
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Review of semi-supervised method for Intrusion Detection System
Sofy Fitriani, Satria Mandala, Muhammad Ary Murti
(2016), pp. 36-41
Closed Access | Times Cited: 27
Sofy Fitriani, Satria Mandala, Muhammad Ary Murti
(2016), pp. 36-41
Closed Access | Times Cited: 27
Showing 1-25 of 27 citing articles:
An improved method to detect arrhythmia using ensemble learning-based model in multi lead electrocardiogram (ECG)
Satria Mandala, Ardian Rizal, Adiwijaya Adiwijaya, et al.
PLoS ONE (2024) Vol. 19, Iss. 4, pp. e0297551-e0297551
Open Access | Times Cited: 18
Satria Mandala, Ardian Rizal, Adiwijaya Adiwijaya, et al.
PLoS ONE (2024) Vol. 19, Iss. 4, pp. e0297551-e0297551
Open Access | Times Cited: 18
Clustering based semi-supervised machine learning for DDoS attack classification
Muhammad Aamir, Syed Mustafa Ali Zaidi
Journal of King Saud University - Computer and Information Sciences (2019) Vol. 33, Iss. 4, pp. 436-446
Open Access | Times Cited: 132
Muhammad Aamir, Syed Mustafa Ali Zaidi
Journal of King Saud University - Computer and Information Sciences (2019) Vol. 33, Iss. 4, pp. 436-446
Open Access | Times Cited: 132
Random Partitioning Forest for Point-Wise and Collective Anomaly Detection—Application to Network Intrusion Detection
Pierre-François Marteau
IEEE Transactions on Information Forensics and Security (2021) Vol. 16, pp. 2157-2172
Open Access | Times Cited: 65
Pierre-François Marteau
IEEE Transactions on Information Forensics and Security (2021) Vol. 16, pp. 2157-2172
Open Access | Times Cited: 65
Semi-supervised multi-layered clustering model for intrusion detection
Omar Y. Al-Jarrah, Yousof Al-Hammadi, Paul D. Yoo, et al.
Digital Communications and Networks (2017) Vol. 4, Iss. 4, pp. 277-286
Open Access | Times Cited: 60
Omar Y. Al-Jarrah, Yousof Al-Hammadi, Paul D. Yoo, et al.
Digital Communications and Networks (2017) Vol. 4, Iss. 4, pp. 277-286
Open Access | Times Cited: 60
SU-IDS: A Semi-supervised and Unsupervised Framework for Network Intrusion Detection
Erxue Min, Jun Long, Qiang Liu, et al.
Lecture notes in computer science (2018), pp. 322-334
Closed Access | Times Cited: 46
Erxue Min, Jun Long, Qiang Liu, et al.
Lecture notes in computer science (2018), pp. 322-334
Closed Access | Times Cited: 46
Feature dynamic deep learning approach for DDoS mitigation within the ISP domain
Ili Ko, Desmond Chambers, Enda Barrett
International Journal of Information Security (2019) Vol. 19, Iss. 1, pp. 53-70
Closed Access | Times Cited: 32
Ili Ko, Desmond Chambers, Enda Barrett
International Journal of Information Security (2019) Vol. 19, Iss. 1, pp. 53-70
Closed Access | Times Cited: 32
Identifying shoplifting behaviors and inferring behavior intention based on human action detection and sequence analysis
Siyeon Kim, Sungjoo Hwang, Seok Hwan Hong
Advanced Engineering Informatics (2021) Vol. 50, pp. 101399-101399
Closed Access | Times Cited: 20
Siyeon Kim, Sungjoo Hwang, Seok Hwan Hong
Advanced Engineering Informatics (2021) Vol. 50, pp. 101399-101399
Closed Access | Times Cited: 20
A Survey on the Applications of Semi-supervised Learning to Cyber-security
Paul K. Mvula, Paula Branco, Guy-Vincent Jourdan, et al.
ACM Computing Surveys (2024) Vol. 56, Iss. 10, pp. 1-41
Open Access | Times Cited: 2
Paul K. Mvula, Paula Branco, Guy-Vincent Jourdan, et al.
ACM Computing Surveys (2024) Vol. 56, Iss. 10, pp. 1-41
Open Access | Times Cited: 2
Atrial Fibrillation Feature Extraction Algorithm on Multi Channel ECG Signals Using ECG Dynamic Features
Rezki Diwanti Suci Lestari, Satria Mandala, Mohammad Rizki Akbar
(2024), pp. 82-86
Closed Access | Times Cited: 1
Rezki Diwanti Suci Lestari, Satria Mandala, Mohammad Rizki Akbar
(2024), pp. 82-86
Closed Access | Times Cited: 1
Unsupervised learning with hierarchical feature selection for DDoS mitigation within the ISP domain
Ili Ko, Desmond Chambers, Enda Barrett
ETRI Journal (2019) Vol. 41, Iss. 5, pp. 574-584
Open Access | Times Cited: 13
Ili Ko, Desmond Chambers, Enda Barrett
ETRI Journal (2019) Vol. 41, Iss. 5, pp. 574-584
Open Access | Times Cited: 13
DDoS Detection by Using Information Gain-Naïve Bayes
Satria Mandala, Alvien Ihsan Ramadhan, Maya Rosalinda, et al.
(2022), pp. 283-288
Closed Access | Times Cited: 7
Satria Mandala, Alvien Ihsan Ramadhan, Maya Rosalinda, et al.
