Figure 6From: An automated black box approach for web vulnerability identification and attack scenario generation Final vulnerability graph. Back to article page