[1]
H. Faotu, O. N. Asheshemi, and E. Jeremiah T , Trans., “Human Vulnerabilities in Cybersecurity: Analyzing Social Engineering Attacks and AI-Driven Machine Learning Countermeasures”, JST, vol. 30, no. 1, pp. 72–84, Dec. 2024, doi: 10.20428/jst.v30i1.2597.