Fig. 12From: A risk model for privacy in trajectory dataCoverage with respect to privacy riskBack to article page