Fig. 8From: WNV-Detector: automated and scalable detection of wireless network vulnerabilitiesPart of the devices used in the experimentBack to article page