Return to Article Details Vulnerability analysis of an emulated SDN network by flooding HTTP and TCP packets Download Download PDF