Figure 6From: Modeling interaction using trust and recommendation in ubiquitous computing environmentStrategic behavior attack.Back to article page