Return to Article Details Data Mining Application: Attack Resistant Trust Metrics