Figure 1From: A mechanism for detecting dishonest recommendation in indirect trust computationDetecting attack. (a) BM, 10% dishonest recommender. (b) BM, 20% dishonest recommender. (c) BM, 30% dishonest recommender. (d) BM, 40% dishonest recommender. (e) BS, 10% dishonest recommender. (f) BS, 20% dishonest recommender. (g) BS, 30% dishonest recommender. (h) BS, 40% dishonest recommender. (i) RO, 10% dishonest recommender. (j) RO, 20% dishonest recommender. (k) RO, 30% dishonest recommender. (l) RO, 40% dishonest recommender.Back to article page