Skip to main content
Figure 1 | EURASIP Journal on Wireless Communications and Networking

Figure 1

From: A mechanism for detecting dishonest recommendation in indirect trust computation

Figure 1

Detecting attack. (a) BM, 10% dishonest recommender. (b) BM, 20% dishonest recommender. (c) BM, 30% dishonest recommender. (d) BM, 40% dishonest recommender. (e) BS, 10% dishonest recommender. (f) BS, 20% dishonest recommender. (g) BS, 30% dishonest recommender. (h) BS, 40% dishonest recommender. (i) RO, 10% dishonest recommender. (j) RO, 20% dishonest recommender. (k) RO, 30% dishonest recommender. (l) RO, 40% dishonest recommender.

Back to article page