(2022), pp. 283-288
Closed Access | Times Cited: 7
An effective semi-supervised model for intrusion detection using feature selection based LapSVM
Xiaofeng Zhang, Chengyu Hu, Jianwei Tian, et al.
(2017), pp. 283-286
Closed Access | Times Cited: 10
Xiaofeng Zhang, Chengyu Hu, Jianwei Tian, et al.
(2017), pp. 283-286
Closed Access | Times Cited: 10
DDoS Detection Using Information Gain Feature Selection and Random Forest Classifier
Satria Mandala, Alvien Ihsan Ramadhan, Maya Rosalinda, et al.
(2022), pp. 294-299
Closed Access | Times Cited: 6
Satria Mandala, Alvien Ihsan Ramadhan, Maya Rosalinda, et al.
(2022), pp. 294-299
Closed Access | Times Cited: 6
A Lightweight DDoS Attack Mitigation System within the ISP Domain Utilising Self-organizing Map
Ili Ko, Desmond Chambers, Enda Barrett
Advances in intelligent systems and computing (2018), pp. 173-188
Closed Access | Times Cited: 6
Ili Ko, Desmond Chambers, Enda Barrett
Advances in intelligent systems and computing (2018), pp. 173-188
Closed Access | Times Cited: 6
DDoS Attack Detection System using Neural Network on Internet of Things
Lulus Wahyu Prasetya Adi, Satria Mandala, Yudhistira Nugraha
(2022), pp. 41-46
Closed Access | Times Cited: 4
Lulus Wahyu Prasetya Adi, Satria Mandala, Yudhistira Nugraha
(2022), pp. 41-46
Closed Access | Times Cited: 4
D-Score: An expert-based method for assessing the detectability of IoT-related cyber-attacks
Yair Meidan, Daniel Benatar, Ron Bitton, et al.
Computers & Security (2022) Vol. 126, pp. 103073-103073
Open Access | Times Cited: 4
Yair Meidan, Daniel Benatar, Ron Bitton, et al.
Computers & Security (2022) Vol. 126, pp. 103073-103073
Open Access | Times Cited: 4
Review on Network Intrusion Detection Techniques using Machine Learning
K Shashank, Mamatha Balachandra
(2018), pp. 104-109
Closed Access | Times Cited: 4
K Shashank, Mamatha Balachandra
(2018), pp. 104-109
Closed Access | Times Cited: 4
Enhanced Identification of Valvular Heart Diseases through Selective Phonocardiogram Features Driven by Convolutional Neural Networks (SFD-CNN)
Muhammad Rafli Ramadhan, Satria Mandala, Rafi Ullah, et al.
Jurnal Nasional Teknik Elektro (2024), pp. 20-35
Open Access
Muhammad Rafli Ramadhan, Satria Mandala, Rafi Ullah, et al.
Jurnal Nasional Teknik Elektro (2024), pp. 20-35
Open Access
Myocardial Infarction Detection Using Hybrid Deep Learning on Phonocardiogram Data
Mohammad Axel Ariapaskha, Satria Mandala
(2024) Vol. 9, pp. 111-116
Closed Access
Mohammad Axel Ariapaskha, Satria Mandala
(2024) Vol. 9, pp. 111-116
Closed Access
Prediction of Myocardial Infarction Using Convolutional Neural Network Method on Electrocardiogram Signal
Prinintya Nuri Alifa, Satria Mandala
(2024) Vol. 13, pp. 105-110
Closed Access
Prinintya Nuri Alifa, Satria Mandala
(2024) Vol. 13, pp. 105-110
Closed Access
Improving Pest Detection in Strawberry Plants Using Transfer Learning Models
Timothy Simon Sihombing, Satria Mandala
(2024), pp. 343-348
Closed Access
Timothy Simon Sihombing, Satria Mandala
(2024), pp. 343-348
Closed Access
Detection Syn Flood and UDP Lag Attacks Based on Machine Learning Using AdaBoost
Nova Hanafi Syafiuddin, Satria Mandala, Niken Dwi Wahyu Cahyani
(2023), pp. 36-41
Closed Access | Times Cited: 1
Nova Hanafi Syafiuddin, Satria Mandala, Niken Dwi Wahyu Cahyani
(2023), pp. 36-41
Closed Access | Times Cited: 1
A DDoS defence framework in software defined network using ensemble classifier with rough set theory based feature selection
Riyad AM
International Journal of Advanced Technology and Engineering Exploration (2021) Vol. 8, Iss. 82, pp. 1120-1135
Open Access | Times Cited: 2
Riyad AM
International Journal of Advanced Technology and Engineering Exploration (2021) Vol. 8, Iss. 82, pp. 1120-1135
Open Access | Times Cited: 2
Development of a Smart Home Security System Using Facial Recognition Method Through Convolutional Neural Network
Bagas Wara Surya Kusuma, Satria Mandala
(2023), pp. 52-56
Closed Access
Bagas Wara Surya Kusuma, Satria Mandala
(2023), pp. 52-56
Closed Access
Enhanced Face Recognition Intelligent System on Smart Home Security and Control with CNN
Satria Mandala, Rifqi Ramadhan, Muhamad Irsan
(2023), pp. 609-614
Closed Access
Satria Mandala, Rifqi Ramadhan, Muhamad Irsan
(2023), pp. 609-614
Closed Access