Research Article

Stopping the Cyberattack in the Early Stage: Assessing the Security Risks of Social Network Users

Figure 8

The distribution of topics.
(a) The distribution of the topics of microblogs of user
(b) The distribution of the topics of microblogs of user