[1]
“COMPARATIVE ANALYSIS OF PHISHING ATTACKS AND OTHER CYBERATTACK TYPES”, INNOIST, vol. 1, no. 5, Apr. 2025, Accessed: Apr. 28, 2025. [Online]. Available: https://pstjournal.uz/index.php/pst/article/view/45