Research Article

[Retracted] Vulnerability Digging for Software-Defined Network Controller Using Event Flow Graph Analysis

Figure 8

Comparison between static event flow graph and dynamic event flow graph.
(a)
(b)