Fig. 10From: Toward a testbed for evaluating computational trust models: experiments and analysisSlandering attack using a feedback history graphBack to article page