Research Article

Analyzing User Awareness of Privacy Data Leak in Mobile Applications

Figure 5

Depth-first search tree in user inputs emulation.