[1]
S. Grzebielec, “Analysis of the vulnerability of IT system users to a phishing attack”, J. Comput. Sci. Inst., vol. 15, pp. 164–167, Jun. 2020.