Figure 5From: An automated black box approach for web vulnerability identification and attack scenario generation Vulnerability graph of first iteration. Back to article page