Research Article

Weak PassPoint Passwords Detected by the Perimeter of Delaunay Triangles

Figure 9

Patterns with different predetermined shapes.