1. Babu KS, Jena SK, Hota J, Moharana B (2013) Anonymizing social networks: a generalization approach. Comput Electr Eng 39:1947–1961
2. Babu KS, Reddy N, Kumar N, Elliot M, Jena SK (2013) Achieving k-anonymity using improved greedy heuristics for very large relational databases. Trans Data Privacy 6:1–17
3. Campan A, Truta TM (2008) Data and structural K-anonymity in social networks. In: Proceedings of the 2nd ACM SIGKDD International Workshop on Privacy, Security, and Trust in KDD (PinKDD'08), in Conjunction with KDD'08, Las Vegas, Nevada, USA
4. Casas-Roma J, Herrera-Joancomarti J, Torra V (2017) k-Degree anonymity and edge selection: improving data utility in large networks. Knowl Inf Syst 50:447–474
5. Chester S, Kapron BM, Ramesh G, Srivastava G, Thomo A, Venkatesh S (2011) k-Anonymization of social networks by vertex addition. ADBIS (2):107–116