Query length impact on misuse detection in information retrieval systems
Proceedings of the 2005 ACM symposium on Applied computing
On off-topic access detection in information systems
Proceedings of the 14th ACM international conference on Information and knowledge management
ISI'06 Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics
Hi-index | 0.00 |
Misuse detection is often based on file permissions. That is, each authorized user can only access certain files. Predetermining the mapping of documents to allowable users, however, is highly difficult in large document collections. Initially, we utilized information retrieval techniques to warn of potential misuse. Here, we describe some data mining extensions used in our detection approach.