Research Article

A Novel Computer Virus Propagation Model under Security Classification

Figure 7

Trajectory figure and time plots of Example 5.
(a)
(b)
(c)