[1]
S. Grzebielec, “Analysis of the vulnerability of IT system users to a phishing attack”,
J. Comput. Sci. Inst.
, vol. 15, pp. 164–167, Jun. 2020.