Fig. 2From: WNV-Detector: automated and scalable detection of wireless network vulnerabilitiesThe infrastructure of WNV-DetectorBack to article page