Skip to main content
. 2024 Apr 10;11:362. doi: 10.1038/s41597-024-03088-4

Fig. 2.

Fig. 2

Simplified schematic of the approach used to create the initial dataset, perform confidentiality protection, risk assessment, and technical validation to obtain the final protected dataset.