Detecting Misuse of Information Retrieval Systems Using Data Mining Techniques

Nazli Goharian, Ling Ma, Chris Meyers. Detecting Misuse of Information Retrieval Systems Using Data Mining Techniques. In Paul B. Kantor, Gheorghe Muresan, Fred Roberts, Daniel Dajun Zeng, Fei-Yue Wang, Hsinchun Chen, Ralph C. Merkle, editors, Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005, Proceedings. Volume 3495 of Lecture Notes in Computer Science, pages 604-605, Springer, 2005. [doi]

@inproceedings{GoharianMM05,
  title = {Detecting Misuse of Information Retrieval Systems Using Data Mining Techniques},
  author = {Nazli Goharian and Ling Ma and Chris Meyers},
  year = {2005},
  doi = {10.1007/11427995_69},
  url = {http://dx.doi.org/10.1007/11427995_69},
  tags = {information retrieval, data-flow},
  researchr = {https://researchr.org/publication/GoharianMM05},
  cites = {0},
  citedby = {0},
  pages = {604-605},
  booktitle = {Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005, Proceedings},
  editor = {Paul B. Kantor and Gheorghe Muresan and Fred Roberts and Daniel Dajun Zeng and Fei-Yue Wang and Hsinchun Chen and Ralph C. Merkle},
  volume = {3495},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  isbn = {3-540-25999-6},
}