DOI: 10.5539/cis.v7n2p117 Mayne, M., 2010. Elementary, my dear Watson? For IT Security Professionals, SC Magazine. Mishra, J.S., S. Panda and A.K. Mishra, 2013. A novel approach for credit card fraud detection targeting the Indian market. Int. J. Comput. Sci., 10: 172-179. Nigrini, 1996. A taxpayer compliance application of Benford’s Law. J. Am. Taxat. Assoc., 18: 72-91 Nigrini, M. J.,Mittermaier, L. J. 1997. The use of Benford's law as an aid in analytical procedures. Auditing, 16: 52-67. Nigrini, M.J. 1999. 'I've Got Your Number'. J. Accountancy, 187: 79-83. Nigrini, M., 2012. Benford’s Law: Applications for Forensic Accounting, Auditing and Fraud Detection. 1st Edn., John Wiley and Sons, Hoboken, New Jersey, ISBN-10: 1118152859, pp: 330. Nirkhi, S.M., R.V. Dharaskar and V.M. Thakre, 2012. Data mining: A prospective approach for digital forensics. Int. J. Data Min. Knowl. Manage. Process, 2: 41-48. Özera, G. and B. Babacanb, 2013. Benford's Law and Digital Analysis: Application on Turkish Banking Sector. Bus. Econom. Res. J., 4: 29-41. Stephens, J. and R. Valverde, 2013. Security of e-procurement transactions in supply chain reengineering. Comput. Inform. Sci., 6: 1-20. DOI: 10.5539/cis.v6n3p1 Tödter, K.H., 2009. Benford’s law as an indicator of fraud in economics. German Econom. Rev., 10: 339-351. DOI: 10.1111/j.1468-0475.2009.00475.x