Figure 10From: Privacy-by-design in big data analytics and social mining Distribution of the re-identification probability obtained by simulating attack model 1 with different levels of background knowledge. Back to article page