War of End-User Malware
Malware-ridden Device 1 approaches Malware-ridden Device 2
A network surveillance tool plots the quick interactions like a slow RTS.
30% of the viruses and trojans in Device 1 infest Device 2
but the remaining 70% are replaced by Device 2’s worms and spywares.