In this thesis, the problem of decontaminating networks from Black Viruses (BVs) using a team of system mobile agents, i.e., the BVD problem, is investigated. The BV is a dynamic harmful process which, like the extensively studied black hole (BH), destroys any agent arriving at the network site where it resides; when that occurs, unlike a black hole which is static by definition, a BV moves, spreading to all the neighbouring sites, thus increasing its presence in the network. The initial location of Firstly, I would like to express my sincere gratitude to my advisors Professors Nicola Santoro and Paola Flocchini for their enthusiastic motivation, judicious and enlightening advices, and patient guidance throughout this research work! Their passion for distributed computing, dedication to knowledge acquiring and science developing, and an unrelenting attitude to detail all inspire me. On the other hand, their modest academic style creates an excellent research environment. They carefully selected my courses and topics, and at the same time, provided me enough flexibility to suit my work and life. Our meetings and discussions always take away their precious lunch-break time... Without their continuous support of my Ph.D. study and related research, it would not be possible for me to complete this work. Last but not the least, I would like to thank my wife, Yan Gong, and my daughter, Jessica Cai. Working full-time and supporting a family, and at the same time, studying and doing research part-time for my Ph.D. degree are definitely challenge to me. Without my family's understanding, encouragement, support, and sacrifices, I would not achieve this. I also like to thank my parents for their life-time inspiration and encouragement. vTable of Contents Abstract iii Acknowledgements Abbreviations API Application Programming Interface BH Black Hole BHS Black Hole Search BV Black Virus BVC Black Virus Clone BVD Black Virus Decontamination DisJ Distributed Algorithm Simulation Java EA Exploring Agent IC Intruder Capture IZ Impacting Zone LC Locality of Casualty LEA Leader Exploring Agent MBVD Multiple Black Virus Decontamination MF MBV Decontamination -Fertile MS MBV Decontamination -Sterile SA Shadowing Agent SD Standard Deviation xii Chapter 1 networks), settings (synchronous and asynchronous), agent distribution (co-located or dispersed), communicating mechanisms, and etc. More detailed literature review will be provided in Chapter 2. BH is harmful to agents but it is static, that is, it does not propagate in the network and so it is not harmful to other sites. The number of BHs does not increase or decrease during the search. The theoretical work related to harmful agents has focused on the problem called Intruder Capture (IC) (also known as graph decontamination and connected graph search): an extraneous mobile agent, the intruder, moves arbitrarily fast through the network infecting the visited sites; the task is to decontaminate the network using a team of system agents avoiding recontamination. The IC problem has been...