Fig. 5
From: WNV-Detector: automated and scalable detection of wireless network vulnerabilities

The process of device identification
From: WNV-Detector: automated and scalable detection of wireless network vulnerabilities
The process of device identification