Optimal Placement of Sequentially Ordered Virtual Security Appliances in the Cloud

Abstract: Traditional enterprise network security is based on the deployment [...]