Skip to main content

Table 3 Security threats mentioned in publications in the area of virtual network security

From: Virtual network security: threats, countermeasures, and challenges

Publication

Threats

 

DI

DE

DR

US

[4]

×

   

[19]

×

   

[21]

×

   

[22]

×

   

[23]

×

   

[24]

×

   

[10]

×

×

  

[20]

×

×

  

[5]

×

×

 

×

[25]

 

×

  

[26]

 

×

×

 

[36]

   

×

[6]

  

×

 

[7]

  

×

 

[27]

  

×

 

[28]

  

×

 

[29]

  

×

 

[30]

  

×

 

[31]

  

×

 

[32]

  

×

 

[33]

  

×

 

[34]

  

×

 

[35]

  

×

 
  1. From left to right: Disclosure, Deception, Disruption, Usurpation.