Fig. 6
From: Vulnerabilities and solutions for isolation in FlowVisor-based virtual network environments

Traffic injection attack test with action slicing
From: Vulnerabilities and solutions for isolation in FlowVisor-based virtual network environments
Traffic injection attack test with action slicing