Fig. 6From: A crowdsourcing method for online social networks security assessment based on human-centric computingComparative summary of the performance between the proposed algorithm and the two other algorithmsBack to article page