Report - A Comprehensive Study of Shilling Attacks in Recommender Systemsijcsi.org/papers/IJCSI-14-4-44-50.pdf · 3. Shilling attack detection strategies In order to mount an attack, attacker

Please pass captcha verification before submit form