Fig. 8
From: WNV-Detector: automated and scalable detection of wireless network vulnerabilities

Part of the devices used in the experiment
From: WNV-Detector: automated and scalable detection of wireless network vulnerabilities
Part of the devices used in the experiment