Skip to main content
. 2016 Dec 28;11(12):e0168583. doi: 10.1371/journal.pone.0168583

Table 2. Simulated malware infection.

size n of the outbreak config. 1 config. 2
1 0 0
2 1 0
3 0 0
4 3 0
5 5 3
6 1 4
7 4 6
8 5 5
9 9 8
10 6 25
11 13 33
12 22 39
13 29 85
14 44 131
15 86 160
16 135 164
17 182 150
18 245 113
19 173 64
20 37 10

Data: number of occurrences of an outbreak of size n under two configurations, after a fixed time period [39]