(1)
Tsurkan, O.; Herasymov, R. Detection of Vulnerabilities of the Computer Systems and Networks Using Social Engineering Techniques. ITS 2018, 6, 43-50.