Fig. 7From: WNV-Detector: automated and scalable detection of wireless network vulnerabilitiesUser interface of the systemBack to article page