From post

How Users Investigate Phishing Emails that Lack Traditional Phishing Cues.

, , и . ACNS (3), том 14585 из Lecture Notes in Computer Science, стр. 381-411. Springer, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем