Research Article

Two Quarantine Models on the Attack of Malicious Objects in Computer Network

Figure 3

Effect of quarantine on recovered nodes .
407064.fig.003