Fig. 6From: Vulnerabilities and solutions for isolation in FlowVisor-based virtual network environmentsTraffic injection attack test with action slicingBack to article page