Part I
Malicious Attack Propagation