Fig. 9From: Toward a testbed for evaluating computational trust models: experiments and analysisSlandering attack scenario 2 – EigenTrustBack to article page