Fig. 8From: A risk model for privacy in trajectory dataUser trajectory data in the different tessellated areas. An example of user trajectory through the different tessellated areas observed at an hour-level and at a day-levelBack to article page