Research Article

A Data Leakage Prevention Method Based on the Reduction of Confidential and Context Terms for Smart Mobile Devices

Figure 2

An example of confidential nodes connected through their context nodes.