OMARA, M.; FAYEZ, M.; KHALID, H.; GHONIEMY, S. Restrictive Voting Technique for Faces Spoofing Attack. International Journal of Communication Networks and Information Security (IJCNIS), [S. l.], v. 15, n. 1, p. 204–216, 2023. DOI: 10.17762/ijcnis.v15i1.5738. Disponível em: https://www.ijcnis.org/index.php/ijcnis/article/view/5738. Acesso em: 17 may. 2024.