1. Aggrawal, G., Feder, T., Kenthapadi, K., Motwani, R., Panigrahy, R., Thomas, D. & Zhu, A. (2005). Approximation algorithms for k-anonymity. Journal of Privacy Tech.
2. Privacy-preserving data mining
3. Asuncion, A., & Newman, D. J. (2007) UCI machine learning repository. Retrieved from http://www.ics.uci.edu/~mlearn/MLRepository.html
4. Data Privacy through Optimal k-Anonymization
5. Efficient k-anonymization using clustering techniques.;J. W.Byun;International Conference on Database Systems for Advanced Applications (DASFAA,2007