Figure 4From: An automated black box approach for web vulnerability identification and attack scenario generation Navigation graph of a non-authenticated user. Back to article page