Research Article

A Novel Computer Virus Propagation Model under Security Classification

Figure 3

Trajectory figure and time plots of Example 1.
(a)
(b)
(c)