Figure 4From: A mechanism for detecting dishonest recommendation in indirect trust computationFiltering accuracy in terms of MCC. (a) Bad mouthing attack and (b) ballot stuffing.Back to article page