Abstract
Previously, we proposed techniques to detect the misuse of search systems using predominantly relevance feedback based techniques. Although the approaches developed achieved high detection rate, they did so with a relatively high rate of false alarm. We now present a clustering query results based approach. This approach supports a higher precision, i.e., lower false alarm rate, with only a modest compromise on detection rate, namely recall.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Goharian, N., Ma, L.: On Off-Topic Access Detection In Information Systems. In: ACM 14th Conference on Information and Knowledge Management, CIKM (November 2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Goharian, N., Platt, A. (2006). Detection Using Clustering Query Results. In: Mehrotra, S., Zeng, D.D., Chen, H., Thuraisingham, B., Wang, FY. (eds) Intelligence and Security Informatics. ISI 2006. Lecture Notes in Computer Science, vol 3975. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11760146_83
Download citation
DOI: https://doi.org/10.1007/11760146_83
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-34478-0
Online ISBN: 978-3-540-34479-7
eBook Packages: Computer ScienceComputer Science (R0)