(1)
عكسة ك.; حراق م. ا. Monitoring Critical Areas and Unauthorized Access Using RFID Technology. IERK 2023, 12, 702-717.