[1]
O. Tsurkan and R. Herasymov, “Detection of vulnerabilities of the computer systems and networks using social engineering techniques”, ITS, vol. 6, no. 2, pp. 43–50, Dec. 2018.