Table 2. Simulated malware infection.
size n of the outbreak | config. 1 | config. 2 |
---|---|---|
1 | 0 | 0 |
2 | 1 | 0 |
3 | 0 | 0 |
4 | 3 | 0 |
5 | 5 | 3 |
6 | 1 | 4 |
7 | 4 | 6 |
8 | 5 | 5 |
9 | 9 | 8 |
10 | 6 | 25 |
11 | 13 | 33 |
12 | 22 | 39 |
13 | 29 | 85 |
14 | 44 | 131 |
15 | 86 | 160 |
16 | 135 | 164 |
17 | 182 | 150 |
18 | 245 | 113 |
19 | 173 | 64 |
20 | 37 | 10 |
Data: number of occurrences of an outbreak of size n under two configurations, after a fixed time period [39]