1.
Grzebielec S. Analysis of the vulnerability of IT system users to a phishing attack. J. Comput. Sci. Inst. [Internet]. 2020 Jun. 27 [cited 2024 May 8];15:164-7. Available from: https://ph.pollub.pl/index.php/jcsi/article/view/2049