[1]
R. R. N. Al Ogaili and S. Manickam, “A Critical Review: Revisiting Phishing Attacks Classification and Analysis of Techniques Employed in Taxonomies”, wjps, vol. 2, no. 2, pp. 251–269, Jun. 2023, doi: 10.31185/wjps.143.