Research Article

[Retracted] Vulnerability Digging for Software-Defined Network Controller Using Event Flow Graph Analysis

Figure 13

Similarity matrix and clustering results of feature subgraphs.
(a)
(b)