Research Article

Validating User Flows to Protect Software Defined Network Environments

Figure 6

Simulation setup.