Research Article

A Virus Propagation Model and Optimal Control Strategy in the Point-to-Group Network to Information Security Investment

Figure 2

Evolution of the number of exposed nodes with or without control.