- 1 -. - 2 - Agenda Introduction Charactarization of Attacks Attack models Effectivness analysis Countermeasures Privacy aspects Discussion.
Attacks on collaborative recommender systems