Figure 6From: Virtual network security: threats, countermeasures, and challenges Examples of sharing and mapping of backup instances, used by Yeow et al. [ 32 ] to provide resilient virtual networks. Back to article page