War of End-User Malware Malware-ridden Device 1 approaches Malware-ridden Device 2
A network surveillance tool plots the quick interactions like a slow RTS. 30% of the viruses and trojans in Device 1 infest Device 2 but the remaining 70% are replaced by Device 2’s worms and spywares.
