Fig. 6From: WNV-Detector: automated and scalable detection of wireless network vulnerabilitiesThe process of vulnerability scanningBack to article page