Fig. 3From: Vulnerabilities and solutions for isolation in FlowVisor-based virtual network environmentsTest environment for the proposed experimentsBack to article page