Fig. 5From: WNV-Detector: automated and scalable detection of wireless network vulnerabilitiesThe process of device identificationBack to article page