Research Article

A Novel Computer Virus Propagation Model under Security Classification

Figure 6

Trajectory figure and time plots of Example 4.
(a)
(b)
(c)