[1]
M. PECKA, Łukasz BOROWIEC, K. . DEMIDOWSKI, and A. . JONARSKA, “The analysis of social engineering methods in attacks on authentication systems”, AWDJ, vol. 1, no. 1, p. 23, Dec. 2023, Accessed: Jul. 27, 2024. [Online]. Available: https://journals.edu.pl/index.php/awdj/article/view/12