[1]
I. Roy, A. Hossain, and S. T. . Ahmed Rumee, “Attacks on Graphical Password: A Study on Defense Mechanisms and Limitations”, IJITAS, vol. 3, no. 4, pp. 180–183, Dec. 2021.