Login / Signup
Password Extraction via Reconstructed Wireless Mouse Trajectory.
Xian Pan
Zhen Ling
Aniket Pingley
Wei Yu
Nan Zhang
Kui Ren
Xinwen Fu
Published in:
IEEE Trans. Dependable Secur. Comput. (2016)
Keyphrases
</>
wireless networks
wireless communication
information security
trajectory data
location tracking
mobile devices
information extraction
real time
mobile users
wireless lan
internet access
access points
cellular networks
wifi
mobile computing
computer simulation
information systems