Fig. 2
From: WNV-Detector: automated and scalable detection of wireless network vulnerabilities

The infrastructure of WNV-Detector
From: WNV-Detector: automated and scalable detection of wireless network vulnerabilities
The infrastructure of WNV-Detector