Research Article

Modelling and Control of Trojan Propagation via Online Game Accelerators

Figure 2

Solutions of system (1) with and .