Figure 7From: Virtual network security: threats, countermeasures, and challenges A live streaming data flow is distributed among different virtual networks, a mechanism used by Zhang et al. [ 27 ]. Back to article page