Fig. 8From: Toward a testbed for evaluating computational trust models: experiments and analysisSlandering attack scenario 1 – EigenTrustBack to article page