Fig. 13From: Modeling self-propagating malware with epidemiological modelsSchematic representation of the SIR modelBack to article page