Research Article

Stopping the Cyberattack in the Early Stage: Assessing the Security Risks of Social Network Users

Figure 9

The axisymmetric mapping of figures.
(a) The axisymmetric mapping of Figure 8(a)
(b) The axisymmetric mapping of Figure 8(b)