Research Article

Quantitative Analysis of the Security of Software-Defined Network Controller Using Threat/Effort Model

Figure 3

Relationship between direct entry point function and direction of data flow.
(a)
(b)
(c)
(d)