Figure 2From: An automated black box approach for web vulnerability identification and attack scenario generation Iterative construction of the navigation graphs. Back to article page