[1]
S. E. Pate and B. H. Barhate, “A survey of Possible Attacks on Text & Graphical Password Authentication Techniques”,
Int. J. Sci. Res. Comp. Sci. Eng.
, vol. 6, no. 1, pp. 77–80, Jan. 2018.