Nazli Goharian, Ling Ma, Chris Meyers. Detecting Misuse of Information Retrieval Systems Using Data Mining Techniques. In Paul B. Kantor, Gheorghe Muresan, Fred Roberts, Daniel Dajun Zeng, Fei-Yue Wang, Hsinchun Chen, Ralph C. Merkle, editors, Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005, Proceedings. Volume 3495 of Lecture Notes in Computer Science, pages 604-605, Springer, 2005. [doi]
@inproceedings{GoharianMM05, title = {Detecting Misuse of Information Retrieval Systems Using Data Mining Techniques}, author = {Nazli Goharian and Ling Ma and Chris Meyers}, year = {2005}, doi = {10.1007/11427995_69}, url = {http://dx.doi.org/10.1007/11427995_69}, tags = {information retrieval, data-flow}, researchr = {https://researchr.org/publication/GoharianMM05}, cites = {0}, citedby = {0}, pages = {604-605}, booktitle = {Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005, Proceedings}, editor = {Paul B. Kantor and Gheorghe Muresan and Fred Roberts and Daniel Dajun Zeng and Fei-Yue Wang and Hsinchun Chen and Ralph C. Merkle}, volume = {3495}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-25999-6}, }