Implementing Attack-aware Security Function Chain Reordering | IEEE Conference Publication | IEEE Xplore