diff --git a/models/Application_examples/Replay_Attack.mp b/models/Application_examples/Replay_Attack.mp index 83a4913977d75efdfc9c862107171b447f2dd58b..73c06714fb3aa107a0f82aa4035d7d09464d6a4a 100644 --- a/models/Application_examples/Replay_Attack.mp +++ b/models/Application_examples/Replay_Attack.mp @@ -10,7 +10,7 @@ │*│ │ To illustrate MP modeling of a replay attack │ │ │*│ │ involving data transmission. │ │ │*│ └────────────────────────────────────────────────────┘ │ -│*│ │ +│*│ │ │*│ ┌─[ Description ]────────────────────────────────────┠│ │*│ │ This model demonstrates a well known attack │ │ │*│ │ strategy on a communication system. Users may use │ │