Research Article

Network Programming and Probabilistic Sketching for Securing the Data Plane

Figure 8

Convergence time required by VISKA to detect the malicious switches in the linear network topology.