Research Article

A Novel Computer Virus Propagation Model under Security Classification

Figure 5

Trajectory figure and time plots of Example 3.
(a)
(b)
(c)