Research Article

Validating User Flows to Protect Software Defined Network Environments

Figure 7

Holding time based on (a) requests per second (RPS) and (b) peer strategy.
(a)
(b)