Research Article

Network Programming and Probabilistic Sketching for Securing the Data Plane

Figure 7

Average number of recursive steps required to detect the malicious switches in the linear network topology.