Fig. 5From: A crowdsourcing method for online social networks security assessment based on human-centric computingPerformance of the proposed algorithmBack to article page