Fig. 3From: Modeling self-propagating malware with epidemiological modelsSchematic representation of the SIIDR modelBack to article page