Research Article

Validating User Flows to Protect Software Defined Network Environments

Figure 11

Comparison of delay.