Research Article

Two Quarantine Models on the Attack of Malicious Objects in Computer Network

Figure 2

Time series of susceptible population , , , , and of the system (2.1).
407064.fig.002