Fig. 2From: Vulnerabilities and solutions for isolation in FlowVisor-based virtual network environmentsFlowVisor operation with action slicingBack to article page