1.
Omara M, Fayez M, Khalid H, Ghoniemy S. Restrictive Voting Technique for Faces Spoofing Attack. Int. j. commun. netw. inf. secur. [Internet]. 2023Jun.9 [cited 2024May17];15(1):204-16. Available from: https://www.ijcnis.org/index.php/ijcnis/article/view/5738