Return to Article Details A survey on various available techniques for preventing sensitive information in social network from different attacks Download Download PDF