Research Article

Weak PassPoint Passwords Detected by the Perimeter of Delaunay Triangles

Figure 3

Representation of the pattern.