[1]
Riyana, S., Sasujit, K. and Homdoung, N. 2024. Achieving Privacy Preservation Constraints based on K-Anonymity in conjunction with Adjacency Matrix and Weighted Graphs. ECTI Transactions on Computer and Information Technology (ECTI-CIT). 18, 1 (Jan. 2024), 34–50. DOI:https://doi.org/10.37936/ecti-cit.2024181.253483.