[1]
H. Faotu, O. N. Asheshemi, and E. Jeremiah T, “Human Vulnerabilities in Cybersecurity: Analyzing Social Engineering Attacks and AI-Driven Machine Learning Countermeasures”, JST, vol. 30, no. 1, pp. 72–84, Dec. 2024.