[1]
J. Kęczkowska, K. Wykrota, and M. Płaza, “Ethical simulation of a phishing attack”, IAPGOS, vol. 15, no. 3, pp. 100–104, Sep. 2025.