Research Article

A Novel Computer Virus Propagation Model under Security Classification

Figure 4

Trajectory figure and time plots of Example 2.
(a)
(b)
(c)