Fig. 5From: Automated identification of sensitive data from implicit user specificationEvaluation results under different thresholdsBack to article page