Return to Article Details Modeling the Spread and Mitigation of Cybersecurity Threats using Non-Homogeneous Heat Equations with Boundary Conditions Download Download PDF