Seeking the Hidden Threat: Applications of a New Approach in Pipeline Leak Detection