Figure 6From: A mechanism for detecting dishonest recommendation in indirect trust computationFPR vs FNR (in ballot stuffing attack). (a) Control limit charts. (b) Iterative filtering. (c) Quartile.Back to article page