Modeling and detecting anomalous topic access | IEEE Conference Publication | IEEE Xplore