Fig. 15
From: Social network data analysis to highlight privacy threats in sharing data

Attributes reconstruction by exploring all analyzed social except for VKontakte
From: Social network data analysis to highlight privacy threats in sharing data
Attributes reconstruction by exploring all analyzed social except for VKontakte