Research Article

Validating User Flows to Protect Software Defined Network Environments

Figure 2

Enhanced flow table.