Equipping WAP with WEAPONS to Detect Vulnerabilities: Practical Experience Report | IEEE Conference Publication | IEEE Xplore