Return to Article Details Controlling Strategy For Propagation of Malicious Codes In a Computer Network Download Download PDF