“…Since controller placement optimization is not the main concern of this article, we only mention here that although this topic is dealt with in numerous surveys (for example, [7,18,32]) and numerous research papers (for example, [13,22,25]), most of the work described there does not consider resilience to attacks, and is devoted to optimizing controllers placements with respect to such measures as controller-to-controller delay and (service) node-to-controller delay. Controller placement problems directly related to the one formulated in this article (CPOP, Section 3.2) are considered in such papers as [27][28][29], and also in more recent papers [3,20,24]. However, all these papers assume fixed lists of attacks, pre-calculated without taking into account possible locations of controllers, while in this article, and in [33], the problem is to find a placement of controllers that maximizes the number of surviving service nodes, no matter what set (of a given size) of node locations is attacked.…”