[1]
“Application of Computer Vision Methods for Information Security”, R&E-SOURCE, no. s1, pp. 161–177, Mar. 2025, doi: 10.53349/re-source.2025.is1.a1389.