Research Article
[Retracted] Vulnerability Digging for Software-Defined Network Controller Using Event Flow Graph Analysis
Table 3
Abnormal detection results.
| |||||||||||||||||||||||||||||||
Next, we introduce several examples of anomalies found. |
| |||||||||||||||||||||||||||||||
Next, we introduce several examples of anomalies found. |