Figure 5From: A mechanism for detecting dishonest recommendation in indirect trust computationFPR vs FNR (in bad mouthing attack). (a) Control limit charts. (b) Iterative filtering. (c) Quartile.Back to article page