[1]
V. Trysnyuk, Y. Nagornyi, K. Smetanin, I. Humeniuk, and T. Uvarova, “A METHOD FOR USER AUTHENTICATING TO CRITICAL INFRASTRUCTURE OBJECTS BASED ON VOICE MESSAGE IDENTIFICATION”, A.I.S., vol. 4, no. 3, pp. 11–16, Oct. 2020.