Return to Article Details Data Mining Application: Attack Resistant Trust Metrics Download Download PDF