1.
PECKA M, BOROWIEC Ɓukasz, DEMIDOWSKI K, JONARSKA A. The analysis of social engineering methods in attacks on authentication systems. AWDJ. 2023;1(1):23. Accessed July 27, 2024. https://journals.edu.pl/index.php/awdj/article/view/12