1.
PECKA M, BOROWIEC Ɓukasz, DEMIDOWSKI K, JONARSKA A. The analysis of social engineering methods in attacks on authentication systems. AWDJ [Internet]. 2023 Dec. 30 [cited 2024 Apr. 18];1(1):23. Available from: https://journals.edu.pl/index.php/awdj/article/view/12