Research Article
[Retracted] Vulnerability Digging for Software-Defined Network Controller Using Event Flow Graph Analysis
| Input: event flow graph sequence , minimum support degree , k is time step of subgraph sequence。 | | Output: all subgraph sequences that satisfy | (1) | | (2) | is the set of frequent edges in | (3) | for each : | (4) | | (5) | remove e from | (6) | return |
|