Research Article

[Retracted] Vulnerability Digging for Software-Defined Network Controller Using Event Flow Graph Analysis

Figure 14

Example of frequent evolution sequence.