[1]
A. Zhylin and O. Shevchuk, “Мethod of analysis for analyzing phishing messages”, ITS, vol. 10, no. 1, pp. 72–82, Jun. 2022.