Research Article

Two Quarantine Models on the Attack of Malicious Objects in Computer Network

Figure 1

Schematic diagram for the flow of malicious objects in computer network.
407064.fig.001