Research Article

[Retracted] Vulnerability Digging for Software-Defined Network Controller Using Event Flow Graph Analysis

Figure 7

Schematic diagram of BFS-SubG algorithm.
(a)
(b)
(c)