Figure 5From: Modeling interaction using trust and recommendation in ubiquitous computing environmentDetecting malicious recommendations.Back to article page