Research Article

[Retracted] Vulnerability Digging for Software-Defined Network Controller Using Event Flow Graph Analysis

Algorithm 6

SGSeqExtension.
Input: initial sequence of event flow graph subgraphs sequence , event flow graph sequence , minimum support degree , k is time step of subgraph sequence, is the set of frequent edges
Output: all subgraph sequences extended from
(1),
(2)for each and node :
(3)if ( can be extended from ):
(4)
(5) if ( is Null):
(6)  
(7)for each :
(8) Solve the constraint satisfaction problem of to
(9) if(each variable has at least valid value):
(10)  
(11)return