Fig. 5From: Vulnerabilities and solutions for isolation in FlowVisor-based virtual network environmentsTraffic injection attack test without action slicingBack to article page