[1]
M. I. Burhan, A. N. Ali, A. I. Auliyah, and M. Hading, “Comparative Analysis of Algorithms for Sensitive Outlier Protection in Privacy Preserving Data Mining”, teknokompak, vol. 19, no. 2, pp. 28 - 38, Apr. 2025.