{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T16:21:37Z","timestamp":1725553297320},"publisher-location":"Berlin, Heidelberg","reference-count":6,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540344780"},{"type":"electronic","value":"9783540344797"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11760146_73","type":"book-chapter","created":{"date-parts":[[2006,5,9]],"date-time":"2006-05-09T15:29:38Z","timestamp":1147188578000},"page":"647-649","source":"Crossref","is-referenced-by-count":0,"title":["On Off-Topic Web Browsing"],"prefix":"10.1007","author":[{"given":"Nazli","family":"Goharian","sequence":"first","affiliation":[]},{"given":"Alana","family":"Platt","sequence":"additional","affiliation":[]},{"given":"Ophir","family":"Frieder","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"73_CR1","doi-asserted-by":"crossref","unstructured":"Cathey, R., Ma, L., Goharian, N., Grossman, D.: Misuse Detection for Information Retrieval Systems. In: ACM Conf. of Inform. & Knowledge Management, CIKM (November 2003)","DOI":"10.1145\/956863.956901"},{"key":"73_CR2","unstructured":"Frieder, et al: Detection of Misuse of Authorized Access in an Information Retrieval System, US Patent# 09\/929,094, filed August 14 (2001)"},{"key":"73_CR3","unstructured":"Goharian, N., Ma, L.: Query Length Impact on Misuse Detection in Information Retrieval Systems. In: ACM 20th Symp. on Applied Computing, SAC (March 2005)"},{"key":"73_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"604","DOI":"10.1007\/11427995_69","volume-title":"Intelligence and Security Informatics","author":"N. Goharian","year":"2005","unstructured":"Goharian, N., Ma, L., Meyers, C.: Detecting misuse of information retrieval systems using data mining techniques. In: Kantor, P., Muresan, G., Roberts, F., Zeng, D.D., Wang, F.-Y., Chen, H., Merkle, R.C. (eds.) ISI 2005. LNCS, vol.\u00a03495, pp. 604\u2013605. Springer, Heidelberg (2005)"},{"key":"73_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"671","DOI":"10.1007\/11760146_83","volume-title":"Intelligence and Security Informatics","author":"N. Goharian","year":"2006","unstructured":"Goharian, N., Platt, A.: Detection Using Clustering Query Results. In: Mehrotra, S., Zeng, D.D., Chen, H., Thuraisingham, B., Wang, F.-Y. (eds.) ISI 2006. LNCS, vol.\u00a03975, pp. 671\u2013673. Springer, Heidelberg (2006)"},{"key":"73_CR6","unstructured":"Knepper, M., Fox, K., Frieder, O.: Query Improvement Elevation Technique (QUIET). Intelligence Analysis (May 2005)"}],"container-title":["Lecture Notes in Computer Science","Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11760146_73.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:08:31Z","timestamp":1619507311000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11760146_73"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540344780","9783540344797"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/11760146_73","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}