Research Article
[Retracted] Vulnerability Digging for Software-Defined Network Controller Using Event Flow Graph Analysis
Algorithm 3
Subgraph_Mining(GS, S, s).
(1) | if ! = min() | (2) | return | (3) | | (4) | Use the rightmost extension on each graph in to generate a set of extended subgraphs | (5) | for each , is child do | (6) | if | (7) | | (8) | SubGraph_Mining(GS, , ) |
|