Fig. 17From: Modeling self-propagating malware with epidemiological modelsInput for DAISY to evaluate the SIIDR structural identifiability of parameters when output is the sum of infected, infected dormant and recovered individualsBack to article page