Research Article
Quantitative Analysis of the Security of Software-Defined Network Controller Using Threat/Effort Model
Table 1
Calculation results of TE values of entry points and exit points of the controller.
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Note. DEP: direct entry point; DExP: direct exit point; IEP: indirect entry point; IExP: indirect exit point. |