Fig. 5From: An enhanced state-aware model learning approach for security analysis in lightweight protocol implementationsAn example of state machineBack to article page