Research Article

Epidemic Model of Algorithm-Enhanced Dedicated Virus through Networks

Table 1

Parameter assignment. The first three lines show the encryption types and their corresponding typical time scales and the last two lines show typical time scales to crack the simple or complex password and the probability to fail cracking.