Figure 3From: An automated black box approach for web vulnerability identification and attack scenario generation Structure of the Web site. Back to article page