Figure 9From: Privacy-by-design in big data analytics and social mining Distribution of the re-identification probability obtained by simulating attack model 2 with a background knowledge of 4 weeks. Back to article page