[1]
S. Riyana, K. Sasujit, and N. Homdoung, “Achieving Privacy Preservation Constraints based on K-Anonymity in conjunction with Adjacency Matrix and Weighted Graphs”, ECTI-CIT Transactions, vol. 18, no. 1, pp. 34–50, Jan. 2024.