Research Article

An Efficient Security System for Mobile Data Monitoring

Figure 5

The number of patterns with different length.