Fig. 12From: Modeling self-propagating malware with epidemiological modelsSchematic representation of the SIS modelBack to article page