Fig. 3From: WNV-Detector: automated and scalable detection of wireless network vulnerabilitiesThe workflow of rule generatorBack to article page